Home
last modified time | relevance | path

Searched refs:messages (Results 1 – 14 of 14) sorted by relevance

/mbedtls-latest/
DSECURITY.md30 packets, as well as suppressing or delaying legitimate messages, and injecting
31 messages.
37 messages will arrive without delay, as the TLS protocol doesn't guarantee that
D.pylintrc53 # many messages that use formatting and are below the log level).
DChangeLog127 * Fix issue of redefinition warning messages for _GNU_SOURCE in
137 * Fix psa_cipher_decrypt() with CCM* rejecting messages less than 3 bytes
465 the attacker to send a large number of messages for decryption. For
1051 1024 messages. As such, it is not intended for use in TLS, but instead
1383 potentially leading to corrupted alert messages being sent in case
2024 the affected side to wrongly reject valid messages. Fixes #4118.
2678 SSLv2 ClientHello messages.
3308 * Zeroize memory used for buffering or reassembling handshake messages
3370 * Add support for fragmentation of outgoing DTLS handshake messages. This
3379 * Add support for buffering out-of-order handshake messages in DTLS.
[all …]
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c218 queue->messages = (size_t *) mbedtls_calloc(capacity, sizeof(size_t)); in mbedtls_test_ssl_message_queue_setup()
219 if (NULL == queue->messages) { in mbedtls_test_ssl_message_queue_setup()
237 if (queue->messages != NULL) { in mbedtls_test_ssl_message_queue_free()
238 mbedtls_free(queue->messages); in mbedtls_test_ssl_message_queue_free()
257 queue->messages[place] = len; in mbedtls_test_ssl_message_queue_push_info()
273 message_length = queue->messages[queue->pos]; in mbedtls_test_ssl_message_queue_pop_info()
274 queue->messages[queue->pos] = 0; in mbedtls_test_ssl_message_queue_pop_info()
309 *msg_len = queue->messages[queue->pos]; in test_ssl_message_queue_peek_info()
/mbedtls-latest/tests/scripts/
Drun-metatests.sh9 Expected output: a lot of scary-looking error messages, since each
/mbedtls-latest/library/
Dcmac.c827 const unsigned char *messages, in cmac_test_wth_cipher() argument
850 if ((ret = mbedtls_cipher_cmac(cipher_info, key, keybits, messages, in cmac_test_wth_cipher()
/mbedtls-latest/docs/architecture/
Dtls13-support.md405 context to prepare for the next incoming and outgoing messages. This stage is
407 as handshake messages checksum update.
429 context to prepare for the next incoming and outgoing messages. This stage is
/mbedtls-latest/tests/include/test/
Dssl_helpers.h144 size_t *messages; member
/mbedtls-latest/tests/suites/
Dtest_suite_debug.function40 /* Detect if debug messages output partial lines and mark them */
Dtest_suite_ssl.function382 * can send messages in both direction at the same time (with the I/O calls
806 /* Read three messages from the server, last one with an error */
916 /* Send two messages to the server, the second one small enough to fit in the
4692 * plus the first flight of client messages. Needed because we cannot
/mbedtls-latest/docs/
Dtls13-early-data.md43 data sent during the first flight of client messages while the handshake is in
Dpsa-transition.md132 | `error.h` | `mbedtls_*err*` | [Error messages](#error-messages) |
241 ### Error messages
243 At the time of writing, there is no equivalent to the error messages provided by `mbedtls_strerror`…
699 …de a hash algorithm. Sometimes the same key may need to be used to sign messages with multiple dif…
1321 … input or output format of several functions. In particular, one of the messages embeds the curve …
/mbedtls-latest/docs/architecture/psa-migration/
Dtesting.md21 However, when it comes to TLS, we also have the option of using debug messages
Dstrategy.md118 - MD for messages digests aka hashes (including HMAC)