HomeSort by relevance Sort by last modified time
    Searched refs:ticket (Results 1 - 14 of 14) sorted by null

  /external/chromium/net/third_party/nss/ssl/
sslnonce.c 222 if (sid->u.ssl3.sessionTicket.ticket.data) {
223 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE);
362 sid->u.ssl3.sessionTicket.ticket.data == NULL)
507 /* A server might have sent us an empty ticket, which has the
508 * effect of clearing the previously known ticket.
510 if (sid->u.ssl3.sessionTicket.ticket.data)
511 SECITEM_FreeItem(&sid->u.ssl3.sessionTicket.ticket, PR_FALSE);
512 if (session_ticket->ticket.len > 0) {
513 rv = SECITEM_CopyItem(NULL, &sid->u.ssl3.sessionTicket.ticket,
514 &session_ticket->ticket);
    [all...]
ssl3ext.c 345 * Clients sends a filled in session ticket if one is available, and otherwise
346 * sends an empty ticket. Servers always send empty tickets.
366 /* If we are a client then send a session ticket if one is availble.
373 if (session_ticket->ticket.data) {
375 extension_length += session_ticket->ticket.len;
380 extension_length += session_ticket->ticket.len;
392 if (session_ticket && session_ticket->ticket.data &&
394 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data,
395 session_ticket->ticket.len, 2);
545 NewSessionTicket ticket; local
    [all...]
ssl3prot.h 320 SECItem ticket; member in struct:__anon2603
ssl3con.c     [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_client.h 52 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
tlsv1_server.h 47 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
  /external/openssl/crypto/krb5/
krb5_asn.h 105 /* Ticket ::= [APPLICATION 1] SEQUENCE {
128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
krb5_asn.c 104 ASN1_EXP(KRB5_APREQBODY, ticket, KRB5_TICKET, 3),
  /external/openssl/include/openssl/
krb5_asn.h 105 /* Ticket ::= [APPLICATION 1] SEQUENCE {
128 ** ticket[3] Ticket,
140 KRB5_TICKET *ticket; member in struct:krb5_ap_req_st
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls.h 531 (void *ctx, const u8 *ticket, size_t len, const u8 *client_random,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_fast.c 125 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len,
141 ticket, len);
143 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) {
149 pac_opaque_len = WPA_GET_BE16(ticket + 2);
150 pac_opaque = ticket + 4;
    [all...]
  /external/wpa_supplicant/
tlsv1_client.c 53 unsigned int ticket:1; member in struct:tlsv1_client
392 conn->state = (conn->session_resumed || conn->ticket) ?
1058 conn->state = (conn->session_resumed || conn->ticket) ?
    [all...]
  /external/openssl/ssl/
kssl.c 559 krb5_ticket *ticket)
565 return(p_krb5_decrypt_tkt_part(con,keys,ticket));
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_fast.c 77 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len,
100 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
    [all...]

Completed in 225 milliseconds