Lines Matching refs:byte
1007 * Improvements to use of unaligned and byte-swapped memory, reducing code
1125 have the most-significant bit set in their last byte.
1706 Currently only 13-byte long IV's are supported.
1707 For decryption a minimum of 16-byte long input is expected.
2603 a byte buffer. It is the inverse of the existing mbedtls_ecp_read_key().
2615 attacker could for example impersonate a 4-bytes or 16-byte domain by
2645 * Fix a 1-byte buffer overread in mbedtls_x509_crl_parse_der().
3033 1 byte too large for the output buffer.
3188 were shifted by one byte, creating an invalid ASN.1 tag. Fixed by
3193 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
3559 input (extensions length field equal to 0), an illegal read of one byte
3672 * Fix the key_app_writer example which was writing a leading zero byte which
3845 function which leads to a potential one byte overread of the message
3967 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
4410 * Fix 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI
4465 * Fix conditional statement that would cause a 1 byte overread in
4478 * Fix potential byte overread when verifying malformed SERVER_HELLO in
4492 * Added support for 3 and 4 byte lengths to mbedtls_asn1_write_len().
4835 length parameter to include the terminating null byte for PEM input.
5291 error if the output buffer was just 1 byte too small.
6048 * Allowed X509 key usage parsing to accept 4 byte values instead of the
6049 standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
6374 * Updated x509parse_cert_info() to correctly display byte 0 of the