Lines Matching refs:check

129    * Fix a sloppy check in LMS public key import, which could lead to accepting
415 use authmode none, and to carefully check the results when using optional
641 * mbedtls_pem_read_buffer() now performs a check on the padding data of
725 that it failed to check if all the relevant curves were supported by the
767 to check for availability of hash algorithms, regardless of whether
972 detected by comparing the wrong field and the check was erroneously
1392 * Add a configuration check to exclude optional client authentication
1574 and possibly up to 571 bytes with a custom cookie check function.
1583 * Fix check of certificate key usage in TLS 1.3. The usage of the public key
1601 client would fail to check that the curve selected by the server for
1650 * Fix check_config.h to check that we have MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
1754 * Add functions to check if a cipher supports variable IV or key size.
1788 The check was accidentally not performed when cross-compiling for Windows
2261 * Remove outdated check-config.h check that prevented implementing the
2471 as they have no way to check if the output buffer is large enough.
2581 * Fix an off-by-one error in the additional data length check for
2675 to extract and check the MAC. This is an improvement to the existing
2821 * Fix false positive uninitialised variable reported by cpp-check.
2837 * Simplify a bounds check in ssl_write_certificate_request(). Contributed
2896 * Remove a spurious check in ssl_parse_client_psk_identity that triggered
3112 mbedtls_ecdh_can_do() on each result to check whether each algorithm is
3250 * Add a check for MBEDTLS_X509_CRL_PARSE_C in ssl_server2, guarding the crl
3313 in the header files, which missed the precompilation check. #971
3403 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
3412 of check for certificate/key matching. Reported by Attila Molnar, #507.
3470 * Fix a flawed bounds check in server PSK hint parsing. In case the
3641 check in parsing the CertificateRequest message,
3854 a check for whether more more data is pending to be processed in the
4039 * Fix an unsafe bounds check in ssl_parse_client_psk_identity() when adding
4172 * Add a check for invalid private parameters in mbedtls_ecdsa_sign().
4174 * Fix word size check in in pk.c to not depend on MBEDTLS_HAVE_INT64.
4209 * Only check for necessary RSA structure fields in `mbedtls_rsa_private`. In
4263 * Add a check if iv_len is zero in GCM, and return an error if it is zero.
4270 * Add MBEDTLS_MPI_CHK to check for error value of mbedtls_mpi_fill_random.
4276 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
4280 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
4284 constructed certificates to bypass the certificate verification check.
4523 * Fix check for validity of date when parsing in mbedtls_x509_get_time().
4550 * Fix missing padding length check in mbedtls_rsa_rsaes_pkcs1_v15_decrypt
5043 * Fix bug related to ssl_set_curves(): the client didn't check that the
5226 * Stricter check on SSL ClientHello internal sizes compared to actual packet
5228 * Fix WSAStartup() return value check (found by Peter Vaskovic)
5254 * Fix base64_decode() to return and check length correctly (in case of
5263 * version_check_feature() added to check for compile-time options at
5280 * Fix false reject in padding check in ssl_decrypt_buf() for CBC
5308 * Use UTC time to check certificate validity.
5668 * Use UTC time to check certificate validity.
5719 * Stricter check on SSL ClientHello internal sizes compared to actual packet
5725 * Fix base64_decode() to return and check length correctly (in case of
5878 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
5912 * AES code only check for Padlock once
6005 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
6226 the existing date check
6351 input numbers are even and added testcases to check
6421 for which the RSA signature check fails (bug reported by Benoit)