Lines Matching refs:valid
341 clear. As a result, an attacker that had a certificate valid for uses other
1166 subidentifiers can be valid, but Mbed TLS cannot currently handle them.
1819 input buffer size is valid only for the built-in implementation of GCM.
2214 to create is not valid, bringing them in line with version 1.0.0 of the
2260 the affected side to wrongly reject valid messages. Fixes #4118.
2540 valid. However, if the parameters do not match in *any* way then the
2622 * Remove the zeroization of a pointer variable in AES rounds. It was valid
3089 an incoming record is valid, authentic and has not been seen before. This
3721 * Clarify documentation for mbedtls_ssl_write() to include 0 as a valid
3997 * In test_suite_pk, pass valid parameters when testing for hash length
4005 that could cause a key exchange to fail on valid data.
4007 could cause a key exchange to fail on valid data.
4321 valid C and they prevented the test from compiling in Visual Studio 2015
4572 * Fix an issue that caused valid certificates to be rejected whenever an
4573 expired or not yet valid certificate was parsed before a valid certificate
4610 * Fix bug in certificate validation that caused valid chains to be rejected
4646 resulting in some valid X.509 being incorrectly rejected. Found and fix
5027 * Fix bug in pk_parse_key() that caused some valid private EC keys to be
5306 * pk_verify() now returns a specific error code when the signature is valid
6495 * Fixed a bug that caused valid packets with a payload
6531 valid RSA keys to be dismissed (thanks to oldwolf)