Lines Matching defs:session

585         SSL_SESSION_free(s->session);
586 s->session = NULL;
927 * we can "construct" a session to give us the desired check - i.e. to
928 * find if there's a session in the hash table that would conflict with
929 * any new session built out of this id/id_len and the ssl_version in use
1177 if (s->session != NULL) {
1179 SSL_SESSION_free(s->session);
1543 if ((s == NULL) || (s->session == NULL))
1546 r = s->session->peer;
1560 if ((s == NULL) || (s->session == NULL))
1563 r = s->session->peer_chain;
2021 || ((s->session == NULL || s->session->ext.max_early_data == 0)
2266 if (!s->session || SSL_in_init(s) || ossl_statem_get_in_handshake(s))
2268 if (s->session->flags & SSL_SESS_FLAG_EXTMS)
2679 * In TLSv1.3 on the server SNI is not associated with the session
2694 return s->session->ext.hostname;
2703 * attempted and the session from the original handshake had a
2709 * - If the session from the original handshake had a servername accepted
2720 && s->session != NULL
2721 && s->session->ssl_version != TLS1_3_VERSION)
2722 return s->session->ext.hostname;
2724 if (!SSL_IS_TLS13(s) && s->hit && s->session->ext.hostname != NULL)
2725 return s->session->ext.hostname;
2967 if (s->session == NULL
3013 * session with a matching session ID.
3184 * session ticket, and the client will accordingly send us early data
3207 /* By default we send two session tickets automatically in TLSv1.3 */
3249 * Free internal session cache. However: the remove_cb() may reference
3252 * As the ex_data handling routines might also touch the session cache,
3520 if (s->session->session_id_length == 0)
3525 * associated with this session, so when we try to resume it and
3527 * indication that this is actually a session for the proper application
3532 if (s->server && s->session->sid_ctx_length == 0
3540 * Add the session to the internal cache. In server side TLSv1.3 we
3542 * with only a dummy session id so there is no reason to cache it,
3547 * session timeout events
3557 SSL_CTX_add_session(s->session_ctx, s->session);
3560 * Add the session to the external cache. We do this even in server side
3562 * know about the creation of a session and aren't doing a full cache.
3565 SSL_SESSION_up_ref(s->session);
3566 if (!s->session_ctx->new_session_cb(s, s->session))
3567 SSL_SESSION_free(s->session);
3860 * Otherwise, copy configuration state, and session if set.
3865 if (s->session != NULL) {
3867 * Arranges to share the same session via up_ref. This "copies"
3868 * session-id, SSL_METHOD, sid_ctx, and 'cert'
3874 * No session has been established yet, so we have to expect that
4004 if ((s->session != NULL) && (s->session->cipher != NULL))
4005 return s->session->cipher;
4139 * If the session ID context matches that of the parent SSL_CTX,
4246 size_t SSL_SESSION_get_master_key(const SSL_SESSION *session,
4250 return session->master_key_length;
4251 if (outlen > session->master_key_length)
4252 outlen = session->master_key_length;
4253 memcpy(out, session->master_key, outlen);
4371 if (s == NULL || s->session == NULL)
4373 return s->session->psk_identity_hint;
4378 if (s == NULL || s->session == NULL)
4380 return s->session->psk_identity;
4858 X509 *cert = s->session != NULL ? s->session->peer : NULL;
4978 X509 *cert = s->session != NULL ? s->session->peer : NULL;
5058 * With SSL_VERIFY_NONE the session may be cached and re-used despite a
5065 * session.
5582 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session))
5583 return GET_MAX_FRAGMENT_LENGTH(ssl->session);
5592 if (ssl->session != NULL && USE_MAX_FRAGMENT_LENGTH_EXT(ssl->session)
5593 && ssl->split_send_fragment > GET_MAX_FRAGMENT_LENGTH(ssl->session))
5594 return GET_MAX_FRAGMENT_LENGTH(ssl->session);