• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/

Lines Matching refs:session

71 	return(ssl->session);
79 * somebody doesn't free ssl->session between when we check it's
82 sess = ssl->session;
136 /* Even with SSLv2, we have 16 bytes (128 bits) of session ID space. SSLv3/TLSv1
162 * to atomically check whether a session ID already exists
169 int ssl_get_new_session(SSL *s, int session)
185 if (s->session != NULL)
187 SSL_SESSION_free(s->session);
188 s->session=NULL;
191 if (session)
219 /* Choose which callback will set the session ID */
226 /* Choose a session ID */
236 /* Don't allow the callback to set the session length to zero.
246 /* If the session length was shrunk and we're SSLv2, pad it */
274 s->session=ss;
316 /* Increment reference count now if the session callback
317 * asks us to do so (note that if the session structures
324 /* Add the externally cached session to the internal
341 /* We've found the session named by the client, but we don't
348 * of this session, but then applications could effectively
349 * disable the session cache by accident without anyone noticing */
357 #if 0 /* The client cannot always know when a session is not appropriate,
385 /* If a thread got the session, then 'swaped', and another got
403 /* again, just leave the session
404 * if it is the same session, we have just incremented and
406 if (s->session != NULL)
407 SSL_SESSION_free(s->session);
408 s->session=ret;
409 s->verify_result = s->session->verify_result;
426 /* add just 1 reference count for the SSL_CTX's session cache
427 * even though it has two ways of access: each session is in a
430 /* if session c is in already in cache, we take back the increment later */
435 /* s != NULL iff we already had a session with the given PID.
443 /* ... so pretend the other session did not exist in cache
445 * session ID in the same cache, which could happen e.g. when
446 * two threads concurrently obtain the same session from an external
553 int SSL_set_session(SSL *s, SSL_SESSION *session)
558 if (session != NULL)
560 meth=s->ctx->method->get_ssl_method(session->ssl_version);
562 meth=s->method->get_ssl_method(session->ssl_version);
574 session->timeout=SSL_get_default_timeout(s);
576 session->timeout=s->ctx->session_timeout;
581 session->krb5_client_princ_len > 0)
583 s->kssl_ctx->client_princ = (char *)OPENSSL_malloc(session->krb5_client_princ_len + 1);
584 memcpy(s->kssl_ctx->client_princ,session->krb5_client_princ,
585 session->krb5_client_princ_len);
586 s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0';
591 CRYPTO_add(&session->references,1,CRYPTO_LOCK_SSL_SESSION);
592 if (s->session != NULL)
593 SSL_SESSION_free(s->session);
594 s->session=session;
595 s->verify_result = s->session->verify_result;
601 if (s->session != NULL)
603 SSL_SESSION_free(s->session);
604 s->session=NULL;
702 if ( (s->session != NULL) &&
706 SSL_CTX_remove_session(s->ctx,s->session);