Lines Matching refs:handshake
462 * during the TLS handshake.
965 dropped. As a consequence, the TLS handshake now fails when the output
1320 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes,
1343 * Extend the MBEDTLS_SSL_EXPORT_KEYS to export the handshake randbytes,
1662 * Zeroize memory used for buffering or reassembling handshake messages
1724 * Add support for fragmentation of outgoing DTLS handshake messages. This
1729 handshake when flights do not get through (RFC 6347, section 4.1.1.1,
1733 * Add support for buffering out-of-order handshake messages in DTLS.
1756 * Fix a bug that caused SSL/TLS clients to incorrectly abort the handshake
1777 * Add support for buffering of out-of-order handshake messages.
2105 In the context of SSL, this resulted in handshake failure. Reported by
2288 * Fix handling of handshake messages in mbedtls_ssl_read() in case
2294 * Add size-checks for record and handshake message content, securing
2320 * Fix status handshake status message in programs/ssl/dtls_client.c. Found
2353 (the default), the handshake was correctly aborted).
2376 * With authmode set to optional, the TLS handshake is now aborted if the
2721 * Disable MD5 handshake signatures in TLS 1.2 by default to prevent the
2838 tries to continue the handshake after it failed (a misuse of the API).
2856 handshake with the same context. (See RFC 6347 section 4.2.8.)
3143 ssl_write() is called before the handshake is finished (introduced in
3236 * ssl_get_verify_result() now works even if the handshake was aborted due
3488 "triple handshake" attack when authentication mode is 'optional' (the
3735 * ssl_get_verify_result() now works even if the handshake was aborted due
3793 "triple handshake" attack when authentication mode is optional (the
3962 * Added ssl_handshake_step() to allow single stepping the handshake process
4261 after the handshake.
4554 * Fixed ssl_read_record() to properly update the handshake