Home | History | Annotate | Download | only in ssl

Lines Matching refs:ticket

345  * Clients sends a filled in session ticket if one is available, and otherwise
346 * sends an empty ticket. Servers always send empty tickets.
366 /* If we are a client then send a session ticket if one is availble.
373 if (session_ticket->ticket.data) {
375 extension_length += session_ticket->ticket.len;
380 extension_length += session_ticket->ticket.len;
392 if (session_ticket && session_ticket->ticket.data &&
394 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data,
395 session_ticket->ticket.len, 2);
545 NewSessionTicket ticket;
587 ticket.ticket_lifetime_hint = TLS_EX_SESS_TICKET_LIFETIME_HINT;
633 /* TODO: else send an empty ticket. */
652 + sizeof(ticket.ticket_lifetime_hint);
658 sizeof(ticket.ticket_lifetime_hint) /* ticket_lifetime_hint */
659 + 2 /* length field for NewSessionTicket.ticket */
662 + 2 /* length field for NewSessionTicket.ticket.encrypted_state */
731 sizeof(ticket.ticket_lifetime_hint));
743 /* Generate encrypted portion of ticket. */
812 rv = ssl3_AppendHandshakeNumber(ss, ticket.ticket_lifetime_hint,
813 sizeof(ticket.ticket_lifetime_hint));
817 message_length - sizeof(ticket.ticket_lifetime_hint) - 2, 2);
873 /* Parse the received ticket sent in by the client. We are
925 /* Get session ticket keys. */
934 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.",
939 /* If the ticket sent by the client was generated under a key different
940 * from the one we have, bypass ticket processing.
944 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.",
949 /* Verify the MAC on the ticket. MAC verification may also
993 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.",
1002 /* Decrypt the ticket. */
1162 /* Use the ticket if it has not expired, otherwise free the allocated
1163 * memory since the ticket is of no use.
1203 /* Copy over client cert from session ticket if there is one. */
1221 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.",