/ssl/ |
A D | ssl_session.cc | 147 !new_session->ticket.CopyFrom(session->ticket)) { in SSL_SESSION_dup() 449 return session->ticket.empty() ? SSLSessionType::kNotResumable in ssl_session_get_type() 452 if (!session->ticket.empty()) { in ssl_session_get_type() 591 CBS ticket; in ssl_get_prev_session() local 594 ssl_client_hello_get_extension(client_hello, &ticket, in ssl_get_prev_session() 596 if (tickets_supported && CBS_len(&ticket) != 0) { in ssl_get_prev_session() 598 hs, &session, &renew_ticket, ticket, in ssl_get_prev_session() 964 return !session->ticket.empty(); in SSL_SESSION_has_ticket() 970 *out_ticket = session->ticket.data(); in SSL_SESSION_get0_ticket() 972 *out_len = session->ticket.size(); in SSL_SESSION_get0_ticket() [all …]
|
A D | extensions.cc | 931 Span<const uint8_t> ticket; in ext_ticket_add_clienthello() local 935 ticket = ssl->session->ticket; in ext_ticket_add_clienthello() 941 !CBB_add_bytes(&ticket_cbb, ticket.data(), ticket.size()) || in ext_ticket_add_clienthello() 1928 !CBB_add_bytes(&ticket, ssl->session->ticket.data(), in ext_pre_shared_key_add_clienthello() 4263 Span<const uint8_t> ticket) { in decrypt_ticket_with_cipher_ctx() argument 4275 ticket = ticket.first(ticket.size() - mac_len); in decrypt_ticket_with_cipher_ctx() 4276 HMAC_Update(hmac_ctx, ticket.data(), ticket.size()); in decrypt_ticket_with_cipher_ctx() 4317 Span<const uint8_t> ticket) { in ssl_decrypt_ticket_with_cb() argument 4384 Span<const uint8_t> ticket) { in ssl_decrypt_ticket_with_method() argument 4394 ticket.data(), ticket.size()); in ssl_decrypt_ticket_with_method() [all …]
|
A D | tls13_server.cc | 202 CBB body, nonce_cbb, ticket, extensions; in add_new_session_tickets() local 210 !CBB_add_u16_length_prefixed(&body, &ticket) || in add_new_session_tickets() 211 !ssl_encrypt_ticket(hs, &ticket, session.get())) { in add_new_session_tickets() 215 if (CBB_len(&ticket) == 0) { in add_new_session_tickets() 425 CBS ticket, binders; in select_session() local 428 hs, &ticket, &binders, &client_ticket_age, out_alert, client_hello, in select_session() 449 ssl_process_ticket(hs, &session, &unused_renew, ticket, {}); in select_session() 863 CBS ticket, binders; in do_read_second_client_hello() local 867 hs, &ticket, &binders, &client_ticket_age, &alert, &client_hello, in do_read_second_client_hello()
|
A D | tls13_client.cc | 1166 CBS ticket_nonce, ticket, extensions; in tls13_create_session_with_ticket() local 1170 !CBS_get_u16_length_prefixed(body, &ticket) || in tls13_create_session_with_ticket() 1171 CBS_len(&ticket) == 0 || // in tls13_create_session_with_ticket() 1172 !session->ticket.CopyFrom(ticket) || in tls13_create_session_with_ticket() 1231 SHA256(CBS_data(&ticket), CBS_len(&ticket), session->session_id.data()); in tls13_create_session_with_ticket()
|
A D | ssl_asn1.cc | 208 if (!in->ticket.empty() && !for_ticket) { in SSL_SESSION_to_bytes_full() 210 !CBB_add_asn1_octet_string(&child, in->ticket.data(), in SSL_SESSION_to_bytes_full() 211 in->ticket.size())) { in SSL_SESSION_to_bytes_full() 547 !SSL_SESSION_parse_octet_string(&session, &ret->ticket, kTicketTag)) { in SSL_SESSION_parse()
|
