Lines Matching refs:ticket
1451 the peer CRT chain and session ticket twice.
1521 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
1522 This could lead to a buffer overflow, but only in case ticket authentication
1651 * Fix a bug in the update function for SSL ticket keys which previously
2791 overflow of the hostname or session ticket. Found by Guido Vranken,
3510 send() would return an EAGAIN error when sending the ticket.
3513 * ssl_srv was leaking memory when client presented a timed out ticket
4035 to not match CN if subjectAltName extension is present (Closes ticket #56)
4050 * Fixed single RSA test that failed on Big Endian systems (Closes ticket #54)
4051 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
4117 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
4137 * Fixed single RSA test that failed on Big Endian systems (Closes ticket #54)
4157 (Closes ticket #47, found by Hugo Leisink)
4158 * Fixed issues with Intel compiler on 64-bit systems (Closes ticket #50)
4169 (Closes ticket #36)
4171 introspection functions (Closes ticket #40)
4180 encryption and private key for decryption. (Closes ticket #34)
4187 parity bits, to prevent mistakes in copying data. (Closes ticket #33)
4193 management (Closes ticket #44)
4206 ticket #37)
4210 standard 1 byte version sometimes used by Microsoft. (Closes ticket #38)
4212 smaller than the hash length. (Closes ticket #41)
4273 with random data (Fixed ticket #10)
4284 platform (32-bit / 64-bit) (Fixes ticket #19, found by Mads
4286 * Fixed bug in ssl_write() when flushing old data (Fixed ticket
4295 are now supported as well (Fixes ticket #5)
4301 ticket #13). Also possible to remove PEM support for
4313 to negotiate anonymous connection (Fixes ticket #12,