Lines Matching refs:ticket

372                           ("client hello, adding session ticket extension"));
374 /* The addition is safe here since the ticket length is 16 bit. */
385 if (ssl->session_negotiate->ticket == NULL || tlen == 0) {
390 ("sending session ticket of length %" MBEDTLS_PRINTF_SIZET, tlen));
392 memcpy(p, ssl->session_negotiate->ticket, tlen);
793 ("non-matching session ticket extension"));
3380 unsigned char *ticket;
3383 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse new session ticket"));
3391 MBEDTLS_SSL_DEBUG_MSG(1, ("bad new session ticket message"));
3402 * opaque ticket<0..2^16-1>;
3407 * 6 . 5+n ticket content
3411 MBEDTLS_SSL_DEBUG_MSG(1, ("bad new session ticket message"));
3424 MBEDTLS_SSL_DEBUG_MSG(1, ("bad new session ticket message"));
3430 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket length: %" MBEDTLS_PRINTF_SIZET, ticket_len));
3437 * Zero-length ticket means the server changed his mind and doesn't want
3438 * to send a ticket after all, so just forget it
3444 if (ssl->session != NULL && ssl->session->ticket != NULL) {
3445 mbedtls_zeroize_and_free(ssl->session->ticket,
3447 ssl->session->ticket = NULL;
3451 mbedtls_zeroize_and_free(ssl->session_negotiate->ticket,
3453 ssl->session_negotiate->ticket = NULL;
3456 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) {
3457 MBEDTLS_SSL_DEBUG_MSG(1, ("ticket alloc failed"));
3463 memcpy(ticket, msg + 6, ticket_len);
3465 ssl->session_negotiate->ticket = ticket;
3471 * "If the client receives a session ticket from the server, then it
3474 MBEDTLS_SSL_DEBUG_MSG(3, ("ticket in use, discarding session id"));
3477 MBEDTLS_SSL_DEBUG_MSG(2, ("<= parse new session ticket"));