diff options
author | Geoff Thorpe <geoff@openssl.org> | 2003-02-15 20:38:57 +0000 |
---|---|---|
committer | Geoff Thorpe <geoff@openssl.org> | 2003-02-15 20:38:57 +0000 |
commit | 4879ec7bf3dc684e33f330d8b5b9eed5f4a2c344 (patch) | |
tree | 2fcc36de17c4a40f13c1315d45414cf129036d61 /ssl/ssl_sess.c | |
parent | b653327d4746cff0906eff8e740622aae4439e80 (diff) | |
download | openssl-new-4879ec7bf3dc684e33f330d8b5b9eed5f4a2c344.tar.gz |
Session cache implementations shouldn't have to access SSL_SESSION
elements directly, so this missing functionality is required.
PR: 276
Diffstat (limited to 'ssl/ssl_sess.c')
-rw-r--r-- | ssl/ssl_sess.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c index fbc30b94e6..b4fb90448f 100644 --- a/ssl/ssl_sess.c +++ b/ssl/ssl_sess.c @@ -127,6 +127,13 @@ SSL_SESSION *SSL_SESSION_new(void) return(ss); } +const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len) + { + if(len) + *len = s->session_id_length; + return s->session_id; + } + /* Even with SSLv2, we have 16 bytes (128 bits) of session ID space. SSLv3/TLSv1 * has 32 bytes (256 bits). As such, filling the ID with random gunk repeatedly * until we have no conflict is going to complete in one iteration pretty much |