Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 14 of 14) sorted by relevance

/ssl/
A Dssl_session.cc147 !new_session->ticket.CopyFrom(session->ticket)) { in SSL_SESSION_dup()
449 return session->ticket.empty() ? SSLSessionType::kNotResumable in ssl_session_get_type()
452 if (!session->ticket.empty()) { in ssl_session_get_type()
591 CBS ticket; in ssl_get_prev_session() local
594 ssl_client_hello_get_extension(client_hello, &ticket, in ssl_get_prev_session()
596 if (tickets_supported && CBS_len(&ticket) != 0) { in ssl_get_prev_session()
598 hs, &session, &renew_ticket, ticket, in ssl_get_prev_session()
964 return !session->ticket.empty(); in SSL_SESSION_has_ticket()
970 *out_ticket = session->ticket.data(); in SSL_SESSION_get0_ticket()
972 *out_len = session->ticket.size(); in SSL_SESSION_get0_ticket()
[all …]
A Dextensions.cc931 Span<const uint8_t> ticket; in ext_ticket_add_clienthello() local
935 ticket = ssl->session->ticket; in ext_ticket_add_clienthello()
941 !CBB_add_bytes(&ticket_cbb, ticket.data(), ticket.size()) || in ext_ticket_add_clienthello()
1928 !CBB_add_bytes(&ticket, ssl->session->ticket.data(), in ext_pre_shared_key_add_clienthello()
4263 Span<const uint8_t> ticket) { in decrypt_ticket_with_cipher_ctx() argument
4275 ticket = ticket.first(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx()
4276 HMAC_Update(hmac_ctx, ticket.data(), ticket.size()); in decrypt_ticket_with_cipher_ctx()
4317 Span<const uint8_t> ticket) { in ssl_decrypt_ticket_with_cb() argument
4384 Span<const uint8_t> ticket) { in ssl_decrypt_ticket_with_method() argument
4394 ticket.data(), ticket.size()); in ssl_decrypt_ticket_with_method()
[all …]
A Dtls13_server.cc202 CBB body, nonce_cbb, ticket, extensions; in add_new_session_tickets() local
210 !CBB_add_u16_length_prefixed(&body, &ticket) || in add_new_session_tickets()
211 !ssl_encrypt_ticket(hs, &ticket, session.get())) { in add_new_session_tickets()
215 if (CBB_len(&ticket) == 0) { in add_new_session_tickets()
425 CBS ticket, binders; in select_session() local
428 hs, &ticket, &binders, &client_ticket_age, out_alert, client_hello, in select_session()
449 ssl_process_ticket(hs, &session, &unused_renew, ticket, {}); in select_session()
863 CBS ticket, binders; in do_read_second_client_hello() local
867 hs, &ticket, &binders, &client_ticket_age, &alert, &client_hello, in do_read_second_client_hello()
A Dtls13_client.cc1166 CBS ticket_nonce, ticket, extensions; in tls13_create_session_with_ticket() local
1170 !CBS_get_u16_length_prefixed(body, &ticket) || in tls13_create_session_with_ticket()
1171 CBS_len(&ticket) == 0 || // in tls13_create_session_with_ticket()
1172 !session->ticket.CopyFrom(ticket) || in tls13_create_session_with_ticket()
1231 SHA256(CBS_data(&ticket), CBS_len(&ticket), session->session_id.data()); in tls13_create_session_with_ticket()
A Dssl_asn1.cc208 if (!in->ticket.empty() && !for_ticket) { in SSL_SESSION_to_bytes_full()
210 !CBB_add_asn1_octet_string(&child, in->ticket.data(), in SSL_SESSION_to_bytes_full()
211 in->ticket.size())) { in SSL_SESSION_to_bytes_full()
547 !SSL_SESSION_parse_octet_string(&session, &ret->ticket, kTicketTag)) { in SSL_SESSION_parse()
