/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 60 final byte[] ticketNonce; field in NewSessionTicket.NewSessionTicketMessage 66 byte[] ticketNonce, byte[] ticket) { in NewSessionTicketMessage() argument 71 this.ticketNonce = ticketNonce; in NewSessionTicketMessage() 94 this.ticketNonce = Record.getBytes8(m); in NewSessionTicketMessage() 130 return 8 + ticketNonce.length + 1 + in messageLength() 138 hos.putBytes8(ticketNonce); in send() 166 Utilities.toHexString(ticketNonce), in toString() 369 nstm.ticketNonce); in consume()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 60 final byte[] ticketNonce; field in NewSessionTicket.NewSessionTicketMessage 66 byte[] ticketNonce, byte[] ticket) { in NewSessionTicketMessage() argument 71 this.ticketNonce = ticketNonce; in NewSessionTicketMessage() 94 this.ticketNonce = Record.getBytes8(m); in NewSessionTicketMessage() 130 return 8 + ticketNonce.length + 1 + in messageLength() 138 hos.putBytes8(ticketNonce); in send() 166 Utilities.toHexString(ticketNonce), in toString() 369 nstm.ticketNonce); in consume()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 60 final byte[] ticketNonce; field in NewSessionTicket.NewSessionTicketMessage 66 byte[] ticketNonce, byte[] ticket) { in NewSessionTicketMessage() argument 71 this.ticketNonce = ticketNonce; in NewSessionTicketMessage() 94 this.ticketNonce = Record.getBytes8(m); in NewSessionTicketMessage() 130 return 8 + ticketNonce.length + 1 + in messageLength() 138 hos.putBytes8(ticketNonce); in send() 166 Utilities.toHexString(ticketNonce), in toString() 369 nstm.ticketNonce); in consume()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 60 final byte[] ticketNonce; field in NewSessionTicket.NewSessionTicketMessage 66 byte[] ticketNonce, byte[] ticket) { in NewSessionTicketMessage() argument 71 this.ticketNonce = ticketNonce; in NewSessionTicketMessage() 94 this.ticketNonce = Record.getBytes8(m); in NewSessionTicketMessage() 130 return 8 + ticketNonce.length + 1 + in messageLength() 138 hos.putBytes8(ticketNonce); in send() 166 Utilities.toHexString(ticketNonce), in toString() 369 nstm.ticketNonce); in consume()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 61 final byte[] ticketNonce; field in NewSessionTicket.NewSessionTicketMessage 67 byte[] ticketNonce, byte[] ticket) { in NewSessionTicketMessage() argument 72 this.ticketNonce = ticketNonce; in NewSessionTicketMessage() 95 this.ticketNonce = Record.getBytes8(m); in NewSessionTicketMessage() 131 return 8 + ticketNonce.length + 1 + in messageLength() 139 hos.putBytes8(ticketNonce); in send() 167 Utilities.toHexString(ticketNonce), in toString() 370 nstm.ticketNonce); in consume()
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 162 byte[] ticketNonce; field in NewSessionTicket.T13NewSessionTicketMessage 167 byte[] ticketNonce, byte[] ticket) { in T13NewSessionTicketMessage() argument 172 this.ticketNonce = ticketNonce; in T13NewSessionTicketMessage() 196 this.ticketNonce = Record.getBytes8(m); in T13NewSessionTicketMessage() 233 return ticketNonce; in getTicketNonce() 246 1 + ticketNonce.length + // len of nonce + nonce in messageLength() 255 hos.putBytes8(ticketNonce); in send() 286 Utilities.toHexString(ticketNonce), in toString()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 163 byte[] ticketNonce; field in NewSessionTicket.T13NewSessionTicketMessage 168 byte[] ticketNonce, byte[] ticket) { in T13NewSessionTicketMessage() argument 173 this.ticketNonce = ticketNonce; in T13NewSessionTicketMessage() 197 this.ticketNonce = Record.getBytes8(m); in T13NewSessionTicketMessage() 234 return ticketNonce; in getTicketNonce() 247 1 + ticketNonce.length + // len of nonce + nonce in messageLength() 256 hos.putBytes8(ticketNonce); in send() 287 Utilities.toHexString(ticketNonce), in toString()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 163 byte[] ticketNonce; field in NewSessionTicket.T13NewSessionTicketMessage 168 byte[] ticketNonce, byte[] ticket) { in T13NewSessionTicketMessage() argument 173 this.ticketNonce = ticketNonce; in T13NewSessionTicketMessage() 197 this.ticketNonce = Record.getBytes8(m); in T13NewSessionTicketMessage() 234 return ticketNonce; in getTicketNonce() 247 1 + ticketNonce.length + // len of nonce + nonce in messageLength() 256 hos.putBytes8(ticketNonce); in send() 287 Utilities.toHexString(ticketNonce), in toString()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 163 byte[] ticketNonce; field in NewSessionTicket.T13NewSessionTicketMessage 168 byte[] ticketNonce, byte[] ticket) { in T13NewSessionTicketMessage() argument 173 this.ticketNonce = ticketNonce; in T13NewSessionTicketMessage() 197 this.ticketNonce = Record.getBytes8(m); in T13NewSessionTicketMessage() 234 return ticketNonce; in getTicketNonce() 247 1 + ticketNonce.length + // len of nonce + nonce in messageLength() 256 hos.putBytes8(ticketNonce); in send() 287 Utilities.toHexString(ticketNonce), in toString()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/ssl/ |
