Lines Matching refs:client

27      MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled. An unauthenticated client
41 client would fail to check that the curve selected by the server for
42 ECDHE was indeed one that was offered. As a result, the client would
85 connection identifier, the Mbed TLS client now properly sends the server
307 * In a TLS client, enforce the Diffie-Hellman minimum parameter size
524 the PSA code needed by a PSA crypto client when the PSA crypto
954 DTLS client when parsing the Hello Verify Request message.
1128 from modifying the client/server hello.
1168 the parent process closes the client socket and continue accepting, and
1169 the child process closes the listening socket and handles the client
1328 client programs to fail at the peer's certificate verification
1564 implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
1565 including client authentication).
1629 * Close a test gap in (D)TLS between the client side and the server side:
1630 test the handling of large packets and small packets on the client side
1902 * Fix a client-side bug in the validation of the server's ciphersuite choice
1903 which could potentially lead to the client accepting a ciphersuite it didn't
2375 The issue could only happen client-side with renegotiation enabled.
2593 * Fix compatibility issue with Internet Explorer client authentication,
2594 where the limited hash choices prevented the client from sending its
2765 * Fix potential heap buffer overflow in servers that perform client
2767 unless you allow third parties to pick trust CAs for client auth.
2787 * Fix possible client-side NULL pointer dereference (read) when the client
2800 * When a client initiates a reconnect from the same port as a live
2839 * Fix memory corruption on client with overlong PSK identity, around
3111 * Fix bug related to ssl_set_curves(): the client didn't check that the
3142 client certificate) (found using Codenomicon Defensics).
3144 (TLS server is not affected if it doesn't ask for a client certificate)
3147 (TLS server is not affected if it doesn't ask for a client certificate)
3207 * Example programs for SSL client and server now disable SSLv3 by default.
3208 * Example programs for SSL client and server now disable RC4 by default.
3216 (server is not affected if it doesn't ask for a client certificate)
3232 renegotation was pending, and on client when a HelloRequest was received.
3261 It was possible to crash the server (and client) using crafted messages
3286 strongest offered by client.
3462 client certificate.
3463 * ssl_srv was leaking memory when client presented a timed out ticket
3464 containing a client certificate
3494 * Support for adhering to client ciphersuite order preference
3545 * Server does not send out extensions not advertised by client
3642 * Fix potential invalid memory read in the server, that allows a client to
3645 client to crash the server remotely if client authentication is enabled
3665 for a client certificate) (found using Codenomicon Defensics).
3667 (TLS server is not affected if it doesn't ask for a client certificate)
3670 (TLS server is not affected if it doesn't ask for a client certificate)
3673 (TLS server is not affected if it doesn't ask for a client certificate).
3703 (server is not affected if it doesn't ask for a client certificate).
3716 renegotation was pending, and on client when a HelloRequest was received.
3750 It was possible to crash the server (and client) using crafted messages
3839 * Secure renegotiation extension should only be sent in case client
3917 * Correctly handle CertificateRequest message in client for <= TLS 1.1
3931 * Fixed client authentication compatibility
4099 * Fixed potential memory corruption on miscrafted client messages (found by
4262 * Do not bail out if no client certificate specified. Try
4477 * Added support on the client side for the TLS "hostname" extension
4486 serial number, setup correct server port in the ssl client example
4505 message digests, which fixes IE6/IE7 client authentication
4559 * Implemented session resuming and client authentication
4573 generated) and in ssl_parse_client_hello (max. client