Lines Matching refs:ticket
49 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
50 This could lead to a buffer overflow, but only in case ticket authentication
161 * Fix a bug in the update function for SSL ticket keys which previously
1301 overflow of the hostname or session ticket. Found by Guido Vranken,
2020 send() would return an EAGAIN error when sending the ticket.
2023 * ssl_srv was leaking memory when client presented a timed out ticket
2545 to not match CN if subjectAltName extension is present (Closes ticket #56)
2560 * Fixed single RSA test that failed on Big Endian systems (Closes ticket #54)
2561 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
2627 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
2647 * Fixed single RSA test that failed on Big Endian systems (Closes ticket #54)
2667 (Closes ticket #47, found by Hugo Leisink)
2668 * Fixed issues with Intel compiler on 64-bit systems (Closes ticket #50)
2679 (Closes ticket #36)
2681 introspection functions (Closes ticket #40)
2690 encryption and private key for decryption. (Closes ticket #34)
2697 parity bits, to prevent mistakes in copying data. (Closes ticket #33)
2703 management (Closes ticket #44)
2716 ticket #37)
2720 standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
2722 smaller than the hash length. (Closes ticket #41)
2783 with random data (Fixed ticket #10)
2794 platform (32-bit / 64-bit) (Fixes ticket #19, found by Mads
2796 * Fixed bug in ssl_write() when flushing old data (Fixed ticket
2805 are now supported as well (Fixes ticket #5)
2811 ticket #13). Also possible to remove PEM support for
2823 to negotiate anonymous connection (Fixes ticket #12,