Lines Matching refs:ticket

686            session != NULL && session->ticket != NULL &&
716 *identity = session->ticket;
934 /* The ticket age has been checked to be smaller than the
937 * cast to `uint32_t` of the ticket age is safe. */
2249 * In case the client has proposed a PSK associated with a ticket,
2251 * identifier of the ciphersuite associated with the ticket. This is that
2254 * ticket ciphersuite (see above). This information is not needed
2827 * opaque ticket<1..2^16-1>;
2843 unsigned char *ticket;
2883 MBEDTLS_SSL_DEBUG_BUF(3, "received ticket", p, ticket_len);
2885 /* Check if we previously received a ticket already. */
2886 if (session->ticket != NULL || session->ticket_len > 0) {
2887 mbedtls_free(session->ticket);
2888 session->ticket = NULL;
2892 if ((ticket = mbedtls_calloc(1, ticket_len)) == NULL) {
2893 MBEDTLS_SSL_DEBUG_MSG(1, ("ticket alloc failed"));
2896 memcpy(ticket, p, ticket_len);
2898 session->ticket = ticket;
2910 MBEDTLS_SSL_DEBUG_BUF(3, "ticket extension", p, extensions_len);
2925 * application that a valid ticket has been received.
2927 * connection alive but we do not signal the ticket to the application.
2947 /* Store ticket creation time */
2986 "Creating the ticket-resumed PSK failed",
3017 MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse new session ticket"));
3024 * We are about to update (maybe only partially) ticket data thus block
3039 * All good, we have received a new valid ticket, session data can
3040 * be exported now and we signal the ticket to the application.
3048 MBEDTLS_SSL_DEBUG_MSG(2, ("Discard new session ticket"));
3059 MBEDTLS_SSL_DEBUG_MSG(2, ("<= parse new session ticket"));