Lines Matching refs:memory

78      on the documented behaviour to still hold pointers to memory blocks after
196 * Fix a vulnerability in the TLS 1.2 handshake. If memory allocation failed
360 (feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition,
403 * Fix a memory leak that could occur when failing to process an RSA
404 key through some PSA functions due to low memory conditions.
578 * Passing buffers that are stored in untrusted memory as arguments
583 This feature increases code size and memory usage. If buffers passed to
585 the function call (i.e. no buffer parameters are in shared memory),
665 * Use heap memory to allocate DER encoded public/private key.
686 have changed their speed/memory compromise as part of a proactive security
688 preserves the current speed, at the expense of increasing memory
833 * Improve mbedtls_x509_time performance and reduce memory use.
866 * Fix a case where potentially sensitive information held in memory would not
963 signature can silently return an incorrect result in low memory conditions.
970 information about the otherName SAN and contained uninitialized memory.
992 * Use heap memory to allocate DER encoded RSA private key.
1050 * Improvements to use of unaligned and byte-swapped memory, reducing code
1151 arguments, access uninitialized memory in some cases. Fixes #6700 (which
1311 of memory in named data lists in X.509 structures.
1333 about memory accesses (typically, an untrusted operating system attacking
1378 * Fix memory leak in ssl_parse_certificate_request() caused by
1389 * Fix a possible null pointer dereference if a memory allocation fails
1557 * Fix potential memory leak inside mbedtls_ssl_cache_set() with
1561 potentially left in memory after file operations. Reported by
1594 * Fix a memory leak if mbedtls_ssl_config_defaults() is called twice.
1657 memory conditions.
1768 case the value leaks through a memory disclosure vulnerability. For
1769 example, a memory disclosure vulnerability could have allowed a
1773 if the output buffer is in memory that is shared with an untrusted
1777 oracle vulnerability if the output buffer is in memory that is shared with
1781 (out of memory). After that, calling mbedtls_ssl_session_free()
2196 about memory accesses (typically, an untrusted operating system attacking
2428 * Fix memory leak that occured when calling psa_close_key() on a
2431 * Fix a memory leak in an error case in psa_generate_derived_key_internal().
2548 functions to erase sensitive data from memory. Reported by
2598 * Fix a memory leak in mbedtls_mpi_sub_abs() when the result was negative
2600 * Fix a case in elliptic curve arithmetic where an out-of-memory condition
2674 Encrypt-then-Mac extension, use constant code flow memory access patterns
2684 Diffie-Hellman. An adversary with precise enough timing and memory access
2692 application data from memory. Reported in #689 by
2714 * Fix a memory leak in mbedtls_md_setup() when using HMAC under low memory
2782 memory access information (typically an untrusted operating system
2810 * Fix potential memory leaks in ecp_randomize_jac() and ecp_randomize_mxz()
2881 precise enough timing and memory access information (typically an
2890 resizes the I/O buffers before and after handshakes, reducing the memory
2921 * Fix potential memory overread when performing an ECDSA signature
3038 rather than success, so that coding mistakes or memory corruption tends to
3154 * Fix memory leak in in mpi_miller_rabin(). Contributed by
3233 * Fix potential memory leak in X.509 self test. Found and fixed by
3435 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
3445 via branching and memory access patterns. An attacker who could submit
3473 to trigger a memory access up to 64KiB beyond the incoming message buffer,
3530 application leading to a memory leak in case both
3540 * Fix memory leak and freeing without initialization in the example
3544 * Zeroize memory used for buffering or reassembling handshake messages
3625 * Fix a potential memory leak in mbedtls_ssl_setup() function. An allocation
3629 * Fix a memory leak in ecp_mul_comb() if ecp_precompute_comb() fails.
3648 * Fix memory leak and free without initialization in pk_encrypt
3723 * Fix a memory leak in mbedtls_x509_csr_parse(), found by catenacyber,
3908 doesn't leak memory if the user doesn't use mbedtls_ssl_conf_psk() and
3999 * Fix memory allocation corner cases in memory_buffer_alloc.c module. Found
4055 being leaked to memory after release.
