Searched refs:ticket (Results 1 – 7 of 7) sorted by relevance
/mbedtls-development/library/ |
A D | ssl_ticket.c | 306 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local 345 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse() 346 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse() 361 if( ( ret = mbedtls_ssl_session_load( session, ticket, clear_len ) ) != 0 ) in mbedtls_ssl_ticket_parse()
|
A D | ssl_cli.c | 635 if( ssl->session_negotiate->ticket == NULL || tlen == 0 ) in ssl_write_session_ticket_ext() 641 memcpy( p, ssl->session_negotiate->ticket, tlen ); in ssl_write_session_ticket_ext() 1031 if( ssl->session_negotiate->ticket != NULL && in ssl_write_client_hello() 4068 unsigned char *ticket; in ssl_parse_new_session_ticket() local 4138 mbedtls_platform_zeroize( ssl->session->ticket, in ssl_parse_new_session_ticket() 4140 mbedtls_free( ssl->session->ticket ); in ssl_parse_new_session_ticket() 4141 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket() 4147 mbedtls_free( ssl->session_negotiate->ticket ); in ssl_parse_new_session_ticket() 4148 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket() 4159 memcpy( ticket, msg + 6, ticket_len ); in ssl_parse_new_session_ticket() [all …]
|
A D | ssl_tls.c | 225 if( src->ticket != NULL ) in mbedtls_ssl_session_copy() 227 dst->ticket = mbedtls_calloc( 1, src->ticket_len ); in mbedtls_ssl_session_copy() 228 if( dst->ticket == NULL ) in mbedtls_ssl_session_copy() 231 memcpy( dst->ticket, src->ticket, src->ticket_len ); in mbedtls_ssl_session_copy() 4804 if( session->ticket != NULL ) in ssl_session_save_tls12() 4806 memcpy( p, session->ticket, session->ticket_len ); in ssl_session_save_tls12() 4980 session->ticket = NULL; in ssl_session_load_tls12() 5067 session->ticket = mbedtls_calloc( 1, session->ticket_len ); in ssl_session_load_tls12() 5068 if( session->ticket == NULL ) in ssl_session_load_tls12() 5071 memcpy( session->ticket, p, session->ticket_len ); in ssl_session_load_tls12() [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ssl.data | 6113 Session serialization, save-load: no ticket, no cert 6116 Session serialization, save-load: small ticket, no cert 6120 Session serialization, save-load: large ticket, no cert 6124 Session serialization, save-load: no ticket, cert 6128 Session serialization, save-load: small ticket, cert 6132 Session serialization, save-load: large ticket, cert 6136 Session serialization, load-save: no ticket, no cert 6139 Session serialization, load-save: small ticket, no cert 6147 Session serialization, load-save: no ticket, cert 6151 Session serialization, load-save: small ticket, cert [all …]
|
A D | test_suite_ssl.function | 1498 session->ticket = mbedtls_calloc( 1, ticket_len ); 1499 if( session->ticket == NULL ) 1501 memset( session->ticket, 33, ticket_len ); 4167 TEST_ASSERT( original.ticket != NULL ); 4168 TEST_ASSERT( restored.ticket != NULL ); 4169 TEST_ASSERT( memcmp( original.ticket, 4170 restored.ticket, original.ticket_len ) == 0 );
|
/mbedtls-development/ |
A D | ChangeLog | 1451 the peer CRT chain and session ticket twice. 4157 (Closes ticket #47, found by Hugo Leisink) 4169 (Closes ticket #36) 4171 introspection functions (Closes ticket #40) 4193 management (Closes ticket #44) 4206 ticket #37) 4212 smaller than the hash length. (Closes ticket #41) 4273 with random data (Fixed ticket #10) 4295 are now supported as well (Fixes ticket #5) 4301 ticket #13). Also possible to remove PEM support for [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | ssl.h | 1141 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */
|
Completed in 44 milliseconds