Lines Matching refs:up
80 with consequences ranging up to arbitrary code execution.
119 * On entry to PSA driver entry points that set up a multipart operation
555 mbedtls_pk_copy_public_from_psa() provide ways to set up a PK context
1380 Change mbedtls_x509_get_name() to clean up allocated objects on error.
1477 information that was used to set up a message digest context.
1570 or a man-in-the-middle could cause a DTLS server to read up to 255 bytes
1574 and possibly up to 571 bytes with a custom cookie check function.
1577 client or server could cause an MbedTLS server or client to overread up
1853 oversight during the run-up to the release of Mbed TLS 3.0.
2357 size may have been rounded up to a whole number of bytes.
2523 of up to 15 bytes, with consequences ranging up to arbitrary code
3044 * Speed up PBKDF2 by caching the digest calculation. Contributed by Jack
3345 produced by some optimizing compilers, showing up as failures in
3473 to trigger a memory access up to 64KiB beyond the incoming message buffer,
3504 an error if this was not possible. Now the salt size may be up to two bytes
3757 * Change the shebang line in Perl scripts to look up perl in the PATH.
4068 to RFC 3526 containing parameters generated in a nothing-up-my-sleeve
4101 up RSA contexts from partial key material and having them completed to the
4827 Note that for mbedtls_ssl_setup(), you need to be done setting up the
5238 * Very large records using less padding could cause a buffer overread of up
5284 * rsa_check_pubkey() now allows an E up to N
5546 * Split up the GCM module into a starts/update/finish cycle
5714 * rsa_check_pubkey() now allows an E up to N
5761 * Internally split up x509parse_key() into a (PEM) handler function
5810 * Internally split up rsa_pkcs1_encrypt(), rsa_pkcs1_decrypt(),
5869 bottom-up (Peer cert depth is 0)
6278 * Added reset function for HMAC context as speed-up
6438 * Cleaned up the XYSSL* #defines, suggested by Azriel Fasten