Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
8876bc05
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
8876bc05
编写于
5月 23, 1999
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Let ssl_get_prev_session reliably work in multi-threaded settings.
上级
3550ec4f
变更
2
显示空白变更内容
内联
并排
Showing
2 changed file
with
56 addition
and
15 deletion
+56
-15
ssl/s3_srvr.c
ssl/s3_srvr.c
+3
-1
ssl/ssl_sess.c
ssl/ssl_sess.c
+53
-14
未找到文件。
ssl/s3_srvr.c
浏览文件 @
8876bc05
...
...
@@ -557,7 +557,9 @@ static int ssl3_get_client_hello(SSL *s)
{
/* previous session */
s
->
hit
=
1
;
}
else
else
if
(
i
==
-
1
)
goto
err
;
else
/* i == 0 */
{
if
(
!
ssl_get_new_session
(
s
,
1
))
goto
err
;
...
...
ssl/ssl_sess.c
浏览文件 @
8876bc05
...
...
@@ -188,18 +188,21 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len)
/* This is used only by servers. */
SSL_SESSION
*
ret
=
NULL
,
data
;
int
fatal
=
0
;
/* conn_init();*/
data
.
ssl_version
=
s
->
version
;
data
.
session_id_length
=
len
;
if
(
len
>
SSL_MAX_SSL_SESSION_ID_LENGTH
)
return
(
0
)
;
goto
err
;
memcpy
(
data
.
session_id
,
session_id
,
len
);
if
(
!
(
s
->
ctx
->
session_cache_mode
&
SSL_SESS_CACHE_NO_INTERNAL_LOOKUP
))
{
CRYPTO_r_lock
(
CRYPTO_LOCK_SSL_CTX
);
ret
=
(
SSL_SESSION
*
)
lh_retrieve
(
s
->
ctx
->
sessions
,(
char
*
)
&
data
);
/* don't allow other threads to steal it: */
CRYPTO_add
(
&
ret
->
references
,
1
,
CRYPTO_LOCK_SSL_SESSION
);
CRYPTO_r_unlock
(
CRYPTO_LOCK_SSL_CTX
);
}
...
...
@@ -215,26 +218,51 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len)
{
s
->
ctx
->
stats
.
sess_cb_hit
++
;
/* Increment reference count now if the session callback
* asks us to do so (note that if the session structures
* returned by the callback are shared between threads,
* it must handle the reference count itself [i.e. copy == 0],
* or things won't be thread-safe). */
if
(
copy
)
CRYPTO_add
(
&
ret
->
references
,
1
,
CRYPTO_LOCK_SSL_SESSION
);
/* The following should not return 1, otherwise,
* things are very strange */
SSL_CTX_add_session
(
s
->
ctx
,
ret
);
/* auto free it (decrement reference count now) */
if
(
!
copy
)
SSL_SESSION_free
(
ret
);
}
if
(
ret
==
NULL
)
return
(
0
);
if
(
ret
==
NULL
)
goto
err
;
}
/* Now ret is non-NULL, and we own one of its reference counts. */
if
((
s
->
verify_mode
&
SSL_VERIFY_PEER
)
&&
(
!
s
->
sid_ctx_length
||
ret
->
sid_ctx_length
!=
s
->
sid_ctx_length
||
memcmp
(
ret
->
sid_ctx
,
s
->
sid_ctx
,
ret
->
sid_ctx_length
)))
{
if
(
s
->
sid_ctx_length
)
SSLerr
(
SSL_F_SSL_GET_PREV_SESSION
,
SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT
);
else
/* application should have used SSL[_CTX]_set_session_id_context */
/* We've found the session named by the client, but we don't
* want to use it in this context. */
if
(
s
->
sid_ctx_length
==
0
)
{
/* application should have used SSL[_CTX]_set_session_id_context
* -- we could tolerate this and just pretend we never heard
* of this session, but then applications could effectively
* disable the session cache by accident without anyone noticing */
SSLerr
(
SSL_F_SSL_GET_PREV_SESSION
,
SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED
);
return
0
;
fatal
=
1
;
goto
err
;
}
else
{
#if 0 /* The client cannot always know when a session is not appropriate,
* so we shouldn't generate an error message. */
SSLerr(SSL_F_SSL_GET_PREV_SESSION,SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT);
#endif
goto
err
;
/* treat like cache miss */
}
}
if
(
ret
->
cipher
==
NULL
)
...
...
@@ -250,22 +278,25 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len)
else
ret
->
cipher
=
ssl_get_cipher_by_char
(
s
,
&
(
buf
[
1
]));
if
(
ret
->
cipher
==
NULL
)
return
(
0
)
;
goto
err
;
}
#if 0 /* This is way too late. */
/* If a thread got the session, then 'swaped', and another got
* it and then due to a time-out decided to 'Free' it we could
* be in trouble. So I'll increment it now, then double decrement
* later - am I speaking rubbish?. */
CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION);
#endif
if
((
long
)(
ret
->
time
+
ret
->
timeout
)
<
(
long
)
time
(
NULL
))
/* timeout */
{
s
->
ctx
->
stats
.
sess_timeout
++
;
/* remove it from the cache */
SSL_CTX_remove_session
(
s
->
ctx
,
ret
);
SSL_SESSION_free
(
ret
);
/* again to actually Free it */
return
(
0
);
goto
err
;
}
s
->
ctx
->
stats
.
sess_hit
++
;
...
...
@@ -278,6 +309,14 @@ int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len)
SSL_SESSION_free
(
s
->
session
);
s
->
session
=
ret
;
return
(
1
);
err:
if
(
ret
!=
NULL
)
SSL_SESSION_free
(
ret
);
if
(
fatal
)
return
-
1
;
else
return
0
;
}
int
SSL_CTX_add_session
(
SSL_CTX
*
ctx
,
SSL_SESSION
*
c
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录