Home | History | Annotate | Download | only in ssl

Lines Matching full:ticket

534  		 * rest for ticket
1330 /* session ticket processed earlier */
2005 * any TLS session ticket extension at the same time.
2008 * read past the end of this in order to parse out the session ticket
2012 * ret: (output) on return, if a ticket was decrypted, then this is set to
2020 * -1: fatal error, either from parsing or decrypting the ticket.
2021 * 0: no ticket was found (or was ignored, based on settings).
2024 * 2: either s->tls_session_secret_cb was set, or a ticket was offered but
2026 * 3: a ticket was successfully decrypted and *ret was set.
2030 * a new session ticket to the client because the client indicated support
2032 * a session ticket or we couldn't use the one it gave us, or if
2033 * s->ctx->tlsext_ticket_key_cb asked to renew the client's ticket.
2046 /* If tickets disabled behave as if no ticket present
2089 /* The client will accept a ticket but doesn't
2096 /* Indicate that the ticket couldn't be
2098 * from ticket now, trigger abbreviated
2106 case 2: /* ticket couldn't be decrypted */
2109 case 3: /* ticket was decrypted */
2111 case 4: /* ticket decrypted but need to renew */
2123 /* tls_decrypt_ticket attempts to decrypt a session ticket.
2125 * etick: points to the body of the session ticket extension.
2129 * psess: (output) on return, if a ticket was decrypted, then this is set to
2133 * -1: fatal error, either from parsing or decrypting the ticket.
2134 * 2: the ticket couldn't be decrypted.
2135 * 3: a ticket was successfully decrypted and *psess was set.
2136 * 4: same as 3, but the ticket needs to be renewed.
2153 /* Initialize session ticket encryption and HMAC contexts */
2178 /* Attempt to process session ticket, first conduct sanity and
2179 * integrity checks on ticket.
2188 /* Check HMAC of encrypted ticket */
2195 /* Move p after IV to start of encrypted ticket, update length */
2216 * detect that the ticket has been accepted. So we copy it to
2231 * ticket. */