Lines Matching refs:messages

172    * Zeroize memory used for buffering or reassembling handshake messages
234 * Add support for fragmentation of outgoing DTLS handshake messages. This
243 * Add support for buffering out-of-order handshake messages in DTLS.
287 * Add support for buffering of out-of-order handshake messages.
297 partially recover the plaintext of messages under some conditions by
299 this recovery by sending many messages in the same connection. With TLS
311 plaintext of messages under some conditions by using a cache attack
321 to partially recover the plaintext of messages under some conditions (see
366 * Fix decryption for zero length messages (which contain all padding) when a
381 zero-length messages when using TLS 1.2. Contributed by Espressif Systems.
511 returned when unexpected messages were being discarded, ignoring that
512 further messages could potentially already be pending to be processed
798 * Fix handling of handshake messages in mbedtls_ssl_read() in case
998 suppressing the CA list in Certificate Request messages. The default
1022 * Add checks to prevent signature forgeries for very large messages while
1033 CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2.
1414 * Prepend a "thread identifier" to debug messages (issue pointed out by
1729 * Added new error codes and debug messages about selection of
1821 It was possible to crash the server (and client) using crafted messages
1890 * debug_set_threshold() added to ignore messages over threshold level
1950 * The length of various ClientKeyExchange messages was not properly checked.
2310 It was possible to crash the server (and client) using crafted messages
2458 * Debug messages about padding errors during SSL message decryption are
2460 * Sending of security-relevant alert messages that do not break
2609 * Debug messages about padding errors during SSL message decryption are
2659 * Fixed potential memory corruption on miscrafted client messages (found by