Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 11 of 11) sorted by relevance

/mbedtls-3.6.0/library/
Dssl_ticket.c422 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local
466 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
467 ticket, enc_len, &clear_len)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_parse()
476 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
477 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse()
493 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
Dssl_tls13_client.c686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket()
718 *identity = session->ticket; in ssl_tls13_ticket_get_identity()
2747 unsigned char *ticket; in ssl_tls13_parse_new_session_ticket() local
2785 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket()
2786 mbedtls_free(session->ticket); in ssl_tls13_parse_new_session_ticket()
2787 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket()
2791 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket()
2795 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket()
2797 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
Dssl_tls12_client.c385 if (ssl->session_negotiate->ticket == NULL || tlen == 0) { in ssl_write_session_ticket_ext()
392 memcpy(p, ssl->session_negotiate->ticket, tlen); in ssl_write_session_ticket_ext()
3385 unsigned char *ticket; in ssl_parse_new_session_ticket() local
3450 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket()
3451 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket()
3453 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
3457 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket, in ssl_parse_new_session_ticket()
3459 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket()
3462 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_parse_new_session_ticket()
3469 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket()
[all …]
Dssl_tls.c233 dst->ticket = NULL; in mbedtls_ssl_session_copy()
278 if (src->ticket != NULL) { in mbedtls_ssl_session_copy()
279 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy()
280 if (dst->ticket == NULL) { in mbedtls_ssl_session_copy()
284 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy()
2556 if (session->ticket != NULL && session->ticket_len > 0) { in ssl_tls13_session_save()
2557 memcpy(p, session->ticket, session->ticket_len); in ssl_tls13_session_save()
2654 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls13_session_load()
2655 if (session->ticket == NULL) { in ssl_tls13_session_load()
2658 memcpy(session->ticket, p, session->ticket_len); in ssl_tls13_session_load()
[all …]
Dssl_client.c758 session_negotiate->ticket != NULL) { in ssl_prepare_client_hello()
842 if ((session_negotiate->ticket != NULL) && in ssl_prepare_client_hello()
/mbedtls-3.6.0/tests/suites/
Dtest_suite_ssl.data2941 Session serialization, save-load: no ticket, no cert
2945 Session serialization, save-load: small ticket, no cert
2949 Session serialization, save-load: large ticket, no cert
2953 Session serialization, save-load: no ticket, cert
2957 Session serialization, save-load: small ticket, cert
2961 Session serialization, save-load: large ticket, cert
2965 TLS 1.3: CLI: Session serialization, save-load: no ticket
2969 TLS 1.3: CLI: Session serialization, save-load: small ticket
2973 TLS 1.3: CLI: Session serialization, save-load: large ticket
2977 TLS 1.3: SRV: Session serialization, save-load: large ticket
[all …]
Dtest_suite_ssl.function2021 TEST_ASSERT(original.ticket != NULL);
2022 TEST_ASSERT(restored.ticket != NULL);
2023 TEST_ASSERT(memcmp(original.ticket,
2024 restored.ticket, original.ticket_len) == 0);
2058 TEST_ASSERT(original.ticket != NULL);
2059 TEST_ASSERT(restored.ticket != NULL);
2060 TEST_ASSERT(memcmp(original.ticket,
2061 restored.ticket,
/mbedtls-3.6.0/tests/src/test_helpers/
Dssl_helpers.c1591 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session()
1592 if (session->ticket == NULL) { in mbedtls_test_ssl_tls12_populate_session()
1595 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session()
1644 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
1645 if (session->ticket == NULL) { in mbedtls_test_ssl_tls13_populate_session()
1648 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
/mbedtls-3.6.0/
DChangeLog42 function, needed for TLS 1.3 ticket lifetimes. Alternative implementations
439 * In TLS 1.3, when using a ticket for session resumption, tweak its age
441 ticket timestamps (typically timestamps in milliseconds) compared to the
442 Mbed TLS ticket timestamps (in seconds) to compute a ticket age smaller
444 reject the ticket. Fix #6623.
603 The pre-shared keys can be provisioned externally or via the ticket
605 The ticket mechanism is supported when the configuration option
776 * Add mbedtls_ssl_ticket_rotate() for external ticket rotation.
2642 the peer CRT chain and session ticket twice.
2712 * Fix an unsafe bounds check when restoring an SSL session from a ticket.
[all …]
/mbedtls-3.6.0/docs/architecture/
Dtls13-support.md32 provisioned externally as well as provisioned via the ticket mechanism.
34 - Mbed TLS supports session resumption via the ticket mechanism.
/mbedtls-3.6.0/include/mbedtls/
Dssl.h1221 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */