Lines Matching refs:up

37      with consequences ranging up to arbitrary code execution.
76 * On entry to PSA driver entry points that set up a multipart operation
512 mbedtls_pk_copy_public_from_psa() provide ways to set up a PK context
1337 Change mbedtls_x509_get_name() to clean up allocated objects on error.
1434 information that was used to set up a message digest context.
1527 or a man-in-the-middle could cause a DTLS server to read up to 255 bytes
1531 and possibly up to 571 bytes with a custom cookie check function.
1534 client or server could cause an MbedTLS server or client to overread up
1810 oversight during the run-up to the release of Mbed TLS 3.0.
2314 size may have been rounded up to a whole number of bytes.
2480 of up to 15 bytes, with consequences ranging up to arbitrary code
3001 * Speed up PBKDF2 by caching the digest calculation. Contributed by Jack
3302 produced by some optimizing compilers, showing up as failures in
3430 to trigger a memory access up to 64KiB beyond the incoming message buffer,
3461 an error if this was not possible. Now the salt size may be up to two bytes
3714 * Change the shebang line in Perl scripts to look up perl in the PATH.
4025 to RFC 3526 containing parameters generated in a nothing-up-my-sleeve
4058 up RSA contexts from partial key material and having them completed to the
4784 Note that for mbedtls_ssl_setup(), you need to be done setting up the
5195 * Very large records using less padding could cause a buffer overread of up
5241 * rsa_check_pubkey() now allows an E up to N
5503 * Split up the GCM module into a starts/update/finish cycle
5671 * rsa_check_pubkey() now allows an E up to N
5718 * Internally split up x509parse_key() into a (PEM) handler function
5767 * Internally split up rsa_pkcs1_encrypt(), rsa_pkcs1_decrypt(),
5826 bottom-up (Peer cert depth is 0)
6235 * Added reset function for HMAC context as speed-up
6395 * Cleaned up the XYSSL* #defines, suggested by Azriel Fasten