Lines Matching refs:after
74 * Fix possible use-after-free or double-free in code calling
78 on the documented behaviour to still hold pointers to memory blocks after
79 they were free()d, resulting in high risk of use-after-free or double-free,
82 were affected (use-after-free if the san string contains more than one DN).
233 bad state after an operation has been aborted.
653 generating a new random after a HelloRetryRequest. Fixes #8669.
876 that the output after decryption may include CBC padding. Consider moving
1013 * Update test data to avoid failures of unit tests after 2023-08-07.
1334 a secure enclave) could recover an RSA private key after observing the
1512 Furthermore you may name an additional file to include after the main
1561 potentially left in memory after file operations. Reported by
1571 after the end of the SSL input buffer. The buffer overread only happens
1620 the function needs to be re-called after initially returning
1779 * Fix a double-free that happened after mbedtls_ssl_set_session() or
1991 after initializing the context. mbedtls_rsa_set_padding() now returns an
2192 signature, allowing the recovery of the private key after observing a
2197 a secure enclave) could recover an RSA private key after observing the
2202 or Curve448 static ECDH key after inputting a chosen public key and
2427 * Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
2696 * Library files installed after a CMake build no longer have execute
2749 removable through Mbed TLS after the upgrade.
2789 plaintext after repeated timing measurements under some conditions.
2890 resizes the I/O buffers before and after handshakes, reducing the memory
3218 incoming record with the correct connection data even after the peer has
3488 * Add support for temporarily suspending expensive ECC computations after
3545 after use.
3636 * Fix potential use-after-free in mbedtls_ssl_get_max_frag_len()
3637 and mbedtls_ssl_get_record_expansion() after a session reset. Fixes #1941.
4052 * Ensure that buffers are cleared after use if they contain sensitive data.
4055 being leaked to memory after release.
4063 after keypair generation.
4236 * Reliably wipe sensitive data after use in the AES example applications
4329 peer after sending a fatal alert to refuse a renegotiation attempt.
4330 Previous behaviour was to keep processing data even after the alert has
4401 characters after the footer could result in the execution of an infinite
4516 data structure until after error checks are successful. Found by
4576 buffer after DER certificates to be included in the raw representation.
4720 tries to continue the handshake after it failed (a misuse of the API).
4821 should generally be the first function called on this context after init:
4966 after a successful net_accept().
6096 appended with '....' after first 28 octets
6143 after the handshake.
6188 after 1950