A D | handshake_client.cc | 1694 CBS new_session_ticket = msg.body, ticket; in do_read_session_ticket() local 1697 !CBS_get_u16_length_prefixed(&new_session_ticket, &ticket) || in do_read_session_ticket() 1704 if (CBS_len(&ticket) == 0) { in do_read_session_ticket() 1729 if (!hs->new_session->ticket.CopyFrom(ticket)) { in do_read_session_ticket() 1737 SHA256(CBS_data(&ticket), CBS_len(&ticket), in do_read_session_ticket()
|
A D | handoff.cc | 1039 cert_compression, server_random_tls12, ecdhe, ticket; in SSL_set_handshake_hints() local 1058 !CBS_get_optional_asn1(&seq, &ticket, &has_ticket, kDecryptedTicketTag) || in SSL_set_handshake_hints() 1147 if (has_ticket && !hints_obj->decrypted_ticket.CopyFrom(ticket)) { in SSL_set_handshake_hints()
|
A D | handshake_server.cc | 1693 CBB body, ticket; in do_send_server_finished() local 1697 !CBB_add_u16_length_prefixed(&body, &ticket) || in do_send_server_finished() 1698 !ssl_encrypt_ticket(hs, &ticket, session) || in do_send_server_finished()
|
A D | internal.h | 3634 bool *out_renew_ticket, Span<const uint8_t> ticket, 4177 bssl::Array<uint8_t> ticket; member
|
A D | ssl_test.cc | 1144 std::vector<uint8_t> ticket(ticket_len, 'a'); in CreateSessionWithTicket() local 1149 !SSL_SESSION_set_ticket(session.get(), ticket.data(), ticket.size())) { in CreateSessionWithTicket() 3831 const uint8_t *ticket; in GetServerTicketTime() local 3833 SSL_SESSION_get0_ticket(session, &ticket, &ticket_len); in GetServerTicketTime() 3838 const uint8_t *ciphertext = ticket + 16 + 16; in GetServerTicketTime() 3843 const uint8_t *iv = ticket + 16; in GetServerTicketTime() 10406 session->ticket.Reset(); in TEST()
|
/ssl/test/runner/ |
A D | handshake_server.go | 616 ticket: hs.clientHello.sessionTicket, 631 sessionState, ok := c.decryptTicket(pskIdentity.ticket) 878 for len(oldPSKIdentities) > 0 && !bytes.Equal(oldPSKIdentities[0].ticket, identity.ticket) { 893 ticket := hs.clientHello.pskIdentities[pskIndex].ticket 895 if bytes.Equal(identity.ticket, ticket) { 1800 ticket := hs.clientHello.sessionTicket 1801 if len(ticket) == 0 && len(hs.clientHello.pskIdentities) > 0 && c.config.Bugs.AcceptAnySession { 1802 ticket = hs.clientHello.pskIdentities[0].ticket 1804 if len(ticket) > 0 { 1810 if hs.sessionState, ok = c.decryptTicket(ticket); !ok { [all …]
|
A D | handshake_client.go | 768 ticket := session.sessionTicket 769 if c.config.Bugs.FilterTicket != nil && len(ticket) > 0 { 771 ticket = make([]byte, len(session.sessionTicket)) 772 copy(ticket, session.sessionTicket) 774 ticket, err = c.config.Bugs.FilterTicket(ticket) 788 ticket: ticket, 799 if ticket != nil { 800 hello.sessionTicket = ticket 1578 for _, ticket := range deferredTickets { 1579 if err := c.processTLS13NewSessionTicket(ticket, hs.suite); err != nil { [all …]
|
A D | handshake_messages.go | 59 ticket []uint8 member 642 addUint16LengthPrefixedBytes(pskIdentities, psk.ticket) 997 if !readUint16LengthPrefixedBytes(&psks, &psk.ticket) || 2726 ticket []byte member 2754 addUint16LengthPrefixedBytes(body, m.ticket) 2803 if !readUint16LengthPrefixedBytes(&reader, &m.ticket) || 2804 (version >= VersionTLS13 && len(m.ticket) == 0) {
|
A D | conn.go | 1620 sessionTicket: newSessionTicket.ticket, 2078 m.ticket, err = c.encryptTicket(&state)
|