Lines Matching refs:valid
298 clear. As a result, an attacker that had a certificate valid for uses other
1123 subidentifiers can be valid, but Mbed TLS cannot currently handle them.
1776 input buffer size is valid only for the built-in implementation of GCM.
2171 to create is not valid, bringing them in line with version 1.0.0 of the
2217 the affected side to wrongly reject valid messages. Fixes #4118.
2497 valid. However, if the parameters do not match in *any* way then the
2579 * Remove the zeroization of a pointer variable in AES rounds. It was valid
3046 an incoming record is valid, authentic and has not been seen before. This
3678 * Clarify documentation for mbedtls_ssl_write() to include 0 as a valid
3954 * In test_suite_pk, pass valid parameters when testing for hash length
3962 that could cause a key exchange to fail on valid data.
3964 could cause a key exchange to fail on valid data.
4278 valid C and they prevented the test from compiling in Visual Studio 2015
4529 * Fix an issue that caused valid certificates to be rejected whenever an
4530 expired or not yet valid certificate was parsed before a valid certificate
4567 * Fix bug in certificate validation that caused valid chains to be rejected
4603 resulting in some valid X.509 being incorrectly rejected. Found and fix
4984 * Fix bug in pk_parse_key() that caused some valid private EC keys to be
5263 * pk_verify() now returns a specific error code when the signature is valid
6452 * Fixed a bug that caused valid packets with a payload
6488 valid RSA keys to be dismissed (thanks to oldwolf)