Home
last modified time | relevance | path

Searched refs:correct (Results 1 – 6 of 6) sorted by relevance

/optee_os/core/lib/libfdt/
H A DREADME.license25 encourage widespread and correct usage of flattened device trees,
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_msg.c1493 mbedtls_ct_condition_t correct = MBEDTLS_CT_TRUE; in mbedtls_ssl_decrypt_buf() local
1917 correct = mbedtls_ct_bool_and(ge, correct); in mbedtls_ssl_decrypt_buf()
1933 correct = mbedtls_ct_bool_and(ge, correct); in mbedtls_ssl_decrypt_buf()
1969 correct = mbedtls_ct_bool_and(mbedtls_ct_uint_eq(pad_count, padlen), correct); in mbedtls_ssl_decrypt_buf()
1972 if (padlen > 0 && correct == MBEDTLS_CT_FALSE) { in mbedtls_ssl_decrypt_buf()
1976 padlen = mbedtls_ct_size_if_else_0(correct, padlen); in mbedtls_ssl_decrypt_buf()
2074 correct = MBEDTLS_CT_FALSE; in mbedtls_ssl_decrypt_buf()
2089 if (correct == MBEDTLS_CT_FALSE) { in mbedtls_ssl_decrypt_buf()
/optee_os/lib/libmbedtls/mbedtls/
H A DSECURITY.md154 be correctly formatted as long as the signature is correct).
H A DCONTRIBUTING.md48 1. All bug fixes that correct a defect that is also present in an LTS branch must be backported to …
H A DChangeLog95 * Fix mbedtls_base64_decode() on inputs that did not have the correct
99 function reported the correct size in *olen when it returned
3175 incoming record with the correct connection data even after the peer has
3943 with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
3958 * Log correct number of ciphersuites used in Client Hello message. #918
4156 structure. Do not assume that zeroizing a context is a correct way to
5811 * Server not always sending correct CertificateRequest message
5990 * Fixed generation of DHM parameters to correct length (found by Ruslan
6375 serial number, setup correct server port in the ssl client example
/optee_os/core/lib/qcbor/
H A DREADME.md452 correct.