Home | History | Annotate | Download | only in ssl

Lines Matching full:session

257             /* receive renewed session ticket */
385 s->session->cipher = s->s3->tmp.new_cipher;
433 * record the handshake hashes at this point in the session so that
434 * any resumption of this session with ChannelID can sign those
598 /* If the configured session was created at a version higher than our
600 if (s->session &&
601 (s->session->session_id_length == 0 || s->session->not_resumable ||
602 (!SSL_IS_DTLS(s) && s->session->ssl_version > s->version) ||
603 (SSL_IS_DTLS(s) && s->session->ssl_version < s->version))) {
607 /* else use the pre-loaded session */
654 /* Session ID */
655 if (s->s3->initial_handshake_complete || s->session == NULL) {
656 /* Renegotiations do not participate in session resumption. */
659 i = s->session->session_id_length;
663 if (i > (int)sizeof(s->session->session_id)) {
667 memcpy(p, s->session->session_id, i);
794 assert(s->session == NULL || s->session->session_id_length > 0);
795 if (!s->s3->initial_handshake_complete && s->session != NULL &&
796 CBS_mem_equal(&session_id, s->session->session_id,
797 s->session->session_id_length)) {
798 if (s->sid_ctx_length != s->session->sid_ctx_length ||
799 memcmp(s->session->sid_ctx, s->sid_ctx, s->sid_ctx_length)) {
808 /* The session wasn't resumed. Create a fresh SSL_SESSION to
815 s->session->session_id_length = CBS_len(&session_id);
816 memcpy(s->session->session_id, CBS_data(&session_id), CBS_len(&session_id));
853 if (s->session->cipher != c) {
859 if (s->session->ssl_version != s->version) {
899 s->s3->tmp.extended_master_secret != s->session->extended_master_secret) {
901 if (s->session->extended_master_secret) {
994 session->sess_cert);
995 s->session->sess_cert = sc;
1036 X509_free(s->session->peer);
1037 s->session->peer = X509_up_ref(x);
1039 s->session->verify_result = s->verify_result;
1087 omitted if no identity hint is sent. Set session->sess_cert anyway to
1092 if (s->session->sess_cert == NULL) {
1093 s->session->sess_cert = ssl_sess_cert_new();
1094 if (s->session->sess_cert == NULL) {
1112 if (s->session->sess_cert != NULL) {
1113 DH_free(s->session->sess_cert->peer_dh_tmp);
1114 s->session->sess_cert->peer_dh_tmp = NULL;
1115 EC_KEY_free(s->session->sess_cert->peer_ecdh_tmp);
1116 s->session->sess_cert->peer_ecdh_tmp = NULL;
1118 s->session->sess_cert = ssl_sess_cert_new();
1119 if (s->session->sess_cert == NULL) {
1199 s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1203 s->session->sess_cert->peer_dh_tmp = dh;
1263 s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1266 X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_ECC].x509);
1270 s->session->sess_cert->peer_ecdh_tmp = ecdh;
1514 &s->session->tlsext_tick_lifetime_hint) ||
1522 if (!CBS_stow(&ticket, &s->session->tlsext_tick,
1523 &s->session->tlsext_ticklen)) {
1528 /* Generate a session ID for this session based on the session ticket. We use
1529 * the session ID mechanism for detecting ticket resumption. This also fits in
1531 if (!EVP_Digest(CBS_data(&ticket), CBS_len(&ticket), s->session->session_id,
1532 &s->session->session_id_length, EVP_sha256(), NULL)) {
1576 if (!CBS_stow(&ocsp_response, &s->session->ocsp_response,
1577 &s->session->ocsp_response_length)) {
1670 OPENSSL_free(s->session->psk_identity);
1671 s->session->psk_identity = BUF_strdup(identity);
1672 if (s->session->psk_identity == NULL) {
1698 if (s->session->sess_cert == NULL) {
1706 s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
1725 s->session->master_key_length = SSL_MAX_MASTER_KEY_LENGTH;
1753 SESS_CERT *scert = s->session->sess_cert;
1812 if (s->session->sess_cert == NULL) {
1819 if (s->session->sess_cert->peer_ecdh_tmp == NULL) {
1825 tkey = s->session->sess_cert->peer_ecdh_tmp;
1964 s->session->master_key_length = s->enc_method->generate_master_secret(
1965 s, s->session->master_key, pms, pms_len);
1966 if (s->session->master_key_length == 0) {
1969 s->session->extended_master_secret = s->s3->tmp.extended_master_secret;
2176 sc = s->session->sess_cert;
2182 dh = s->session->sess_cert->peer_dh_tmp;