Searched refs:ticket_len (Results 1 – 5 of 5) sorted by relevance
/mbedtls-development/programs/ssl/ |
A D | ssl_context_info.c | 582 uint32_t cert_len, ticket_len; in print_deserialized_ssl_session() local 744 ticket_len = ( (uint32_t) ssl[0] << 16 ) | in print_deserialized_ssl_session() 748 printf_dbg( "Ticket length: %u\n", ticket_len ); in print_deserialized_ssl_session() 750 if( ticket_len > 0 ) in print_deserialized_ssl_session() 753 CHECK_SSL_END( ticket_len ); in print_deserialized_ssl_session() 754 print_hex( ssl, ticket_len, 22, "\t" ); in print_deserialized_ssl_session() 755 ssl += ticket_len; in print_deserialized_ssl_session()
|
/mbedtls-development/library/ |
A D | ssl_cli.c | 614 size_t tlen = ssl->session_negotiate->ticket_len; in ssl_write_session_ticket_ext() 1032 ssl->session_negotiate->ticket_len != 0 ) in ssl_write_client_hello() 4067 size_t ticket_len; in ssl_parse_new_session_ticket() local 4113 ticket_len = ( msg[4] << 8 ) | ( msg[5] ); in ssl_parse_new_session_ticket() 4133 if( ticket_len == 0 ) in ssl_parse_new_session_ticket() 4139 ssl->session->ticket_len ); in ssl_parse_new_session_ticket() 4142 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket() 4149 ssl->session_negotiate->ticket_len = 0; in ssl_parse_new_session_ticket() 4151 if( ( ticket = mbedtls_calloc( 1, ticket_len ) ) == NULL ) in ssl_parse_new_session_ticket() 4159 memcpy( ticket, msg + 6, ticket_len ); in ssl_parse_new_session_ticket() [all …]
|
A D | ssl_tls.c | 227 dst->ticket = mbedtls_calloc( 1, src->ticket_len ); in mbedtls_ssl_session_copy() 231 memcpy( dst->ticket, src->ticket, src->ticket_len ); in mbedtls_ssl_session_copy() 4800 *p++ = MBEDTLS_BYTE_2( session->ticket_len ); in ssl_session_save_tls12() 4801 *p++ = MBEDTLS_BYTE_1( session->ticket_len ); in ssl_session_save_tls12() 4802 *p++ = MBEDTLS_BYTE_0( session->ticket_len ); in ssl_session_save_tls12() 4806 memcpy( p, session->ticket, session->ticket_len ); in ssl_session_save_tls12() 4807 p += session->ticket_len; in ssl_session_save_tls12() 5062 if( session->ticket_len != 0 ) in ssl_session_load_tls12() 5064 if( session->ticket_len > (size_t)( end - p ) ) in ssl_session_load_tls12() 5071 memcpy( session->ticket, p, session->ticket_len ); in ssl_session_load_tls12() [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ssl.function | 1439 int ticket_len, 1496 if( ticket_len != 0 ) 1498 session->ticket = mbedtls_calloc( 1, ticket_len ); 1501 memset( session->ticket, 33, ticket_len ); 1503 session->ticket_len = ticket_len; 1506 (void) ticket_len; 4093 void ssl_serialize_session_save_load( int ticket_len, char *crt_file ) 4164 TEST_ASSERT( original.ticket_len == restored.ticket_len ); 4165 if( original.ticket_len != 0 ) 4191 void ssl_serialize_session_load_save( int ticket_len, char *crt_file ) [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | ssl.h | 1142 size_t MBEDTLS_PRIVATE(ticket_len); /*!< session ticket length */
|
Completed in 38 milliseconds