Home
last modified time | relevance | path

Searched refs:tickets (Results 1 – 25 of 50) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_num_tickets.pod10 - control the number of TLSv1.3 session tickets that are issued
25 application and set the number of TLSv1.3 session tickets that will be sent to
30 The default number of tickets is 2. Following a resumption the number of tickets
33 0 then no tickets will be issued for either a normal connection or a resumption.
37 L<SSL_verify_client_post_handshake(3)>. These new tickets will be associated
39 verification status). The number of tickets issued will normally be the same as
42 SSL_verify_client_post_handshake() to update the number of tickets that will be
45 To issue tickets after other events (such as application-layer changes),
47 ticket be sent when it is safe to do so. New tickets are only allowed to be
56 request additional tickets be sent; all such requests are queued and written
[all …]
H A DSSL_CTX_set_options.pod266 session tickets.
273 When using stateless session tickets the server uses a session ticket encryption
280 The TLSv1.3 protocol only supports tickets and does not directly support session
282 and stateless. Stateless tickets work the same way as in TLSv1.2 and below.
283 Stateful tickets mimic the session id behaviour available in TLSv1.2 and below.
286 presents a ticket in the same way as for stateless tickets. The server can then
290 By default OpenSSL will use stateless tickets. The SSL_OP_NO_TICKET option will
291 cause stateless tickets to not be issued. In TLSv1.2 and below this means no
295 In TLSv1.3 it is possible to suppress all tickets (stateful and stateless) from
H A DSSL_CTX_set_timeout.pod46 tickets. It is also used as the timeout value within the ticket itself.
51 For TLSv1.2, tickets generated during an initial handshake use the value
H A DSSL_CTX_set_tlsext_ticket_key_cb.pod30 session tickets for the ssl context I<sslctx>. Session tickets, defined in
55 For new sessions tickets, when the client doesn't present a session ticket, or
H A DSSL_CTX_set_session_ticket_cb.pod52 tickets. It can be called at any time before a session ticket is created to
54 and tickets are created by the handshake, the B<gen_cb> is provided to notify
H A DSSL_CTX_set_cert_verify_callback.pod60 This gets recorded in the SSL session (and thus also in session tickets)
H A DSSL_get_session.pod43 sent, or if no session tickets were sent then the session for the current
/freebsd/crypto/openssl/test/ssl-tests/
H A D06-sni-ticket.cnf.in10 ## Test SNI/Session tickets
20 #Note: MaxProtocol is set to TLSv1.2 as session tickets work differently in
61 # If the client has session tickets disabled, then No support
62 # If the server initial_ctx has session tickets disabled, then No support
63 # If SNI is in use, then if the "switched-to" context has session tickets disabled,
/freebsd/crypto/heimdal/lib/krb5/
H A Dget_for_creds.c267 ALLOC_SEQ(&cred.tickets, 1); in krb5_get_forwarded_creds()
268 if (cred.tickets.val == NULL) { in krb5_get_forwarded_creds()
275 cred.tickets.val, &len); in krb5_get_forwarded_creds()
H A Dget_cred.c982 krb5_creds **tickets; in get_cred_kdc_referral() local
1019 tickets = *ret_tgts; in get_cred_kdc_referral()
1024 while(tickets && *tickets){ in get_cred_kdc_referral()
1028 *tickets)) in get_cred_kdc_referral()
1038 tickets++; in get_cred_kdc_referral()
H A Dkrb_err.et51 ec INTK_W_NOTALL, "Kerberos 4: not all tickets returned"
H A Drd_cred.c271 &cred.tickets.val[i], &len, ret); in krb5_rd_cred()
/freebsd/crypto/heimdal/lib/asn1/
H A Ddigest.asn163 tickets [1] SEQUENCE OF OCTET STRING OPTIONAL,
100 tickets [3] SEQUENCE OF OCTET STRING OPTIONAL
H A Dkrb5.asn1463 additional-tickets[11] SEQUENCE OF Ticket OPTIONAL
579 tickets[2] SEQUENCE OF Ticket,
/freebsd/crypto/heimdal/appl/login/
H A DChangeLog45 v4 authentication or done a 5to4 conversion of tickets. This is to
144 decide whether to get kerberos 4 tickets
202 * login.c: allow conversion of v5 -> v4 tickets when logging in
203 with forwarded tickets
/freebsd/crypto/heimdal/kuser/
H A Dkcc-commands.in37 help = "List kerberos tickets"
54 help = "test for having tickets"
H A Dkdigest-commands.in179 help = "Where the the credential cache is created when the KDC returns tickets"
/freebsd/crypto/heimdal/
H A DNEWS375 * kdc: stop clients from renewing tickets into the future
635 * login will get v4 tickets when it receives forwarded tickets
651 * klist supports listing v4 tickets
657 * support for anonymous tickets
724 tickets)
876 * kgetcred: new program for explicitly obtaining tickets
890 * postdated tickets work
H A DChangeLog.2006858 * kuser/Makefile.am: Add tool for printing tickets.
860 * kuser/kimpersonate.1: Add tool for printing tickets.
862 * kuser/kimpersonate.c: Add tool for printing tickets.
891 * kdc/kerberos5.c: Signing outgoing tickets.
893 * kdc/krb5tgs.c: Add signing and checking of tickets to s4u2self
944 used to control the address-lessness of the initial tickets
1079 * lib/krb5/krb5_locl.h: Default to address-less tickets.
1231 * lib/krb5/get_cred.c: Allow setting additional tickets in the
/freebsd/contrib/arm-optimized-routines/
H A DREADME.contributors35 information (such as Jira tickets, or internal discussions). Non-obvious
/freebsd/crypto/heimdal/doc/
H A Dmisc.texi43 To make the Heimdal KDC produce tickets that the Cisco can decode you
H A Dapps.texi246 To differentiate between Kerberos 4 tickets and Kerberos 5 tickets, 2b
/freebsd/crypto/heimdal/lib/hdb/
H A Dhdb.asn146 trusted-for-delegation(14), -- Trusted to print forwardabled tickets
/freebsd/contrib/elftoolchain/
H A DREADME.rst111 .. _`bug tracker`: https://sourceforge.net/p/elftoolchain/tickets/
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-s_server.pod.in394 Disable caching and tickets if ephemeral (EC)DH is used.
625 Control the number of tickets that will be sent to the client after a full
626 handshake in TLSv1.3. The default number of tickets is 2. This option does not
627 affect the number of tickets sent after a resumption handshake.

12