Lines Matching refs:after

31    * Fix possible use-after-free or double-free in code calling
35 on the documented behaviour to still hold pointers to memory blocks after
36 they were free()d, resulting in high risk of use-after-free or double-free,
39 were affected (use-after-free if the san string contains more than one DN).
190 bad state after an operation has been aborted.
610 generating a new random after a HelloRetryRequest. Fixes #8669.
833 that the output after decryption may include CBC padding. Consider moving
970 * Update test data to avoid failures of unit tests after 2023-08-07.
1291 a secure enclave) could recover an RSA private key after observing the
1469 Furthermore you may name an additional file to include after the main
1518 potentially left in memory after file operations. Reported by
1528 after the end of the SSL input buffer. The buffer overread only happens
1577 the function needs to be re-called after initially returning
1736 * Fix a double-free that happened after mbedtls_ssl_set_session() or
1948 after initializing the context. mbedtls_rsa_set_padding() now returns an
2149 signature, allowing the recovery of the private key after observing a
2154 a secure enclave) could recover an RSA private key after observing the
2159 or Curve448 static ECDH key after inputting a chosen public key and
2384 * Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
2653 * Library files installed after a CMake build no longer have execute
2706 removable through Mbed TLS after the upgrade.
2746 plaintext after repeated timing measurements under some conditions.
2847 resizes the I/O buffers before and after handshakes, reducing the memory
3175 incoming record with the correct connection data even after the peer has
3445 * Add support for temporarily suspending expensive ECC computations after
3502 after use.
3593 * Fix potential use-after-free in mbedtls_ssl_get_max_frag_len()
3594 and mbedtls_ssl_get_record_expansion() after a session reset. Fixes #1941.
4009 * Ensure that buffers are cleared after use if they contain sensitive data.
4012 being leaked to memory after release.
4020 after keypair generation.
4193 * Reliably wipe sensitive data after use in the AES example applications
4286 peer after sending a fatal alert to refuse a renegotiation attempt.
4287 Previous behaviour was to keep processing data even after the alert has
4358 characters after the footer could result in the execution of an infinite
4473 data structure until after error checks are successful. Found by
4533 buffer after DER certificates to be included in the raw representation.
4677 tries to continue the handshake after it failed (a misuse of the API).
4778 should generally be the first function called on this context after init:
4923 after a successful net_accept().
6053 appended with '....' after first 28 octets
6100 after the handshake.
6145 after 1950