Lines Matching refs:fault
3590 * Fixed segmentation fault in SSL_check_chain()
7213 various sizes and potentially cause a segmentation fault, resulting in
7289 fault will be triggered, thus enabling a potential DoS attack.
7296 * Segmentation fault in DTLSv1_listen fix
7303 that can lead to a segmentation fault. Errors processing the initial
7313 * Segmentation fault in ASN1_TYPE_cmp fix
7325 * Segmentation fault for invalid PSS parameters fix
7383 If client auth is used then a server can seg fault in the event of a DHE
8384 various sizes and potentially cause a segmentation fault, resulting in
8441 * Segmentation fault in ASN1_TYPE_cmp fix
8531 * Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS
8532 message can cause a segmentation fault in OpenSSL due to a NULL pointer
9457 various sizes and potentially cause a segmentation fault, resulting in
9506 * Segmentation fault in ASN1_TYPE_cmp fix
9596 * Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS
9597 message can cause a segmentation fault in OpenSSL due to a NULL pointer
13260 has chosen to ignore this fault)