Home | History | Annotate | Download | only in ssl

Lines Matching defs:ticket

483  * Clients sends a filled in session ticket if one is available, and otherwise
484 * sends an empty ticket. Servers always send empty tickets.
504 /* If we are a client then send a session ticket if one is availble.
511 if (session_ticket->ticket.data) {
513 extension_length += session_ticket->ticket.len;
518 extension_length += session_ticket->ticket.len;
530 if (session_ticket && session_ticket->ticket.data &&
532 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data,
533 session_ticket->ticket.len, 2);
950 NewSessionTicket ticket;
996 ticket.ticket_lifetime_hint = TLS_EX_SESS_TICKET_LIFETIME_HINT;
1045 /* TODO: else send an empty ticket. */
1071 + sizeof(ticket.ticket_lifetime_hint);
1077 sizeof(ticket.ticket_lifetime_hint) /* ticket_lifetime_hint */
1078 + 2 /* length field for NewSessionTicket.ticket */
1081 + 2 /* length field for NewSessionTicket.ticket.encrypted_state */
1150 sizeof(ticket.ticket_lifetime_hint));
1178 /* Generate encrypted portion of ticket. */
1253 rv = ssl3_AppendHandshakeNumber(ss, ticket.ticket_lifetime_hint,
1254 sizeof(ticket.ticket_lifetime_hint));
1258 message_length - sizeof(ticket.ticket_lifetime_hint) - 2, 2);
1314 /* Parse the received ticket sent in by the client. We are
1370 /* Get session ticket keys. */
1382 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.",
1387 /* If the ticket sent by the client was generated under a key different
1388 * from the one we have, bypass ticket processing.
1392 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.",
1397 /* Verify the MAC on the ticket. MAC verification may also
1444 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.",
1453 /* Decrypt the ticket. */
1630 /* Use the ticket if it has not expired, otherwise free the allocated
1631 * memory since the ticket is of no use.
1673 /* Copy over client cert from session ticket if there is one. */
1694 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.",