Lines Matching refs:check
86 * Fix a sloppy check in LMS public key import, which could lead to accepting
372 use authmode none, and to carefully check the results when using optional
598 * mbedtls_pem_read_buffer() now performs a check on the padding data of
682 that it failed to check if all the relevant curves were supported by the
724 to check for availability of hash algorithms, regardless of whether
929 detected by comparing the wrong field and the check was erroneously
1349 * Add a configuration check to exclude optional client authentication
1531 and possibly up to 571 bytes with a custom cookie check function.
1540 * Fix check of certificate key usage in TLS 1.3. The usage of the public key
1558 client would fail to check that the curve selected by the server for
1607 * Fix check_config.h to check that we have MBEDTLS_SSL_KEEP_PEER_CERTIFICATE
1711 * Add functions to check if a cipher supports variable IV or key size.
1745 The check was accidentally not performed when cross-compiling for Windows
2218 * Remove outdated check-config.h check that prevented implementing the
2428 as they have no way to check if the output buffer is large enough.
2538 * Fix an off-by-one error in the additional data length check for
2632 to extract and check the MAC. This is an improvement to the existing
2778 * Fix false positive uninitialised variable reported by cpp-check.
2794 * Simplify a bounds check in ssl_write_certificate_request(). Contributed
2853 * Remove a spurious check in ssl_parse_client_psk_identity that triggered
3069 mbedtls_ecdh_can_do() on each result to check whether each algorithm is
3207 * Add a check for MBEDTLS_X509_CRL_PARSE_C in ssl_server2, guarding the crl
3270 in the header files, which missed the precompilation check. #971
3360 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
3369 of check for certificate/key matching. Reported by Attila Molnar, #507.
3427 * Fix a flawed bounds check in server PSK hint parsing. In case the
3598 check in parsing the CertificateRequest message,
3811 a check for whether more more data is pending to be processed in the
3996 * Fix an unsafe bounds check in ssl_parse_client_psk_identity() when adding
4129 * Add a check for invalid private parameters in mbedtls_ecdsa_sign().
4131 * Fix word size check in in pk.c to not depend on MBEDTLS_HAVE_INT64.
4166 * Only check for necessary RSA structure fields in `mbedtls_rsa_private`. In
4220 * Add a check if iv_len is zero in GCM, and return an error if it is zero.
4227 * Add MBEDTLS_MPI_CHK to check for error value of mbedtls_mpi_fill_random.
4233 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
4237 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
4241 constructed certificates to bypass the certificate verification check.
4480 * Fix check for validity of date when parsing in mbedtls_x509_get_time().
4507 * Fix missing padding length check in mbedtls_rsa_rsaes_pkcs1_v15_decrypt
5000 * Fix bug related to ssl_set_curves(): the client didn't check that the
5183 * Stricter check on SSL ClientHello internal sizes compared to actual packet
5185 * Fix WSAStartup() return value check (found by Peter Vaskovic)
5211 * Fix base64_decode() to return and check length correctly (in case of
5220 * version_check_feature() added to check for compile-time options at
5237 * Fix false reject in padding check in ssl_decrypt_buf() for CBC
5265 * Use UTC time to check certificate validity.
5625 * Use UTC time to check certificate validity.
5676 * Stricter check on SSL ClientHello internal sizes compared to actual packet
5682 * Fix base64_decode() to return and check length correctly (in case of
5835 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
5869 * AES code only check for Padlock once
5962 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
6183 the existing date check
6308 input numbers are even and added testcases to check
6378 for which the RSA signature check fails (bug reported by Benoit)