A Dhandshake_client.cc1694 CBS new_session_ticket = msg.body, ticket; in do_read_session_ticket() local
1697 !CBS_get_u16_length_prefixed(&new_session_ticket, &ticket) || in do_read_session_ticket()
1704 if (CBS_len(&ticket) == 0) { in do_read_session_ticket()
1729 if (!hs->new_session->ticket.CopyFrom(ticket)) { in do_read_session_ticket()
1737 SHA256(CBS_data(&ticket), CBS_len(&ticket), in do_read_session_ticket()
A Dhandoff.cc1039 cert_compression, server_random_tls12, ecdhe, ticket; in SSL_set_handshake_hints() local
1058 !CBS_get_optional_asn1(&seq, &ticket, &has_ticket, kDecryptedTicketTag) || in SSL_set_handshake_hints()
1147 if (has_ticket && !hints_obj->decrypted_ticket.CopyFrom(ticket)) { in SSL_set_handshake_hints()
A Dhandshake_server.cc1693 CBB body, ticket; in do_send_server_finished() local
1697 !CBB_add_u16_length_prefixed(&body, &ticket) || in do_send_server_finished()
1698 !ssl_encrypt_ticket(hs, &ticket, session) || in do_send_server_finished()
A Dinternal.h3634 bool *out_renew_ticket, Span<const uint8_t> ticket,
4177 bssl::Array<uint8_t> ticket; member
A Dssl_test.cc1144 std::vector<uint8_t> ticket(ticket_len, 'a'); in CreateSessionWithTicket() local
1149 !SSL_SESSION_set_ticket(session.get(), ticket.data(), ticket.size())) { in CreateSessionWithTicket()
3831 const uint8_t *ticket; in GetServerTicketTime() local
3833 SSL_SESSION_get0_ticket(session, &ticket, &ticket_len); in GetServerTicketTime()
3838 const uint8_t *ciphertext = ticket + 16 + 16; in GetServerTicketTime()
3843 const uint8_t *iv = ticket + 16; in GetServerTicketTime()
10406 session->ticket.Reset(); in TEST()
/ssl/test/runner/
A Dhandshake_server.go616 ticket: hs.clientHello.sessionTicket,
631 sessionState, ok := c.decryptTicket(pskIdentity.ticket)
878 for len(oldPSKIdentities) > 0 && !bytes.Equal(oldPSKIdentities[0].ticket, identity.ticket) {
893 ticket := hs.clientHello.pskIdentities[pskIndex].ticket
895 if bytes.Equal(identity.ticket, ticket) {
1800 ticket := hs.clientHello.sessionTicket
1801 if len(ticket) == 0 && len(hs.clientHello.pskIdentities) > 0 && c.config.Bugs.AcceptAnySession {
1802 ticket = hs.clientHello.pskIdentities[0].ticket
1804 if len(ticket) > 0 {
1810 if hs.sessionState, ok = c.decryptTicket(ticket); !ok {
[all …]
A Dhandshake_client.go768 ticket := session.sessionTicket
769 if c.config.Bugs.FilterTicket != nil && len(ticket) > 0 {
771 ticket = make([]byte, len(session.sessionTicket))
772 copy(ticket, session.sessionTicket)
774 ticket, err = c.config.Bugs.FilterTicket(ticket)
788 ticket: ticket,
799 if ticket != nil {
800 hello.sessionTicket = ticket
1578 for _, ticket := range deferredTickets {
1579 if err := c.processTLS13NewSessionTicket(ticket, hs.suite); err != nil {
[all …]
A Dhandshake_messages.go59 ticket []uint8 member
642 addUint16LengthPrefixedBytes(pskIdentities, psk.ticket)
997 if !readUint16LengthPrefixedBytes(&psks, &psk.ticket) ||
2726 ticket []byte member
2754 addUint16LengthPrefixedBytes(body, m.ticket)
2803 if !readUint16LengthPrefixedBytes(&reader, &m.ticket) ||
2804 (version >= VersionTLS13 && len(m.ticket) == 0) {
A Dconn.go1620 sessionTicket: newSessionTicket.ticket,
2078 m.ticket, err = c.encryptTicket(&state)

Completed in 86 milliseconds