/openthread-3.7.0/third_party/mbedtls/repo/programs/ssl/ |
D | ssl_context_info.c | 517 uint32_t cert_len, ticket_len; in print_deserialized_ssl_session() local 669 ticket_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session() 673 printf_dbg("Ticket length: %u\n", ticket_len); in print_deserialized_ssl_session() 675 if (ticket_len > 0) { in print_deserialized_ssl_session() 677 CHECK_SSL_END(ticket_len); in print_deserialized_ssl_session() 678 print_hex(ssl, ticket_len, 22, "\t"); in print_deserialized_ssl_session() 679 ssl += ticket_len; in print_deserialized_ssl_session()
|
/openthread-3.7.0/third_party/mbedtls/repo/library/ |
D | ssl_tls13_client.c | 717 *identity_len = session->ticket_len; in ssl_tls13_ticket_get_identity() 2842 size_t ticket_len; in ssl_tls13_parse_new_session_ticket() local 2880 ticket_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_new_session_ticket() 2882 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, ticket_len); in ssl_tls13_parse_new_session_ticket() 2883 MBEDTLS_SSL_DEBUG_BUF(3, "received ticket", p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2886 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2889 session->ticket_len = 0; in ssl_tls13_parse_new_session_ticket() 2892 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket() 2896 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2897 p += ticket_len; in ssl_tls13_parse_new_session_ticket() [all …]
|
D | ssl_tls12_client.c | 363 size_t tlen = ssl->session_negotiate->ticket_len; in ssl_write_session_ticket_ext() 3379 size_t ticket_len; in ssl_parse_new_session_ticket() local 3421 ticket_len = MBEDTLS_GET_UINT16_BE(msg, 4); in ssl_parse_new_session_ticket() 3423 if (ticket_len + 6 + mbedtls_ssl_hs_hdr_len(ssl) != ssl->in_hslen) { in ssl_parse_new_session_ticket() 3430 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len)); in ssl_parse_new_session_ticket() 3440 if (ticket_len == 0) { in ssl_parse_new_session_ticket() 3446 ssl->session->ticket_len); in ssl_parse_new_session_ticket() 3448 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket() 3452 ssl->session_negotiate->ticket_len); in ssl_parse_new_session_ticket() 3454 ssl->session_negotiate->ticket_len = 0; in ssl_parse_new_session_ticket() [all …]
|
D | ssl_tls.c | 295 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy() 300 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy() 3490 used += 3 + session->ticket_len + 4; /* len + ticket + lifetime */ in ssl_tls12_session_save() 3493 *p++ = MBEDTLS_BYTE_2(session->ticket_len); in ssl_tls12_session_save() 3494 *p++ = MBEDTLS_BYTE_1(session->ticket_len); in ssl_tls12_session_save() 3495 *p++ = MBEDTLS_BYTE_0(session->ticket_len); in ssl_tls12_session_save() 3498 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save() 3499 p += session->ticket_len; in ssl_tls12_session_save() 3686 session->ticket_len = MBEDTLS_GET_UINT24_BE(p, 0); in ssl_tls12_session_load() 3689 if (session->ticket_len != 0) { in ssl_tls12_session_load() [all …]
|
D | ssl_tls13_server.c | 3283 size_t ticket_len; in ssl_tls13_write_new_session_ticket_body() local 3306 &ticket_len, in ssl_tls13_write_new_session_ticket_body() 3344 MBEDTLS_PUT_UINT16_BE(ticket_len, p, 0); in ssl_tls13_write_new_session_ticket_body() 3346 MBEDTLS_SSL_DEBUG_BUF(4, "ticket", p, ticket_len); in ssl_tls13_write_new_session_ticket_body() 3347 p += ticket_len; in ssl_tls13_write_new_session_ticket_body()
|
D | ssl_client.c | 838 (session_negotiate->ticket_len != 0)) { in ssl_prepare_client_hello()
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 1672 int ticket_len, in mbedtls_test_ssl_tls12_populate_session() argument 1676 (void) ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1754 if (ticket_len != 0) { in mbedtls_test_ssl_tls12_populate_session() 1755 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1759 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1761 session->ticket_len = ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1786 int ticket_len, in mbedtls_test_ssl_tls13_populate_session() argument 1789 ((void) ticket_len); in mbedtls_test_ssl_tls13_populate_session() 1823 session->ticket_len = ticket_len; in mbedtls_test_ssl_tls13_populate_session() 1824 if (ticket_len != 0) { in mbedtls_test_ssl_tls13_populate_session() [all …]
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/include/test/ |
D | ssl_helpers.h | 549 int ticket_len, 555 int ticket_len,
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ssl.function | 1982 void ssl_serialize_session_save_load(int ticket_len, char *crt_file, 1998 ((void) ticket_len); 2010 &original, ticket_len, endpoint_type, crt_file) == 0); 2082 TEST_ASSERT(original.ticket_len == restored.ticket_len); 2083 if (original.ticket_len != 0) { 2087 restored.ticket, original.ticket_len) == 0); 2127 TEST_ASSERT(original.ticket_len == restored.ticket_len); 2128 if (original.ticket_len != 0) { 2133 original.ticket_len) == 0); 2154 void ssl_serialize_session_load_save(int ticket_len, char *crt_file, [all …]
|
/openthread-3.7.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ssl.h | 1272 size_t MBEDTLS_PRIVATE(ticket_len); /*!< session ticket length */
|