Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 7 of 7) sorted by relevance

/mbedtls-development/library/
A Dssl_ticket.c306 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local
345 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
346 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse()
361 if( ( ret = mbedtls_ssl_session_load( session, ticket, clear_len ) ) != 0 ) in mbedtls_ssl_ticket_parse()
A Dssl_cli.c635 if( ssl->session_negotiate->ticket == NULL || tlen == 0 ) in ssl_write_session_ticket_ext()
641 memcpy( p, ssl->session_negotiate->ticket, tlen ); in ssl_write_session_ticket_ext()
1031 if( ssl->session_negotiate->ticket != NULL && in ssl_write_client_hello()
4068 unsigned char *ticket; in ssl_parse_new_session_ticket() local
4138 mbedtls_platform_zeroize( ssl->session->ticket, in ssl_parse_new_session_ticket()
4140 mbedtls_free( ssl->session->ticket ); in ssl_parse_new_session_ticket()
4141 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
4147 mbedtls_free( ssl->session_negotiate->ticket ); in ssl_parse_new_session_ticket()
4148 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket()
4159 memcpy( ticket, msg + 6, ticket_len ); in ssl_parse_new_session_ticket()
[all …]
A Dssl_tls.c225 if( src->ticket != NULL ) in mbedtls_ssl_session_copy()
227 dst->ticket = mbedtls_calloc( 1, src->ticket_len ); in mbedtls_ssl_session_copy()
228 if( dst->ticket == NULL ) in mbedtls_ssl_session_copy()
231 memcpy( dst->ticket, src->ticket, src->ticket_len ); in mbedtls_ssl_session_copy()
4804 if( session->ticket != NULL ) in ssl_session_save_tls12()
4806 memcpy( p, session->ticket, session->ticket_len ); in ssl_session_save_tls12()
4980 session->ticket = NULL; in ssl_session_load_tls12()
5067 session->ticket = mbedtls_calloc( 1, session->ticket_len ); in ssl_session_load_tls12()
5068 if( session->ticket == NULL ) in ssl_session_load_tls12()
5071 memcpy( session->ticket, p, session->ticket_len ); in ssl_session_load_tls12()
[all …]
/mbedtls-development/tests/suites/
A Dtest_suite_ssl.data6113 Session serialization, save-load: no ticket, no cert
6116 Session serialization, save-load: small ticket, no cert
6120 Session serialization, save-load: large ticket, no cert
6124 Session serialization, save-load: no ticket, cert
6128 Session serialization, save-load: small ticket, cert
6132 Session serialization, save-load: large ticket, cert
6136 Session serialization, load-save: no ticket, no cert
6139 Session serialization, load-save: small ticket, no cert
6147 Session serialization, load-save: no ticket, cert
6151 Session serialization, load-save: small ticket, cert
[all …]
A Dtest_suite_ssl.function1498 session->ticket = mbedtls_calloc( 1, ticket_len );
1499 if( session->ticket == NULL )
1501 memset( session->ticket, 33, ticket_len );
4167 TEST_ASSERT( original.ticket != NULL );
4168 TEST_ASSERT( restored.ticket != NULL );
4169 TEST_ASSERT( memcmp( original.ticket,
4170 restored.ticket, original.ticket_len ) == 0 );
/mbedtls-development/
A DChangeLog1451 the peer CRT chain and session ticket twice.
4157 (Closes ticket #47, found by Hugo Leisink)
4169 (Closes ticket #36)
4171 introspection functions (Closes ticket #40)
4193 management (Closes ticket #44)
4206 ticket #37)
4212 smaller than the hash length. (Closes ticket #41)
4273 with random data (Fixed ticket #10)
4295 are now supported as well (Fixes ticket #5)
4301 ticket #13). Also possible to remove PEM support for
[all …]
/mbedtls-development/include/mbedtls/
A Dssl.h1141 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */

Completed in 43 milliseconds