4060 sake of saving memory, but potentially leading to slight timing
4138 * Fix memory leak in mbedtls_ssl_set_hostname() when called multiple times.
4149 * Fix out-of-memory problem when parsing 4096-bit PKCS8-encrypted RSA keys.
4181 * Fix use of uninitialized memory in mbedtls_timing_get_timer() when reset=1.
4182 * Fix possible memory leaks in mbedtls_gcm_self_test().
4444 * Fix potential memory leak in mbedtls_x509_crl_parse(). The leak was caused
4570 * Fix memory leak that occurred only when ECJPAKE was enabled and ECDHE and
4583 * Fix memory leaks in test framework
4601 allocate memory. Only used for certificate generation, not triggerable
4687 * Fix potential random memory allocation in mbedtls_pem_read_buffer()
4695 the same mbedtls_ssl_config object and memory allocation fails. Found by
4771 * Fix memory corruption on client with overlong PSK identity, around
4776 * Fix memory corruption in pkey programs (found by yankuncheng) (#210)
4915 argument (allowing memory savings if HMAC is not used)
5001 * New script memory.sh helps measuring the ROM and RAM requirements of two
5013 * Fix memory leak when gcm_setkey() and ccm_setkey() are used more than
5036 * Fix potential memory leak in ssl_set_psk() (found by Mansour Moufid).
5075 * Fix remotely-triggerable memory leak caused by crafted X.509 certificates
5147 * Remotely-triggerable memory leak when parsing some X.509 certificates
5150 * Remotely-triggerable memory leak when parsing crafted ClientHello
5209 ciphersuites to use and save some memory if the list is small.
5324 * Potential memory leak in mpi_exp_mod() when error occurs during
5347 * Single Platform compatilibity layer (for memory / printf / fprintf)
5375 * Possible remotely-triggered out-of-bounds memory access fixed (found by
5393 * ssl_cache was leaking memory when reusing a timed out entry containing a
5395 * ssl_srv was leaking memory when client presented a timed out ticket
5412 * Potential memory leak in bignum_selftest()
5451 * Potential memory leak in ssl_ticket_keys_init()
5460 * Possible remotely-triggered out-of-bounds memory access fixed (found by
5519 * Buffer-based memory allocator added (no malloc() / free() / HEAP usage)
5574 * Fix potential invalid memory read in the server, that allows a client to
5576 * Fix potential invalid memory read in certificate parsing, that allows a
5598 * Fix remotely-triggerable memory leak caused by crafted X.509 certificates
5609 * Fix memory leaks in PKCS#5 and PKCS#12.
5634 * Remotely-triggerable memory leak when parsing some X.509 certificates
5695 * Potential memory leak in bignum_selftest()
5710 * Potential memory leak in mpi_exp_mod() when error occurs during
5733 * Fixed memory leak in RSA as a result of introduction of blinding
5742 * Fixed potential memory leak when failing to resume a session
5802 * Fixed memory leak in ssl_free() and ssl_reset() for active session
5945 * Fixed potential memory zeroization on miscrafted RSA key (found by Eloi
5950 * Fixed potential memory leak when failing to resume a session
6012 * Fixed potential memory zeroization on miscrafted RSA key (found by Eloi
6031 * Fixed potential memory corruption on miscrafted client messages (found by
6072 * Added POLARSSL_MPI_WINDOW_SIZE definition to allow easier time to memory
6161 does not zeroize memory in advance anymore. Use rsa_init()
6207 * Added reading of DHM context from memory and file
6358 * Fixed minor memory leak in x509parse_crt() and added better
6404 * Fixed a memory leak in x509parse_crt() which was reported by Greg
6452 * Fixed a long standing memory leak in mpi_is_prime()
6476 time, to reduce the memory footprint on embedded systems
6509 * Fixed a couple memory leak in x509_read.c