Home | History | Annotate | Download | only in ssl

Lines Matching defs:ticket

496  * Clients sends a filled in session ticket if one is available, and otherwise
497 * sends an empty ticket. Servers always send empty tickets.
518 /* If we are a client then send a session ticket if one is availble.
532 if (session_ticket->ticket.data) {
534 extension_length += session_ticket->ticket.len;
539 extension_length += session_ticket->ticket.len;
551 if (session_ticket && session_ticket->ticket.data &&
553 rv = ssl3_AppendHandshakeVariable(ss, session_ticket->ticket.data,
554 session_ticket->ticket.len, 2);
989 NewSessionTicket ticket;
1035 ticket.ticket_lifetime_hint = TLS_EX_SESS_TICKET_LIFETIME_HINT;
1084 /* TODO: else send an empty ticket. */
1110 + sizeof(ticket.ticket_lifetime_hint);
1116 sizeof(ticket.ticket_lifetime_hint) /* ticket_lifetime_hint */
1117 + 2 /* length field for NewSessionTicket.ticket */
1120 + 2 /* length field for NewSessionTicket.ticket.encrypted_state */
1189 sizeof(ticket.ticket_lifetime_hint));
1217 /* Generate encrypted portion of ticket. */
1292 rv = ssl3_AppendHandshakeNumber(ss, ticket.ticket_lifetime_hint,
1293 sizeof(ticket.ticket_lifetime_hint));
1297 message_length - sizeof(ticket.ticket_lifetime_hint) - 2, 2);
1353 /* Parse the received ticket sent in by the client. We are
1409 /* Get session ticket keys. */
1421 SSL_DBG(("%d: SSL[%d]: Unable to get/generate session ticket keys.",
1426 /* If the ticket sent by the client was generated under a key different
1427 * from the one we have, bypass ticket processing.
1431 SSL_DBG(("%d: SSL[%d]: Session ticket key_name sent mismatch.",
1436 /* Verify the MAC on the ticket. MAC verification may also
1483 SSL_DBG(("%d: SSL[%d]: Session ticket MAC mismatch.",
1492 /* Decrypt the ticket. */
1669 /* Use the ticket if it has not expired, otherwise free the allocated
1670 * memory since the ticket is of no use.
1712 /* Copy over client cert from session ticket if there is one. */
1733 SSL_DBG(("%d: SSL[%d]: Session ticket parsing failed.",