Lines Matching refs:DTLS

1080    * Add support for DTLS Connection ID as defined by RFC 9146, controlled by
1093 * Fix potential heap buffer overread and overwrite in DTLS if
1332 * Fix a buffer overread in DTLS ClientHello parsing in servers with
1334 or a man-in-the-middle could cause a DTLS server to read up to 255 bytes
1387 MBEDTLS_DEBUG_C, DTLS handshakes using CID would crash due to a null
1423 on DTLS 1.2 session resumption. After DTLS 1.2 session resumption with
1534 man-in-the-middle to inject fake ciphertext into a DTLS connection.
1864 * Remove support for TLS 1.0, TLS 1.1 and DTLS 1.0, as well as support for
2067 * Fix the setting of the read timeout in the DTLS sample programs.
2269 * Add support for DTLS-SRTP as defined in RFC 5764. Contributed by Johan
2638 * Fix issue in DTLS handling of new associations with the same parameters
2650 DTLS client when parsing the Hello Verify Request message.
2782 * Fix an unused variable warning when compiling without DTLS.
2979 The Connection ID extension allows to keep DTLS connections beyond the
2981 to the DTLS record header. This identifier can be used to associated an
3324 * Add tests for session resumption in DTLS.
3370 * Add support for fragmentation of outgoing DTLS handshake messages. This
3379 * Add support for buffering out-of-order handshake messages in DTLS.
3434 exploiting timing measurements. With DTLS, the attacker could perform
3600 offer or a ciphersuite that cannot be used with the TLS or DTLS version
3796 both TLS and DTLS. CVE-2018-0488
3900 * Fix ssl_parse_record_header() to silently discard invalid DTLS records
4193 renegotiation routines at unexpected times when the protocol is DTLS. Found
4286 ssl_parse_hello_verify_request() for DTLS. Found by Guido Vranken.
4380 with some peers over unreliable links. Avoid dropping an entire DTLS
4558 * Support for DTLS 1.0 and 1.2 (RFC 6347).
4725 * DTLS no longer hard-depends on TIMING_C, but uses a callback interface