Lines Matching refs:number
139 number of trailing equal signs, or had 4*k+1 digits. They were accepted
321 the number of volatile PSA keys is virtually unlimited, at the expense
552 used as random number generator function (f_rng) and context (p_rng) in
701 the attacker to send a large number of messages for decryption. For
1205 - now it accepts the serial number in 2 different formats: decimal and
1714 * Declare a number of structure fields as public: the fields of
2002 * For all functions that take a random number generator (RNG) as a
2018 paving the way for the larger number of secrets
2193 large number of signature operations. This completes a partial fix in
2357 size may have been rounded up to a whole number of bytes.
2384 MBEDTLS_PSA_KEY_SLOT_COUNT sets the maximum number of volatile keys that
3024 * Fix mbedtls_asn1_get_int to support any number of leading zeros. Credit
3242 * Fix incorrect default port number in ssl_mail_client example's usage.
3444 * In mbedtls_mpi_write_binary(), don't leak the exact size of the number
3476 previous settings for the number of rounds made it practical for an
3481 For example, the number of rounds was enough to securely generate RSA key
3525 mbedtls_mpi_is_prime_ext() which allows specifying the number of
4001 * Log correct number of ciphersuites used in Client Hello message. #918
4454 number to write in hexadecimal is negative and requires an odd number of
4492 to configure the minimum number of bytes for entropy sources using the
4847 * The SSL debug callback gained two new arguments (file name, line number).
5287 big-endian platform when size was not an integer number of limbs
5373 * Forbid sequence number wrapping
5678 * Forbid sequence number wrapping
5717 big-endian platform when size was not an integer number of limbs
6064 * Added an EXPLICIT tag number parameter to x509_get_ext()
6095 * If certificate serial is longer than 32 octets, serial number is now
6418 serial number, setup correct server port in the ssl client example