H A D | NewSessionTicket.java | 162 byte[] ticketNonce; field in NewSessionTicket.T13NewSessionTicketMessage 167 byte[] ticketNonce, byte[] ticket) { in T13NewSessionTicketMessage() argument 172 this.ticketNonce = ticketNonce; in T13NewSessionTicketMessage() 196 this.ticketNonce = Record.getBytes8(m); in T13NewSessionTicketMessage() 233 return ticketNonce; in getTicketNonce() 246 1 + ticketNonce.length + // len of nonce + nonce in messageLength() 255 hos.putBytes8(ticketNonce); in send() 286 Utilities.toHexString(ticketNonce), in toString()
|
/dports/security/fizz/fizz-2021.12.27.00/fizz/protocol/ |
H A D | KeyScheduler.cpp | 228 folly::ByteRange ticketNonce) const { in getResumptionSecret() 232 folly::IOBuf::wrapBuffer(ticketNonce), in getResumptionSecret()
|
H A D | KeyScheduler.h | 144 folly::ByteRange ticketNonce) const;
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/ssl/ |
H A D | tls13con.c | 4430 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; in tls13_SendNewSessionTicket() local 4431 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); in tls13_SendNewSessionTicket() 4434 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); in tls13_SendNewSessionTicket() 4449 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, in tls13_SendNewSessionTicket() 4450 sizeof(ticketNonce)); in tls13_SendNewSessionTicket() 4454 ++ss->ssl3.hs.ticketNonce; in tls13_SendNewSessionTicket() 4457 ticketNonce, sizeof(ticketNonce), in tls13_SendNewSessionTicket() 4475 1 + sizeof(ticketNonce) + /* ticket_nonce */ in tls13_SendNewSessionTicket() 4495 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1); in tls13_SendNewSessionTicket()
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/tls-tris/ |
H A D | 13.go | 771 ticketNonce := []byte{byte(i)} 772 …sessionState.pskSecret = hkdfExpandLabel(hash, resumptionMasterSecret, ticketNonce, "resumption", … 804 nonce: ticketNonce,
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/tls-tris/ |
H A D | 13.go | 771 ticketNonce := []byte{byte(i)} 772 …sessionState.pskSecret = hkdfExpandLabel(hash, resumptionMasterSecret, ticketNonce, "resumption", … 804 nonce: ticketNonce,
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/ssl/ |
H A D | tls13con.c | 4957 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; in tls13_SendNewSessionTicket() local 4958 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); in tls13_SendNewSessionTicket() 4961 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); in tls13_SendNewSessionTicket() 4976 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, in tls13_SendNewSessionTicket() 4977 sizeof(ticketNonce)); in tls13_SendNewSessionTicket() 4981 ++ss->ssl3.hs.ticketNonce; in tls13_SendNewSessionTicket() 4984 ticketNonce, sizeof(ticketNonce), in tls13_SendNewSessionTicket() 5003 1 + sizeof(ticketNonce) + /* ticket_nonce */ in tls13_SendNewSessionTicket() 5023 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1); in tls13_SendNewSessionTicket()
|
/dports/security/fizz/fizz-2021.12.27.00/fizz/server/ |
H A D | ServerProtocol.cpp | 1756 auto ticketNonce = folly::IOBuf::create(0); in generateTicket() local 1758 folly::range(resumptionMasterSecret), ticketNonce->coalesce()); in generateTicket() 1778 ticketNonce = std::move(ticketNonce)]( in generateTicket() 1789 std::move(ticketNonce), in generateTicket()
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/ssl/ |
H A D | tls13con.c | 5226 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; 5227 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); 5230 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); 5245 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, 5246 sizeof(ticketNonce)); 5250 ++ss->ssl3.hs.ticketNonce; 5253 ticketNonce, sizeof(ticketNonce), 5272 1 + sizeof(ticketNonce) + /* ticket_nonce */ 5292 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1);
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/ssl/ |
