/third_party/mbedtls/programs/ssl/ |
D | ssl_context_info.c | 530 uint32_t cert_len, ticket_len; in print_deserialized_ssl_session() local 677 ticket_len = ((uint32_t) ssl[0] << 16) | in print_deserialized_ssl_session() 681 printf_dbg("Ticket length: %u\n", ticket_len); in print_deserialized_ssl_session() 683 if (ticket_len > 0) { in print_deserialized_ssl_session() 685 CHECK_SSL_END(ticket_len); in print_deserialized_ssl_session() 686 print_hex(ssl, ticket_len, 22, "\t"); in print_deserialized_ssl_session() 687 ssl += ticket_len; in print_deserialized_ssl_session()
|
/third_party/openssl/util/perl/TLSProxy/ |
D | NewSessionTicket.pm | 43 my $ticket_len = unpack('n', $self->data); 44 my $ticket = substr($self->data, 6, $ticket_len);
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
D | NewSessionTicket.pm | 43 my $ticket_len = unpack('n', $self->data); 44 my $ticket = substr($self->data, 6, $ticket_len);
|
/third_party/mbedtls/tests/src/test_helpers/ |
D | ssl_helpers.c | 1441 int ticket_len, in mbedtls_test_ssl_tls12_populate_session() argument 1514 if (ticket_len != 0) { in mbedtls_test_ssl_tls12_populate_session() 1515 session->ticket = mbedtls_calloc(1, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1519 memset(session->ticket, 33, ticket_len); in mbedtls_test_ssl_tls12_populate_session() 1521 session->ticket_len = ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1524 (void) ticket_len; in mbedtls_test_ssl_tls12_populate_session() 1539 int ticket_len, in mbedtls_test_ssl_tls13_populate_session() argument 1542 ((void) ticket_len); in mbedtls_test_ssl_tls13_populate_session() 1566 session->ticket_len = ticket_len; in mbedtls_test_ssl_tls13_populate_session() 1567 if (ticket_len != 0) { in mbedtls_test_ssl_tls13_populate_session() [all …]
|
/third_party/mbedtls/library/ |
D | ssl_tls13_client.c | 716 *identity_len = session->ticket_len; in ssl_tls13_ticket_get_identity() 2765 size_t ticket_len; in ssl_tls13_parse_new_session_ticket() local 2798 ticket_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_new_session_ticket() 2800 MBEDTLS_SSL_CHK_BUF_READ_PTR(p, end, ticket_len); in ssl_tls13_parse_new_session_ticket() 2801 MBEDTLS_SSL_DEBUG_BUF(3, "received ticket", p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2804 if (session->ticket != NULL || session->ticket_len > 0) { in ssl_tls13_parse_new_session_ticket() 2807 session->ticket_len = 0; in ssl_tls13_parse_new_session_ticket() 2810 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) { in ssl_tls13_parse_new_session_ticket() 2814 memcpy(ticket, p, ticket_len); in ssl_tls13_parse_new_session_ticket() 2815 p += ticket_len; in ssl_tls13_parse_new_session_ticket() [all …]
|
D | ssl_tls12_client.c | 367 size_t tlen = ssl->session_negotiate->ticket_len; in ssl_write_session_ticket_ext() 3375 size_t ticket_len; in ssl_parse_new_session_ticket() local 3418 ticket_len = (msg[4] << 8) | (msg[5]); in ssl_parse_new_session_ticket() 3420 if (ticket_len + 6 + mbedtls_ssl_hs_hdr_len(ssl) != ssl->in_hslen) { in ssl_parse_new_session_ticket() 3427 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len)); in ssl_parse_new_session_ticket() 3437 if (ticket_len == 0) { in ssl_parse_new_session_ticket() 3443 ssl->session->ticket_len); in ssl_parse_new_session_ticket() 3446 ssl->session->ticket_len = 0; in ssl_parse_new_session_ticket() 3450 ssl->session_negotiate->ticket_len); in ssl_parse_new_session_ticket() 3453 ssl->session_negotiate->ticket_len = 0; in ssl_parse_new_session_ticket() [all …]
|
D | ssl_tls.c | 288 dst->ticket = mbedtls_calloc(1, src->ticket_len); in mbedtls_ssl_session_copy() 293 memcpy(dst->ticket, src->ticket, src->ticket_len); in mbedtls_ssl_session_copy() 2523 if (session->ticket_len > SIZE_MAX - needed) { in ssl_tls13_session_save() 2527 needed += session->ticket_len; /* ticket */ in ssl_tls13_session_save() 2573 MBEDTLS_PUT_UINT16_BE(session->ticket_len, p, 0); in ssl_tls13_session_save() 2576 if (session->ticket != NULL && session->ticket_len > 0) { in ssl_tls13_session_save() 2577 memcpy(p, session->ticket, session->ticket_len); in ssl_tls13_session_save() 2578 p += session->ticket_len; in ssl_tls13_session_save() 2667 session->ticket_len = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_session_load() 2670 if (end - p < (long int) session->ticket_len) { in ssl_tls13_session_load() [all …]
|
D | ssl_tls13_server.c | 2801 size_t ticket_len; in ssl_tls13_write_new_session_ticket_body() local 2820 &ticket_len, in ssl_tls13_write_new_session_ticket_body() 2857 MBEDTLS_PUT_UINT16_BE(ticket_len, p, 0); in ssl_tls13_write_new_session_ticket_body() 2859 MBEDTLS_SSL_DEBUG_BUF(4, "ticket", p, ticket_len); in ssl_tls13_write_new_session_ticket_body() 2860 p += ticket_len; in ssl_tls13_write_new_session_ticket_body()
|
D | ssl_client.c | 825 (session_negotiate->ticket_len != 0)) { in ssl_prepare_client_hello()
|
/third_party/mbedtls/tests/include/test/ |
D | ssl_helpers.h | 487 int ticket_len, 492 int ticket_len,
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ssl.function | 2104 void ssl_serialize_session_save_load(int ticket_len, char *crt_file, 2129 &original, ticket_len, crt_file) == 0); 2193 TEST_ASSERT(original.ticket_len == restored.ticket_len); 2194 if (original.ticket_len != 0) { 2198 restored.ticket, original.ticket_len) == 0); 2230 TEST_ASSERT(original.ticket_len == restored.ticket_len); 2231 if (original.ticket_len != 0) { 2236 original.ticket_len) == 0); 2252 void ssl_serialize_session_load_save(int ticket_len, char *crt_file, 2276 &session, ticket_len, crt_file) == 0); [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | tls_wolfssl.c | 2081 word32 ticket_len = sizeof(conn->session_ticket); in tls_sess_sec_cb() local 2091 &ticket_len) != 1) in tls_sess_sec_cb() 2094 if (ticket_len == 0) in tls_sess_sec_cb() 2098 conn->session_ticket, ticket_len, in tls_sess_sec_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | tls_wolfssl.c | 2088 word32 ticket_len = sizeof(conn->session_ticket); in tls_sess_sec_cb() local 2098 &ticket_len) != 1) in tls_sess_sec_cb() 2101 if (ticket_len == 0) in tls_sess_sec_cb() 2105 conn->session_ticket, ticket_len, in tls_sess_sec_cb()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1218 size_t MBEDTLS_PRIVATE(ticket_len); /*!< session ticket length */
|