Lines Matching refs:ClientHello
145 ClientHello in a TLS 1.3 server supporting some PSK key exchange mode. A
169 a TLS 1.2 ClientHello, resulting in a denial of service. Reported by
515 * In TLS 1.3, fix handshake failure when a client in its ClientHello
1091 first ClientHello was not suitable to the server.
1137 * Fix a buffer overread in DTLS ClientHello parsing in servers with
1482 * Drop support for parsing SSLv2 ClientHello
2414 * Abort the ClientHello writing function as soon as some extension doesn't
2417 buffer is not large enough to hold the ClientHello.
2483 SSLv2 ClientHello messages.
4501 * Support for receiving SSLv2 ClientHello is now disabled by default at
4719 * Remotely-triggerable memory leak when parsing crafted ClientHello
4795 * Stricter check on SSL ClientHello internal sizes compared to actual packet
4851 * Improve interoperability by not writing extension length in ClientHello /
5281 * Improve interoperability by not writing extension length in ClientHello
5288 * Stricter check on SSL ClientHello internal sizes compared to actual packet
5964 not be swapped in the SSLv2 ClientHello (found by Greg Robson)