Lines Matching refs:memory
35 on the documented behaviour to still hold pointers to memory blocks after
153 * Fix a vulnerability in the TLS 1.2 handshake. If memory allocation failed
317 (feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition,
360 * Fix a memory leak that could occur when failing to process an RSA
361 key through some PSA functions due to low memory conditions.
535 * Passing buffers that are stored in untrusted memory as arguments
540 This feature increases code size and memory usage. If buffers passed to
542 the function call (i.e. no buffer parameters are in shared memory),
622 * Use heap memory to allocate DER encoded public/private key.
643 have changed their speed/memory compromise as part of a proactive security
645 preserves the current speed, at the expense of increasing memory
790 * Improve mbedtls_x509_time performance and reduce memory use.
823 * Fix a case where potentially sensitive information held in memory would not
920 signature can silently return an incorrect result in low memory conditions.
927 information about the otherName SAN and contained uninitialized memory.
949 * Use heap memory to allocate DER encoded RSA private key.
1007 * Improvements to use of unaligned and byte-swapped memory, reducing code
1108 arguments, access uninitialized memory in some cases. Fixes #6700 (which
1268 of memory in named data lists in X.509 structures.
1290 about memory accesses (typically, an untrusted operating system attacking
1335 * Fix memory leak in ssl_parse_certificate_request() caused by
1346 * Fix a possible null pointer dereference if a memory allocation fails
1514 * Fix potential memory leak inside mbedtls_ssl_cache_set() with
1518 potentially left in memory after file operations. Reported by
1551 * Fix a memory leak if mbedtls_ssl_config_defaults() is called twice.
1614 memory conditions.
1725 case the value leaks through a memory disclosure vulnerability. For
1726 example, a memory disclosure vulnerability could have allowed a
1730 if the output buffer is in memory that is shared with an untrusted
1734 oracle vulnerability if the output buffer is in memory that is shared with
1738 (out of memory). After that, calling mbedtls_ssl_session_free()
2153 about memory accesses (typically, an untrusted operating system attacking
2385 * Fix memory leak that occured when calling psa_close_key() on a
2388 * Fix a memory leak in an error case in psa_generate_derived_key_internal().
2505 functions to erase sensitive data from memory. Reported by
2555 * Fix a memory leak in mbedtls_mpi_sub_abs() when the result was negative
2557 * Fix a case in elliptic curve arithmetic where an out-of-memory condition
2631 Encrypt-then-Mac extension, use constant code flow memory access patterns
2641 Diffie-Hellman. An adversary with precise enough timing and memory access
2649 application data from memory. Reported in #689 by
2671 * Fix a memory leak in mbedtls_md_setup() when using HMAC under low memory
2739 memory access information (typically an untrusted operating system
2767 * Fix potential memory leaks in ecp_randomize_jac() and ecp_randomize_mxz()
2838 precise enough timing and memory access information (typically an
2847 resizes the I/O buffers before and after handshakes, reducing the memory
2878 * Fix potential memory overread when performing an ECDSA signature
2995 rather than success, so that coding mistakes or memory corruption tends to
3111 * Fix memory leak in in mpi_miller_rabin(). Contributed by
3190 * Fix potential memory leak in X.509 self test. Found and fixed by
3392 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
3402 via branching and memory access patterns. An attacker who could submit
3430 to trigger a memory access up to 64KiB beyond the incoming message buffer,
3487 application leading to a memory leak in case both
3497 * Fix memory leak and freeing without initialization in the example
3501 * Zeroize memory used for buffering or reassembling handshake messages
3582 * Fix a potential memory leak in mbedtls_ssl_setup() function. An allocation
3586 * Fix a memory leak in ecp_mul_comb() if ecp_precompute_comb() fails.
3605 * Fix memory leak and free without initialization in pk_encrypt
3680 * Fix a memory leak in mbedtls_x509_csr_parse(), found by catenacyber,
3865 doesn't leak memory if the user doesn't use mbedtls_ssl_conf_psk() and
3956 * Fix memory allocation corner cases in memory_buffer_alloc.c module. Found
4012 being leaked to memory after release.
