Lines Matching full:session
609 * ssl_cipher_get_disabled this applies to a specific session and not global
717 assert(ssl->session->tlsext_hostname == NULL);
718 ssl->session->tlsext_hostname = BUF_strdup(ssl->tlsext_hostname);
719 if (!ssl->session->tlsext_hostname) {
739 * - The servername field is maintained together with the session cache.
740 * - When a session is resumed, the servername callback is invoked in order
742 * - The servername is acknowledged if it is new for a session or when
743 * it is identical to a previously used for the same session.
752 * session,
753 * i.e. when the session has been established with a servername extension.
796 assert(ssl->session->tlsext_hostname == NULL);
797 if (ssl->session->tlsext_hostname) {
803 if (!CBS_strdup(&host_name, &ssl->session->tlsext_hostname)) {
818 ssl->session->tlsext_hostname == NULL) {
978 * https://tools.ietf.org/html/draft-ietf-tls-session-hash-05 */
1039 /* Session tickets.
1051 /* Renegotiation does not participate in session resumption. However, still
1056 ssl->session != NULL &&
1057 ssl->session->tlsext_tick != NULL) {
1058 ticket_data = ssl->session->tlsext_tick;
1059 ticket_len = ssl->session->tlsext_ticklen;
1415 /* Session resumption uses the original session information. */
1417 !CBS_stow(contents, &ssl->session->tlsext_signed_cert_timestamp_list,
1418 &ssl->session->tlsext_signed_cert_timestamp_list_length)) {
2515 * session material and HMAC. */
2565 /* Decrypt the session data. */
2585 /* Decode the session. */
2586 SSL_SESSION *session = SSL_SESSION_from_bytes(plaintext, len1 + len2);
2587 if (session == NULL) {
2592 /* Copy the client's session ID into the new session, to denote the ticket has
2594 memcpy(session->session_id, session_id, session_id_len);
2595 session->session_id_length = session_id_len;
2597 *out_session = session;
2788 if (ssl->session->original_handshake_hash_len == 0) {
2792 EVP_DigestUpdate(&ctx, ssl->session->original_handshake_hash,
2793 ssl->session->original_handshake_hash_len);
2815 * hashes in |ssl->session| so that Channel ID resumptions can sign that
2819 /* This function should never be called for a resumed session because the
2827 tls1_handshake_digest(ssl, ssl->session->original_handshake_hash,
2828 sizeof(ssl->session->original_handshake_hash));
2833 ssl->session->original_handshake_hash_len = digest_len;