Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 11 of 11) sorted by relevance

/mbedtls-latest/library/
Dssl_ticket.c429 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local
473 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
474 ticket, enc_len, &clear_len)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_parse()
483 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
484 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse()
500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
Dssl_tls13_client.c686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket()
716 *identity = session->ticket; in ssl_tls13_ticket_get_identity()
2848 unsigned char *ticket; in ssl_tls13_parse_new_session_ticket() local
2891 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket()
2892 mbedtls_free(session->ticket); in ssl_tls13_parse_new_session_ticket()
2893 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket()
2897 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket()
2901 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket()
2903 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
Dssl_tls12_client.c386 if (ssl->session_negotiate->ticket == NULL || tlen == 0) { in ssl_write_session_ticket_ext()
393 memcpy(p, ssl->session_negotiate->ticket, tlen); in ssl_write_session_ticket_ext()
3382 unsigned char *ticket; in ssl_parse_new_session_ticket() local
3446 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket()
3447 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket()
3449 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
3453 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket, in ssl_parse_new_session_ticket()
3455 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket()
3458 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_parse_new_session_ticket()
3465 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket()
[all …]
Dssl_tls.c234 dst->ticket = NULL; in mbedtls_ssl_session_copy()
294 if (src->ticket != NULL) { in mbedtls_ssl_session_copy()
295 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy()
296 if (dst->ticket == NULL) { in mbedtls_ssl_session_copy()
300 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy()
3497 if (session->ticket != NULL) { in ssl_tls12_session_save()
3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save()
3599 session->ticket = NULL; in ssl_tls12_session_load()
3694 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls12_session_load()
3695 if (session->ticket == NULL) { in ssl_tls12_session_load()
[all …]
Dssl_client.c753 session_negotiate->ticket != NULL) { in ssl_prepare_client_hello()
837 if ((session_negotiate->ticket != NULL) && in ssl_prepare_client_hello()
/mbedtls-latest/tests/suites/
Dtest_suite_ssl.data2949 Session serialization, save-load: no ticket, no cert
2953 Session serialization, save-load: small ticket, no cert
2957 Session serialization, save-load: large ticket, no cert
2961 Session serialization, save-load: no ticket, cert
2965 Session serialization, save-load: small ticket, cert
2969 Session serialization, save-load: large ticket, cert
2973 TLS 1.3: CLI: Session serialization, save-load: no ticket
2977 TLS 1.3: CLI: Session serialization, save-load: small ticket
2981 TLS 1.3: CLI: Session serialization, save-load: large ticket
2985 TLS 1.3: SRV: Session serialization, save-load: large ticket
[all …]
Dtest_suite_ssl.function2084 TEST_ASSERT(original.ticket != NULL);
2085 TEST_ASSERT(restored.ticket != NULL);
2086 TEST_ASSERT(memcmp(original.ticket,
2087 restored.ticket, original.ticket_len) == 0);
2131 TEST_ASSERT(original.ticket != NULL);
2132 TEST_ASSERT(restored.ticket != NULL);
2133 TEST_ASSERT(memcmp(original.ticket,
2134 restored.ticket,
3647 * Run first handshake to get a ticket from the server.
3657 * Prepare for handshake with the ticket.
[all …]
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c1758 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session()
1759 if (session->ticket == NULL) { in mbedtls_test_ssl_tls12_populate_session()
1762 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session()
1831 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
1832 if (session->ticket == NULL) { in mbedtls_test_ssl_tls13_populate_session()
1835 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
/mbedtls-latest/
DChangeLog385 * Switch to milliseconds as the unit for ticket creation and reception time
497 function, needed for TLS 1.3 ticket lifetimes. Alternative implementations
894 * In TLS 1.3, when using a ticket for session resumption, tweak its age
896 ticket timestamps (typically timestamps in milliseconds) compared to the
897 Mbed TLS ticket timestamps (in seconds) to compute a ticket age smaller
899 reject the ticket. Fix #6623.
1058 The pre-shared keys can be provisioned externally or via the ticket
1060 The ticket mechanism is supported when the configuration option
1231 * Add mbedtls_ssl_ticket_rotate() for external ticket rotation.
3097 the peer CRT chain and session ticket twice.
[all …]
/mbedtls-latest/docs/architecture/
Dtls13-support.md23 provisioned externally as well as provisioned via the ticket mechanism.
25 - Mbed TLS supports session resumption via the ticket mechanism.
/mbedtls-latest/include/mbedtls/
Dssl.h1271 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */