Lines Matching refs:byte

1050    * Improvements to use of unaligned and byte-swapped memory, reducing code
1168 have the most-significant bit set in their last byte.
1749 Currently only 13-byte long IV's are supported.
1750 For decryption a minimum of 16-byte long input is expected.
2646 a byte buffer. It is the inverse of the existing mbedtls_ecp_read_key().
2658 attacker could for example impersonate a 4-bytes or 16-byte domain by
2688 * Fix a 1-byte buffer overread in mbedtls_x509_crl_parse_der().
3076 1 byte too large for the output buffer.
3231 were shifted by one byte, creating an invalid ASN.1 tag. Fixed by
3236 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
3602 input (extensions length field equal to 0), an illegal read of one byte
3715 * Fix the key_app_writer example which was writing a leading zero byte which
3888 function which leads to a potential one byte overread of the message
4010 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
4453 * Fix 1 byte buffer overflow in mbedtls_mpi_write_string() when the MPI
4508 * Fix conditional statement that would cause a 1 byte overread in
4521 * Fix potential byte overread when verifying malformed SERVER_HELLO in
4535 * Added support for 3 and 4 byte lengths to mbedtls_asn1_write_len().
4878 length parameter to include the terminating null byte for PEM input.
5334 error if the output buffer was just 1 byte too small.
6091 * Allowed X509 key usage parsing to accept 4 byte values instead of the
6092 standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
6417 * Updated x509parse_cert_info() to correctly display byte 0 of the