/mbedtls-3.6.0/library/ |
D | ssl_ticket.c | 422 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local 466 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse() 467 ticket, enc_len, &clear_len)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_parse() 476 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse() 477 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse() 493 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
|
D | ssl_tls13_client.c | 686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket() 718 *identity = session->ticket; in ssl_tls13_ticket_get_identity() 2747 unsigned char *ticket; in ssl_tls13_parse_new_session_ticket() local 2785 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2786 mbedtls_free(session->ticket); in ssl_tls13_parse_new_session_ticket() 2787 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket() 2791 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket() 2795 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2797 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
|
D | ssl_tls12_client.c | 385 if (ssl->session_negotiate->ticket == NULL || tlen == 0) { in ssl_write_session_ticket_ext() 392 memcpy(p, ssl->session_negotiate->ticket, tlen); in ssl_write_session_ticket_ext() 3385 unsigned char *ticket; in ssl_parse_new_session_ticket() local 3450 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket() 3451 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket() 3453 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket() 3457 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket, in ssl_parse_new_session_ticket() 3459 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket() 3462 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_parse_new_session_ticket() 3469 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket() [all …]
|
D | ssl_tls.c | 233 dst->ticket = NULL; in mbedtls_ssl_session_copy() 278 if (src->ticket != NULL) { in mbedtls_ssl_session_copy() 279 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy() 280 if (dst->ticket == NULL) { in mbedtls_ssl_session_copy() 284 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy() 2556 if (session->ticket != NULL && session->ticket_len > 0) { in ssl_tls13_session_save() 2557 memcpy(p, session->ticket, session->ticket_len); in ssl_tls13_session_save() 2654 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls13_session_load() 2655 if (session->ticket == NULL) { in ssl_tls13_session_load() 2658 memcpy(session->ticket, p, session->ticket_len); in ssl_tls13_session_load() [all …]
|
D | ssl_client.c | 758 session_negotiate->ticket != NULL) { in ssl_prepare_client_hello() 842 if ((session_negotiate->ticket != NULL) && in ssl_prepare_client_hello()
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_ssl.data | 2941 Session serialization, save-load: no ticket, no cert 2945 Session serialization, save-load: small ticket, no cert 2949 Session serialization, save-load: large ticket, no cert 2953 Session serialization, save-load: no ticket, cert 2957 Session serialization, save-load: small ticket, cert 2961 Session serialization, save-load: large ticket, cert 2965 TLS 1.3: CLI: Session serialization, save-load: no ticket 2969 TLS 1.3: CLI: Session serialization, save-load: small ticket 2973 TLS 1.3: CLI: Session serialization, save-load: large ticket 2977 TLS 1.3: SRV: Session serialization, save-load: large ticket [all …]
|
D | test_suite_ssl.function | 2021 TEST_ASSERT(original.ticket != NULL); 2022 TEST_ASSERT(restored.ticket != NULL); 2023 TEST_ASSERT(memcmp(original.ticket, 2024 restored.ticket, original.ticket_len) == 0); 2058 TEST_ASSERT(original.ticket != NULL); 2059 TEST_ASSERT(restored.ticket != NULL); 2060 TEST_ASSERT(memcmp(original.ticket, 2061 restored.ticket,
|
/mbedtls-3.6.0/tests/src/test_helpers/ |
D | ssl_helpers.c | 1591 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1592 if (session->ticket == NULL) { in mbedtls_test_ssl_tls12_populate_session() 1595 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1644 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls13_populate_session() 1645 if (session->ticket == NULL) { in mbedtls_test_ssl_tls13_populate_session() 1648 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
|
/mbedtls-3.6.0/ |
D | ChangeLog | 42 function, needed for TLS 1.3 ticket lifetimes. Alternative implementations 439 * In TLS 1.3, when using a ticket for session resumption, tweak its age 441 ticket timestamps (typically timestamps in milliseconds) compared to the 442 Mbed TLS ticket timestamps (in seconds) to compute a ticket age smaller 444 reject the ticket. Fix #6623. 603 The pre-shared keys can be provisioned externally or via the ticket 605 The ticket mechanism is supported when the configuration option 776 * Add mbedtls_ssl_ticket_rotate() for external ticket rotation. 2642 the peer CRT chain and session ticket twice. 2712 * Fix an unsafe bounds check when restoring an SSL session from a ticket. [all …]
|
/mbedtls-3.6.0/docs/architecture/ |
D | tls13-support.md | 32 provisioned externally as well as provisioned via the ticket mechanism. 34 - Mbed TLS supports session resumption via the ticket mechanism.
|
/mbedtls-3.6.0/include/mbedtls/ |
D | ssl.h | 1221 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */
|