Lines Matching refs:heap

234    * Use heap memory to allocate DER encoded public/private key.
276 the buffer, causing a heap buffer overflow.
466 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
561 * Use heap memory to allocate DER encoded RSA private key.
680 * Fix a potential heap buffer overread in TLS 1.3 client-side when
898 * Fix potential heap buffer overread and overwrite in DTLS if
1125 could thus potentially leak the key through freed heap.
1132 * Fix a potential heap buffer overread in TLS 1.2 server-side when
1260 temporary variable on the heap. Suggested by Sergey Kanatov in #5304.
3579 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
3596 * Fix a heap corruption issue in the implementation of the truncated HMAC
3599 6 bytes on the peer's heap, which could potentially lead to crash or remote
3610 * Fix a potential heap buffer overflow in mbedtls_ssl_write(). When the (by
3633 * Fix a potential heap buffer over-read in ALPN extension parsing
3875 * Fixed unlimited overread of heap-based buffer in mbedtls_ssl_read().
4011 * Fixed heap overreads in mbedtls_x509_get_time(). Found by Peng
4196 * Fix potential heap corruption on Windows when
4241 * Added fix for CVE-2015-5291 to prevent heap corruption due to buffer
4260 * Fix possible heap buffer overflow in base64_encoded() when the input
4266 * Fix potential heap buffer overflow in servers that perform client
4566 * The benchmark program also prints heap usage for public-key primitives
4568 * New script ecc-heap.sh helps measuring the impact of ECC parameters on
4569 speed and RAM (heap only for now) usage.
5316 * Fixed potential heap buffer overflow on large hostname setting
5500 * Fixed potential heap corruption in x509_name allocation
5526 * Potential heap buffer overflow on large hostname setting
5587 * Fixed potential heap corruption in x509_name allocation
5950 * Fixed dangerous bug that can cause a heap overflow in