Home
last modified time | relevance | path

Searched refs:ticket (Results 1 – 7 of 7) sorted by relevance

/optee_os/lib/libmbedtls/mbedtls/library/
H A Dssl_ticket.c429 unsigned char *ticket = enc_len_p + TICKET_CRYPT_LEN_BYTES; in mbedtls_ssl_ticket_parse() local
473 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
474 ticket, enc_len, &clear_len)) != PSA_SUCCESS) { in mbedtls_ssl_ticket_parse()
483 ticket, enc_len + TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_parse()
484 ticket, enc_len, &clear_len, in mbedtls_ssl_ticket_parse()
500 if ((ret = mbedtls_ssl_session_load(session, ticket, clear_len)) != 0) { in mbedtls_ssl_ticket_parse()
H A Dssl_tls13_client.c687 session != NULL && session->ticket != NULL && in ssl_tls13_has_configured_ticket()
717 *identity = session->ticket; in ssl_tls13_ticket_get_identity()
2849 unsigned char *ticket; in ssl_tls13_parse_new_session_ticket() local
2892 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket()
2893 mbedtls_free(session->ticket); in ssl_tls13_parse_new_session_ticket()
2894 session->ticket = NULL; in ssl_tls13_parse_new_session_ticket()
2898 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket()
2902 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket()
2904 session->ticket = ticket; in ssl_tls13_parse_new_session_ticket()
H A Dssl_tls12_client.c386 if (ssl->session_negotiate->ticket == NULL || tlen == 0) { in ssl_write_session_ticket_ext()
393 memcpy(p, ssl->session_negotiate->ticket, tlen); in ssl_write_session_ticket_ext()
3382 unsigned char *ticket; in ssl_parse_new_session_ticket() local
3446 if (ssl->session != NULL && ssl->session->ticket != NULL) { in ssl_parse_new_session_ticket()
3447 mbedtls_zeroize_and_free(ssl->session->ticket, in ssl_parse_new_session_ticket()
3449 ssl->session->ticket = NULL; in ssl_parse_new_session_ticket()
3453 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket, in ssl_parse_new_session_ticket()
3455 ssl->session_negotiate->ticket = NULL; in ssl_parse_new_session_ticket()
3458 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_parse_new_session_ticket()
3465 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket()
[all …]
H A Dssl_client.c754 session_negotiate->ticket != NULL) { in ssl_prepare_client_hello()
838 if ((session_negotiate->ticket != NULL) && in ssl_prepare_client_hello()
H A Dssl_tls.c235 dst->ticket = NULL; in mbedtls_ssl_session_copy()
295 if (src->ticket != NULL) { in mbedtls_ssl_session_copy()
296 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy()
297 if (dst->ticket == NULL) { in mbedtls_ssl_session_copy()
301 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy()
3558 if (session->ticket != NULL) { in ssl_tls12_session_save()
3559 memcpy(p, session->ticket, session->ticket_len); in ssl_tls12_session_save()
3660 session->ticket = NULL; in ssl_tls12_session_load()
3755 session->ticket = mbedtls_calloc(1, session->ticket_len); in ssl_tls12_session_load()
3756 if (session->ticket == NULL) { in ssl_tls12_session_load()
[all …]
/optee_os/lib/libmbedtls/mbedtls/
H A DChangeLog578 * Switch to milliseconds as the unit for ticket creation and reception time
690 function, needed for TLS 1.3 ticket lifetimes. Alternative implementations
1087 * In TLS 1.3, when using a ticket for session resumption, tweak its age
1089 ticket timestamps (typically timestamps in milliseconds) compared to the
1090 Mbed TLS ticket timestamps (in seconds) to compute a ticket age smaller
1092 reject the ticket. Fix #6623.
1251 The pre-shared keys can be provisioned externally or via the ticket
1253 The ticket mechanism is supported when the configuration option
1424 * Add mbedtls_ssl_ticket_rotate() for external ticket rotation.
3290 the peer CRT chain and session ticket twice.
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dssl.h1321 unsigned char *MBEDTLS_PRIVATE(ticket); /*!< RFC 5077 session ticket */