Lines Matching refs:check

32      and possibly up to 571 bytes with a custom cookie check function.
41 client would fail to check that the curve selected by the server for
152 The check was accidentally not performed when cross-compiling for Windows
336 * Remove outdated check-config.h check that prevented implementing the
397 double-check that custom session cache implementations return
539 as they have no way to check if the output buffer is large enough.
649 * Fix an off-by-one error in the additional data length check for
743 to extract and check the MAC. This is an improvement to the existing
889 * Fix false positive uninitialised variable reported by cpp-check.
905 * Simplify a bounds check in ssl_write_certificate_request(). Contributed
964 * Remove a spurious check in ssl_parse_client_psk_identity that triggered
1180 mbedtls_ecdh_can_do() on each result to check whether each algorithm is
1318 * Add a check for MBEDTLS_X509_CRL_PARSE_C in ssl_server2, guarding the crl
1381 in the header files, which missed the precompilation check. #971
1471 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
1480 of check for certificate/key matching. Reported by Attila Molnar, #507.
1538 * Fix a flawed bounds check in server PSK hint parsing. In case the
1709 check in parsing the CertificateRequest message,
1922 a check for whether more more data is pending to be processed in the
2107 * Fix an unsafe bounds check in ssl_parse_client_psk_identity() when adding
2240 * Add a check for invalid private parameters in mbedtls_ecdsa_sign().
2242 * Fix word size check in in pk.c to not depend on MBEDTLS_HAVE_INT64.
2277 * Only check for necessary RSA structure fields in `mbedtls_rsa_private`. In
2331 * Add a check if iv_len is zero in GCM, and return an error if it is zero.
2338 * Add MBEDTLS_MPI_CHK to check for error value of mbedtls_mpi_fill_random.
2344 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
2348 to bypass the version verification check. Found by Peng Li/Yueh-Hsun Lin,
2352 constructed certificates to bypass the certificate verification check.
2591 * Fix check for validity of date when parsing in mbedtls_x509_get_time().
2618 * Fix missing padding length check in mbedtls_rsa_rsaes_pkcs1_v15_decrypt
3111 * Fix bug related to ssl_set_curves(): the client didn't check that the
3294 * Stricter check on SSL ClientHello internal sizes compared to actual packet
3296 * Fix WSAStartup() return value check (found by Peter Vaskovic)
3322 * Fix base64_decode() to return and check length correctly (in case of
3331 * version_check_feature() added to check for compile-time options at
3348 * Fix false reject in padding check in ssl_decrypt_buf() for CBC
3376 * Use UTC time to check certificate validity.
3736 * Use UTC time to check certificate validity.
3787 * Stricter check on SSL ClientHello internal sizes compared to actual packet
3793 * Fix base64_decode() to return and check length correctly (in case of
3946 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
3980 * AES code only check for Padlock once
4073 * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
4294 the existing date check
4419 input numbers are even and added testcases to check
4489 for which the RSA signature check fails (bug reported by Benoit)