Lines Matching refs:used
29 were not meant to be used in application code have been moved out of
41 key type used, as well as the key bit-size in the case of
45 as well as other functions and constants only used by
76 * The getter and setter API of the SSL session cache (used for
310 learn partial information about the leading bits of the nonce used for the
354 defined to specific values. If the code is used in a context
408 can now only be used as intended, for keys that cannot be modified through
416 unsupported extension used by the server.
434 should be used.
458 used by the Mbed TLS release whose MBEDTLS_VERSION_NUMBER has the same
494 CTR_DRBG is used by default if it is available, but you can override
524 security strength, but the code incorrectly used a constant instead of
567 used to validate digital signatures on certificates and MUST mark the
619 mbedcrypto, mbedx509 and apidoc CMake target names. This can be used by
639 size of the output buffer when used with NIST_KW. As a result, code using
663 * Zeroising of local buffers and variables which are used for calculations
694 agreement and subsequent key derivation operation to be used as a key
891 reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee,
904 hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT
1096 these variables can be used to recover the last round key. To follow best
1109 learn leading bits of the ephemeral key used during ECDSA signatures and to
1208 feature can be used alongside Connection ID and SSL context serialisation.
1321 and the used tls-prf.
1335 to the DTLS record header. This identifier can be used to associated an
1344 and the used tls-prf.
1355 used with negative inputs. Found by Guido Vranken in #2404. Credit to
1358 either used both encrypt and decrypt key schedules, or which perform padding.
1366 in case operators binding less strongly than subtraction were used
1377 This certificate is used in the demo server programs, which lead the
1455 * Add support for alternative CSR headers, as used by Microsoft and defined
1543 the PSA Crypto API from Mbed Crypto when additionally used with the
1590 space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
1607 some configurable amount of operations. This is intended to be used in
1618 MPI multiplications used in ECC and RSA cryptography. Contributed by
1621 signature always used a salt with the same length as the hash, and returned
1662 * Zeroize memory used for buffering or reassembling handshake messages
1666 * Change the default string format used for various X.509 DN attributes to
1690 created which used PrintableStrings in the issuer field even though the
1691 signing CA used UTF8Strings in its subject field; while X.509 compliant,
1734 The maximum amount of RAM used for this can be controlled by the
1749 * Add ecc extensions only if an ecc based ciphersuite is used.
1790 or if mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only
1803 mbedtls_ssl_conf_dtls_badmac_limit() was used, the attack only worked if
1857 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,
1899 used by user applications. Found and fixed by Fabio Alessandrelli.
1906 * Changed the Clang parameters used in the CMake build files to work for
1954 offer or a ciphersuite that cannot be used with the TLS or DTLS version
1975 underlying transport in case event-driven IO is used.
2004 I/O was used. Found and reported by Hubert Mis in #772.
2103 * Fix mbedtls_x509_crt_profile_suiteb, which used to reject all certificates
2119 * Log correct number of ciphersuites used in Client Hello message. #918
2146 extension. When the truncated HMAC extension is enabled and CBC is used,
2147 sending a malicious application packet could be used to selectively corrupt
2223 * The configuration option MBEDTLS_RSA_ALT can be used to define alternative
2270 * Fix variable used before assignment compilation warnings with IAR
2311 Note, this padding mode is not used by the TLS protocol. Found and fixed by
2329 used. Reported and fix proposed independently by satur9nine and sliai
2566 * Fixed the templates used to generate project and solution files for Visual
2619 when GCM is used. Found by udf2457. #441
2719 allocate memory. Only used for certificate generation, not triggerable
2794 once in the same handhake and mbedtls_ssl_conf_psk() was used.
2797 * Fix stack buffer overflow in pkcs12 decryption (used by
2884 be always used (found by dcb314) (#235)
2954 * The following functions have been introduced and must be used in callback
2963 * On server, mbedtls_ssl_conf_session_tickets_cb() must now be used in
2998 * calloc() is now used instead of malloc() everywhere. API of platform
3033 argument (allowing memory savings if HMAC is not used)
3131 * Fix memory leak when gcm_setkey() and ccm_setkey() are used more than
3149 * Fix hardclock() (only used in the benchmarking program) with some
3172 more flexible (warning: OFLAGS is not used any more) (see the README)
3451 * oid_get_numeric_string() used to truncate the output without returning an
3505 * Bignum's MIPS-32 assembly was used on MIPS-64, causing chaos. (Found by
3702 * Fix hardclock() (only used in the benchmarking program) with some
3820 * Bignum's MIPS-32 assembly was used on MIPS-64, causing chaos. (Found by
4194 * Changed the used random function pointer to more flexible format. Renamed
4210 standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
4255 used are negative.
4593 * Ciphers used in SSL/TLS can now be disabled at compile