Searched refs:ticket (Results 1 – 11 of 11) sorted by relevance
/mbedtls-latest/library/ |
D | ssl_ticket.c | 429 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local 473 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse() 474 ticket, enc_len, &clear_len)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_parse() 483 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse() 484 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse() 500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
|
D | ssl_tls13_client.c | 686 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket() 716 *identity = session->ticket; in ssl_tls13_ticket_get_identity() 2848 unsigned char *ticket; in ssl_tls13_parse_new_session_ticket() local 2891 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2892 mbedtls_free(session->ticket); in ssl_tls13_parse_new_session_ticket() 2893 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket() 2897 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket() 2901 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2903 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
|
D | ssl_tls12_client.c | 386 if (ssl->session_negotiate->ticket == NULL || tlen == 0) { in ssl_write_session_ticket_ext() 393 memcpy(p, ssl->session_negotiate->ticket, tlen); in ssl_write_session_ticket_ext() 3382 unsigned char *ticket; in ssl_parse_new_session_ticket() local 3446 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket() 3447 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket() 3449 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket() 3453 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket, in ssl_parse_new_session_ticket() 3455 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket() 3458 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_parse_new_session_ticket() 3465 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket() [all …]
|
D | ssl_tls.c | 234 dst->ticket = NULL; in mbedtls_ssl_session_copy() 294 if (src->ticket != NULL) { in mbedtls_ssl_session_copy() 295 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy() 296 if (dst->ticket == NULL) { in mbedtls_ssl_session_copy() 300 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy() 3497 if (session->ticket != NULL) { in ssl_tls12_session_save() 3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save() 3599 session->ticket = NULL; in ssl_tls12_session_load() 3694 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls12_session_load() 3695 if (session->ticket == NULL) { in ssl_tls12_session_load() [all …]
|
D | ssl_client.c | 753 session_negotiate->ticket != NULL) { in ssl_prepare_client_hello() 837 if ((session_negotiate->ticket != NULL) && in ssl_prepare_client_hello()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ssl.data | 2949 Session serialization, save-load: no ticket, no cert 2953 Session serialization, save-load: small ticket, no cert 2957 Session serialization, save-load: large ticket, no cert 2961 Session serialization, save-load: no ticket, cert 2965 Session serialization, save-load: small ticket, cert 2969 Session serialization, save-load: large ticket, cert 2973 TLS 1.3: CLI: Session serialization, save-load: no ticket 2977 TLS 1.3: CLI: Session serialization, save-load: small ticket 2981 TLS 1.3: CLI: Session serialization, save-load: large ticket 2985 TLS 1.3: SRV: Session serialization, save-load: large ticket [all …]
|
D | test_suite_ssl.function | 2084 TEST_ASSERT(original.ticket != NULL); 2085 TEST_ASSERT(restored.ticket != NULL); 2086 TEST_ASSERT(memcmp(original.ticket, 2087 restored.ticket, original.ticket_len) == 0); 2131 TEST_ASSERT(original.ticket != NULL); 2132 TEST_ASSERT(restored.ticket != NULL); 2133 TEST_ASSERT(memcmp(original.ticket, 2134 restored.ticket, 3647 * Run first handshake to get a ticket from the server. 3657 * Prepare for handshake with the ticket. [all …]
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 1758 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1759 if (session->ticket == NULL) { in mbedtls_test_ssl_tls12_populate_session() 1762 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1831 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls13_populate_session() 1832 if (session->ticket == NULL) { in mbedtls_test_ssl_tls13_populate_session() 1835 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls13_populate_session()
|
/mbedtls-latest/ |
D | ChangeLog | 385 * Switch to milliseconds as the unit for ticket creation and reception time 497 function, needed for TLS 1.3 ticket lifetimes. Alternative implementations 894 * In TLS 1.3, when using a ticket for session resumption, tweak its age 896 ticket timestamps (typically timestamps in milliseconds) compared to the 897 Mbed TLS ticket timestamps (in seconds) to compute a ticket age smaller 899 reject the ticket. Fix #6623. 1058 The pre-shared keys can be provisioned externally or via the ticket 1060 The ticket mechanism is supported when the configuration option 1231 * Add mbedtls_ssl_ticket_rotate() for external ticket rotation. 3097 the peer CRT chain and session ticket twice. [all …]
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 23 provisioned externally as well as provisioned via the ticket mechanism. 25 - Mbed TLS supports session resumption via the ticket mechanism.
|
/mbedtls-latest/include/mbedtls/ |
D | ssl.h | 1271 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */
|