Home
last modified time | relevance | path

Searched +full:fetch +full:- +full:depth (Results 1 – 3 of 3) sorted by relevance

/optee_os/core/lib/libtomcrypt/src/pk/asn1/der/sequence/
H A Dder_decode_sequence_flexi.c1 /* LibTomCrypt, modular cryptographic library -- Tom St Denis */
2 /* SPDX-License-Identifier: Unlicense */
21 (*l)->next = XCALLOC(1, sizeof(ltc_asn1_list)); in s_new_element()
22 if ((*l)->next == NULL) { in s_new_element()
25 (*l)->next->prev = *l; in s_new_element()
26 *l = (*l)->next; in s_new_element()
36 @param depth The depth/level of decoding recursion we've already reached
39 …ence_flexi(const unsigned char *in, unsigned long *inlen, ltc_asn1_list **out, unsigned long depth) in s_der_decode_sequence_flexi() argument
73 if (l->type != LTC_ASN1_EOL) { in s_der_decode_sequence_flexi()
74 /* fetch length */ in s_der_decode_sequence_flexi()
[all …]
/optee_os/.github/workflows/
H A Dci.yml6 group: ci-${{ github.ref }} # unique per branch
7 cancel-in-progress: true # cancel previous runs on the same branch
11 runs-on: ubuntu-latest
14 - name: Checkout
17 fetch-depth: 0 # full history so checkpatch can check commit IDs in commit messages
18 - nam
[all...]
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog3 = Mbed TLS 3.6.4 branch released 2025-06-30
8 session, according to the TLS-Exporter specification in RFC 8446 and 5705.
15 CVE-2025-49601
19 CVE-2025-49600
30 CVE-2025-52496
31 * Fix possible use-after-free or double-free in code calling
36 they were free()d, resulting in high risk of use-after-free or double-free,
39 were affected (use-after-free if the san string contains more than one DN).
42 CVE-2025-47917
54 CVE-2025-48965
[all …]