Lines Matching refs:access
313 * Fix rare concurrent access bug where attempting to operate on a
485 * Add getter (mbedtls_ssl_session_get_ticket_creation_time()) to access
523 * Add protection for multithreaded access to the PSA keystore and protection
524 for multithreaded access to the the PSA global state, including
794 * Add getter (mbedtls_ssl_cache_get_timeout()) to access
796 * Add getter (mbedtls_ssl_get_hostname()) to access
798 * Add getter (mbedtls_ssl_conf_get_endpoint()) to access
841 has access to precise timing measurements.
1108 arguments, access uninitialized memory in some cases. Fixes #6700 (which
1289 * Fix an issue where an adversary with access to precise enough information
1431 * Add a function to access the protocol version from an SSL context in a
1445 * Add function mbedtls_timing_get_final_delay() to access the private
1455 * Add the function mbedtls_ssl_get_own_cid() to access our own connection id
1471 * Add the function mbedtls_x509_crt_has_ext_type() to access the ext types
1989 * Direct access to fields of structures declared in public headers is no
2152 * Fix an issue where an adversary with access to precise enough information
2157 * Fix an issue where an adversary with access to precise enough timing
2381 making access aceess to them use constant flow code.
2631 Encrypt-then-Mac extension, use constant code flow memory access patterns
2636 if they have access to fine-grained measurements. In particular, this
2641 Diffie-Hellman. An adversary with precise enough timing and memory access
2738 f_rng argument. An attacker with access to precise enough timing and
2739 memory access information (typically an untrusted operating system
2837 * Fix side channel in ECC code that allowed an adversary with access to
2838 precise enough timing and memory access information (typically an
3392 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
3402 via branching and memory access patterns. An attacker who could submit
3430 to trigger a memory access up to 64KiB beyond the incoming message buffer,
5332 * Possible remotely-triggered out-of-bounds memory access fixed (found by
5417 * Possible remotely-triggered out-of-bounds memory access fixed (found by