Searched refs:messages (Results 1 – 14 of 14) sorted by relevance
/mbedtls-latest/ |
D | SECURITY.md | 30 packets, as well as suppressing or delaying legitimate messages, and injecting 31 messages. 37 messages will arrive without delay, as the TLS protocol doesn't guarantee that
|
D | .pylintrc | 53 # many messages that use formatting and are below the log level).
|
D | ChangeLog | 127 * Fix issue of redefinition warning messages for _GNU_SOURCE in 137 * Fix psa_cipher_decrypt() with CCM* rejecting messages less than 3 bytes 465 the attacker to send a large number of messages for decryption. For 1051 1024 messages. As such, it is not intended for use in TLS, but instead 1383 potentially leading to corrupted alert messages being sent in case 2024 the affected side to wrongly reject valid messages. Fixes #4118. 2678 SSLv2 ClientHello messages. 3308 * Zeroize memory used for buffering or reassembling handshake messages 3370 * Add support for fragmentation of outgoing DTLS handshake messages. This 3379 * Add support for buffering out-of-order handshake messages in DTLS. [all …]
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 218 queue->messages = (size_t *) mbedtls_calloc(capacity, sizeof(size_t)); in mbedtls_test_ssl_message_queue_setup() 219 if (NULL == queue->messages) { in mbedtls_test_ssl_message_queue_setup() 237 if (queue->messages != NULL) { in mbedtls_test_ssl_message_queue_free() 238 mbedtls_free(queue->messages); in mbedtls_test_ssl_message_queue_free() 257 queue->messages[place] = len; in mbedtls_test_ssl_message_queue_push_info() 273 message_length = queue->messages[queue->pos]; in mbedtls_test_ssl_message_queue_pop_info() 274 queue->messages[queue->pos] = 0; in mbedtls_test_ssl_message_queue_pop_info() 309 *msg_len = queue->messages[queue->pos]; in test_ssl_message_queue_peek_info()
|
/mbedtls-latest/tests/scripts/ |
D | run-metatests.sh | 9 Expected output: a lot of scary-looking error messages, since each
|
/mbedtls-latest/library/ |
D | cmac.c | 827 const unsigned char *messages, in cmac_test_wth_cipher() argument 850 if ((ret = mbedtls_cipher_cmac(cipher_info, key, keybits, messages, in cmac_test_wth_cipher()
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 405 context to prepare for the next incoming and outgoing messages. This stage is 407 as handshake messages checksum update. 429 context to prepare for the next incoming and outgoing messages. This stage is
|
/mbedtls-latest/tests/include/test/ |
D | ssl_helpers.h | 144 size_t *messages; member
|
/mbedtls-latest/tests/suites/ |
D | test_suite_debug.function | 40 /* Detect if debug messages output partial lines and mark them */
|
D | test_suite_ssl.function | 382 * can send messages in both direction at the same time (with the I/O calls 806 /* Read three messages from the server, last one with an error */ 916 /* Send two messages to the server, the second one small enough to fit in the 4692 * plus the first flight of client messages. Needed because we cannot
|
/mbedtls-latest/docs/ |
D | tls13-early-data.md | 43 data sent during the first flight of client messages while the handshake is in
|
D | psa-transition.md | 132 | `error.h` | `mbedtls_*err*` | [Error messages](#error-messages) | 241 ### Error messages 243 At the time of writing, there is no equivalent to the error messages provided by `mbedtls_strerror`… 699 …de a hash algorithm. Sometimes the same key may need to be used to sign messages with multiple dif… 1321 … input or output format of several functions. In particular, one of the messages embeds the curve …
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | testing.md | 21 However, when it comes to TLS, we also have the option of using debug messages
|
D | strategy.md | 118 - MD for messages digests aka hashes (including HMAC)
|