Lines Matching refs:result

24      is selected. This may result in an application crash or potentially an
42 ECDHE was indeed one that was offered. As a result, the client would
206 * Improve the performance of base64 constant-flow code. The result is still
312 where these are already defined, this can result in a compilation
409 may result in mbedtls_mpi_write_binary() or mbedtls_mpi_write_string()
589 size of the output buffer when used with NIST_KW. As a result, code using
666 * Fix a memory leak in mbedtls_mpi_sub_abs() when the result was negative
667 (an error condition) and the second operand was aliased to the result.
669 could go undetected, resulting in an incorrect result.
795 * Update copyright notices to use Linux Foundation guidance. As a result,
992 unless the RNG is broken, and could result in information disclosure or
1180 mbedtls_ecdh_can_do() on each result to check whether each algorithm is
1515 of the decryption and not its result could nonetheless decrypt RSA
1700 This improves compliance to RFC 4492, and as a result, solves
2133 (server-side). Could result in application crash, but only if an ALPN
2376 Could result in DoS (application crash) or information leak
2404 reflect bad EC curves within verification result.
2408 a negative MPI. Previously the result was always negative. Found by Guido
2469 characters after the footer could result in the execution of an infinite
2836 result trying to unlock an unlocked mutex on invalid input (found by
3613 prototypes for the RSA sign and verify functions changed as a result
3801 * Fixed memory leak in RSA as a result of introduction of blinding
4344 identical interface (returning int result values)