Lines Matching full:session
261 /* receive renewed session ticket */
391 ssl->session->cipher = ssl->s3->tmp.new_cipher;
439 * record the handshake hashes at this point in the session so that
440 * any resumption of this session with ChannelID can sign those
553 /* Renegotiations do not participate in session resumption. */
679 /* If the configured session has expired or was created at a version higher
681 if (ssl->session != NULL &&
682 (ssl->session->session_id_length == 0 || ssl->session->not_resumable ||
683 ssl->session->timeout < (long)(time(NULL) - ssl->session->time) ||
684 (!SSL_IS_DTLS(ssl) && ssl->session->ssl_version > ssl->version) ||
685 (SSL_IS_DTLS(ssl) && ssl->session->ssl_version < ssl->version))) {
697 /* Renegotiations do not participate in session resumption. */
698 int has_session = ssl->session != NULL &&
708 !CBB_add_bytes(&child, ssl->session->session_id,
709 ssl->session->session_id_length))) {
808 assert(ssl->session == NULL || ssl->session->session_id_length > 0);
809 if (!ssl->s3->initial_handshake_complete && ssl->session != NULL &&
810 CBS_mem_equal(&session_id, ssl->session->session_id,
811 ssl->session->session_id_length)) {
812 if (ssl->sid_ctx_length != ssl->session->sid_ctx_length ||
813 memcmp(ssl->session->sid_ctx, ssl->sid_ctx, ssl->sid_ctx_length)) {
822 /* The session wasn't resumed. Create a fresh SSL_SESSION to
829 ssl->session->session_id_length = CBS_len(&session_id);
830 memcpy(ssl->session->session_id, CBS_data(&session_id),
860 if (ssl->session->cipher != c) {
865 if (ssl->session->ssl_version != ssl->version) {
908 ssl->session->extended_master_secret) {
910 if (ssl->session->extended_master_secret) {
1037 sk_X509_pop_free(ssl->session->cert_chain, X509_free);
1038 ssl->session->cert_chain = sk;
1041 X509_free(ssl->session->peer);
1042 ssl->session->peer = X509_up_ref(leaf);
1044 ssl->session->verify_result = ssl->verify_result;
1164 ssl->session->key_exchange_info = DH_num_bits(dh);
1165 if (ssl->session->key_exchange_info < 1024) {
1168 } else if (ssl->session->key_exchange_info > 4096) {
1200 ssl->session->key_exchange_info = curve_id;
1232 pkey = X509_get_pubkey(ssl->session->peer);
1460 /* The server is sending a new ticket for an existing session. Sessions are
1462 * existing session. */
1465 if (!SSL_SESSION_to_bytes_for_ticket(ssl->session, &bytes, &bytes_len)) {
1476 SSL_SESSION_free(ssl->session);
1477 ssl->session = new_session;
1480 if (!CBS_stow(&ticket, &ssl->session->tlsext_tick,
1481 &ssl->session->tlsext_ticklen)) {
1485 ssl->session->tlsext_tick_lifetime_hint = ticket_lifetime_hint;
1487 /* Generate a session ID for this session based on the session ticket. We use
1488 * the session ID mechanism for detecting ticket resumption. This also fits in
1490 if (!EVP_Digest(CBS_data(&ticket), CBS_len(&ticket), ssl->session->session_id,
1491 &ssl->session->session_id_length, EVP_sha256(), NULL)) {
1535 if (!CBS_stow(&ocsp_response, &ssl->session->ocsp_response,
1536 &ssl->session->ocsp_response_length)) {
1612 OPENSSL_free(ssl->session->psk_identity);
1613 ssl->session->psk_identity = BUF_strdup(identity);
1614 if (ssl->session->psk_identity == NULL) {
1638 EVP_PKEY *pkey = X509_get_pubkey(ssl->session->peer);
1650 ssl->session->key_exchange_info = EVP_PKEY_bits(pkey);
1758 ssl->session->master_key_length = ssl->enc_method->generate_master_secret(
1759 ssl, ssl->session->master_key, pms, pms_len);
1760 if (ssl->session->master_key_length == 0) {
1763 ssl->session->extended_master_secret = ssl->s3->tmp.extended_master_secret;
2082 session->cert_chain);