/external/chromium/net/third_party/nss/ssl/ |
sslnonce.c | 222 if (sid->u.ssl3.sessionTicket.ticket.data) { 223 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE); 362 sid->u.ssl3.sessionTicket.ticket.data == NULL) 507 /* A server might have sent us an empty ticket, which has the 508 * effect of clearing the previously known ticket. 510 if (sid->u.ssl3.sessionTicket.ticket.data) 511 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE); 512 if (session_ticket->ticket.len > 0) { 513 rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.sessionTicket.ticket, 514 &session_ticket->ticket); [all...] |
ssl3ext.c | 345 * Clients sends a filled in session ticket if one is available, and otherwise 346 * sends an empty ticket. Servers always send empty tickets. 366 /* If we are a client then send a session ticket if one is availble. 373 if (session_ticket->ticket.data) { 375 extension_length += session_ticket->ticket.len; 380 extension_length += session_ticket->ticket.len; 392 if (session_ticket && session_ticket->ticket.data && 394 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data, 395 session_ticket->ticket.len, 2); 545 NewSessionTicket ticket; local [all...] |
ssl3prot.h | 320 SECItem ticket; member in struct:__anon2603
|
ssl3con.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client.h | 52 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
tlsv1_server.h | 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
krb5_asn.c | 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
|
/external/openssl/include/openssl/ |
krb5_asn.h | 105 /* Ticket ::= [APPLICATION 1] SEQUENCE { 128 ** ticket[3] Ticket, 140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls.h | 531 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 125 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, 141 ticket, len); 143 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) { 149 pac_opaque_len = WPA_GET_BE16(ticket + 2); 150 pac_opaque = ticket + 4; [all...] |
/external/wpa_supplicant/ |
tlsv1_client.c | 53 unsigned int ticket:1; member in struct:tlsv1_client 392 conn->state = (conn->session_resumed || conn->ticket) ? 1058 conn->state = (conn->session_resumed || conn->ticket) ? [all...] |
/external/openssl/ssl/ |
kssl.c | 559 krb5_ticket *ticket) 565 return(p_krb5_decrypt_tkt_part(con,keys,ticket)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_fast.c | 77 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, 100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); [all...] |