4017 sake of saving memory, but potentially leading to slight timing
4095 * Fix memory leak in mbedtls_ssl_set_hostname() when called multiple times.
4106 * Fix out-of-memory problem when parsing 4096-bit PKCS8-encrypted RSA keys.
4138 * Fix use of uninitialized memory in mbedtls_timing_get_timer() when reset=1.
4139 * Fix possible memory leaks in mbedtls_gcm_self_test().
4401 * Fix potential memory leak in mbedtls_x509_crl_parse(). The leak was caused
4527 * Fix memory leak that occurred only when ECJPAKE was enabled and ECDHE and
4540 * Fix memory leaks in test framework
4558 allocate memory. Only used for certificate generation, not triggerable
4644 * Fix potential random memory allocation in mbedtls_pem_read_buffer()
4652 the same mbedtls_ssl_config object and memory allocation fails. Found by
4728 * Fix memory corruption on client with overlong PSK identity, around
4733 * Fix memory corruption in pkey programs (found by yankuncheng) (#210)
4872 argument (allowing memory savings if HMAC is not used)
4958 * New script memory.sh helps measuring the ROM and RAM requirements of two
4970 * Fix memory leak when gcm_setkey() and ccm_setkey() are used more than
4993 * Fix potential memory leak in ssl_set_psk() (found by Mansour Moufid).
5032 * Fix remotely-triggerable memory leak caused by crafted X.509 certificates
5104 * Remotely-triggerable memory leak when parsing some X.509 certificates
5107 * Remotely-triggerable memory leak when parsing crafted ClientHello
5166 ciphersuites to use and save some memory if the list is small.
5281 * Potential memory leak in mpi_exp_mod() when error occurs during
5304 * Single Platform compatilibity layer (for memory / printf / fprintf)
5332 * Possible remotely-triggered out-of-bounds memory access fixed (found by
5350 * ssl_cache was leaking memory when reusing a timed out entry containing a
5352 * ssl_srv was leaking memory when client presented a timed out ticket
5369 * Potential memory leak in bignum_selftest()
5408 * Potential memory leak in ssl_ticket_keys_init()
5417 * Possible remotely-triggered out-of-bounds memory access fixed (found by
5476 * Buffer-based memory allocator added (no malloc() / free() / HEAP usage)
5531 * Fix potential invalid memory read in the server, that allows a client to
5533 * Fix potential invalid memory read in certificate parsing, that allows a
5555 * Fix remotely-triggerable memory leak caused by crafted X.509 certificates
5566 * Fix memory leaks in PKCS#5 and PKCS#12.
5591 * Remotely-triggerable memory leak when parsing some X.509 certificates
5652 * Potential memory leak in bignum_selftest()
5667 * Potential memory leak in mpi_exp_mod() when error occurs during
5690 * Fixed memory leak in RSA as a result of introduction of blinding
5699 * Fixed potential memory leak when failing to resume a session
5759 * Fixed memory leak in ssl_free() and ssl_reset() for active session
5902 * Fixed potential memory zeroization on miscrafted RSA key (found by Eloi
5907 * Fixed potential memory leak when failing to resume a session
5969 * Fixed potential memory zeroization on miscrafted RSA key (found by Eloi
5988 * Fixed potential memory corruption on miscrafted client messages (found by
6029 * Added POLARSSL_MPI_WINDOW_SIZE definition to allow easier time to memory
6118 does not zeroize memory in advance anymore. Use rsa_init()
6164 * Added reading of DHM context from memory and file
6315 * Fixed minor memory leak in x509parse_crt() and added better
6361 * Fixed a memory leak in x509parse_crt() which was reported by Greg
6409 * Fixed a long standing memory leak in mpi_is_prime()
6433 time, to reduce the memory footprint on embedded systems
6466 * Fixed a couple memory leak in x509_read.c