Lines Matching refs:number

96      number of trailing equal signs, or had 4*k+1 digits. They were accepted
278 the number of volatile PSA keys is virtually unlimited, at the expense
509 used as random number generator function (f_rng) and context (p_rng) in
658 the attacker to send a large number of messages for decryption. For
1162 - now it accepts the serial number in 2 different formats: decimal and
1671 * Declare a number of structure fields as public: the fields of
1959 * For all functions that take a random number generator (RNG) as a
1975 paving the way for the larger number of secrets
2150 large number of signature operations. This completes a partial fix in
2314 size may have been rounded up to a whole number of bytes.
2341 MBEDTLS_PSA_KEY_SLOT_COUNT sets the maximum number of volatile keys that
2981 * Fix mbedtls_asn1_get_int to support any number of leading zeros. Credit
3199 * Fix incorrect default port number in ssl_mail_client example's usage.
3401 * In mbedtls_mpi_write_binary(), don't leak the exact size of the number
3433 previous settings for the number of rounds made it practical for an
3438 For example, the number of rounds was enough to securely generate RSA key
3482 mbedtls_mpi_is_prime_ext() which allows specifying the number of
3958 * Log correct number of ciphersuites used in Client Hello message. #918
4411 number to write in hexadecimal is negative and requires an odd number of
4449 to configure the minimum number of bytes for entropy sources using the
4804 * The SSL debug callback gained two new arguments (file name, line number).
5244 big-endian platform when size was not an integer number of limbs
5330 * Forbid sequence number wrapping
5635 * Forbid sequence number wrapping
5674 big-endian platform when size was not an integer number of limbs
6021 * Added an EXPLICIT tag number parameter to x509_get_ext()
6052 * If certificate serial is longer than 32 octets, serial number is now
6375 serial number, setup correct server port in the ssl client example