H A D | tls13con.c | 5226 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; local 5227 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); 5230 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); 5245 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, 5246 sizeof(ticketNonce)); 5250 ++ss->ssl3.hs.ticketNonce; 5253 ticketNonce, sizeof(ticketNonce), 5272 1 + sizeof(ticketNonce) + /* ticket_nonce */ 5292 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1);
|
/dports/www/firefox/firefox-99.0/security/nss/lib/ssl/ |
H A D | tls13con.c | 5263 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; local 5264 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); 5267 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); 5282 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, 5283 sizeof(ticketNonce)); 5287 ++ss->ssl3.hs.ticketNonce; 5290 ticketNonce, sizeof(ticketNonce), 5309 1 + sizeof(ticketNonce) + /* ticket_nonce */ 5329 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1);
|
/dports/security/nss/nss-3.76.1/nss/lib/ssl/ |
H A D | tls13con.c | 5263 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; local 5264 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); 5267 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); 5282 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, 5283 sizeof(ticketNonce)); 5287 ++ss->ssl3.hs.ticketNonce; 5290 ticketNonce, sizeof(ticketNonce), 5309 1 + sizeof(ticketNonce) + /* ticket_nonce */ 5329 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1);
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/ssl/ |
H A D | tls13con.c | 5226 PRUint8 ticketNonce[sizeof(ss->ssl3.hs.ticketNonce)]; local 5227 sslBuffer ticketNonceBuf = SSL_BUFFER(ticketNonce); 5230 SSL_GETPID(), ss->fd, ss->ssl3.hs.ticketNonce)); 5245 rv = sslBuffer_AppendNumber(&ticketNonceBuf, ss->ssl3.hs.ticketNonce, 5246 sizeof(ticketNonce)); 5250 ++ss->ssl3.hs.ticketNonce; 5253 ticketNonce, sizeof(ticketNonce), 5272 1 + sizeof(ticketNonce) + /* ticket_nonce */ 5292 rv = ssl3_AppendHandshakeVariable(ss, ticketNonce, sizeof(ticketNonce), 1);
|
/dports/security/wolfssl/wolfssl-5.1.0/src/ |
H A D | tls13.c | 2771 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in SetupPskKey() 2772 ssl->session.ticketNonce.len, ssl->arrays->psk_key)) != 0) { in SetupPskKey() 4046 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in DoPreSharedKeys() 7450 ssl->session.ticketNonce.len = nonceLength; in DoTls13NewSessionTicket() 7452 XMEMCPY(&ssl->session.ticketNonce.data, nonce, nonceLength); in DoTls13NewSessionTicket() 7622 if (ssl->session.ticketNonce.len == 0) { in SendTls13NewSessionTicket() 7623 ssl->session.ticketNonce.len = DEF_TICKET_NONCE_SZ; in SendTls13NewSessionTicket() 7624 ssl->session.ticketNonce.data[0] = 0; in SendTls13NewSessionTicket() 7627 ssl->session.ticketNonce.data[0]++; in SendTls13NewSessionTicket() 7671 output[idx++] = ssl->session.ticketNonce.len; in SendTls13NewSessionTicket() [all …]
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/src/ |
H A D | tls13.c | 2771 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in SetupPskKey() 2772 ssl->session.ticketNonce.len, ssl->arrays->psk_key)) != 0) { in SetupPskKey() 4046 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in DoPreSharedKeys() 7450 ssl->session.ticketNonce.len = nonceLength; in DoTls13NewSessionTicket() 7452 XMEMCPY(&ssl->session.ticketNonce.data, nonce, nonceLength); in DoTls13NewSessionTicket() 7622 if (ssl->session.ticketNonce.len == 0) { in SendTls13NewSessionTicket() 7623 ssl->session.ticketNonce.len = DEF_TICKET_NONCE_SZ; in SendTls13NewSessionTicket() 7624 ssl->session.ticketNonce.data[0] = 0; in SendTls13NewSessionTicket() 7627 ssl->session.ticketNonce.data[0]++; in SendTls13NewSessionTicket() 7671 output[idx++] = ssl->session.ticketNonce.len; in SendTls13NewSessionTicket() [all …]
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/src/ |
H A D | tls13.c | 2771 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in SetupPskKey() 2772 ssl->session.ticketNonce.len, ssl->arrays->psk_key)) != 0) { in SetupPskKey() 4046 if ((ret = DeriveResumptionPSK(ssl, ssl->session.ticketNonce.data, in DoPreSharedKeys() 7450 ssl->session.ticketNonce.len = nonceLength; in DoTls13NewSessionTicket() 7452 XMEMCPY(&ssl->session.ticketNonce.data, nonce, nonceLength); in DoTls13NewSessionTicket() 7622 if (ssl->session.ticketNonce.len == 0) { in SendTls13NewSessionTicket() 7623 ssl->session.ticketNonce.len = DEF_TICKET_NONCE_SZ; in SendTls13NewSessionTicket() 7624 ssl->session.ticketNonce.data[0] = 0; in SendTls13NewSessionTicket() 7627 ssl->session.ticketNonce.data[0]++; in SendTls13NewSessionTicket() 7671 output[idx++] = ssl->session.ticketNonce.len; in SendTls13NewSessionTicket() [all …]
|