summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2018-03-15 21:02:15 +0000
committerMatt Caswell <matt@openssl.org>2018-03-19 12:21:17 +0000
commitf023ba2df821d186d73fefda6fa5cafcc5a3ee39 (patch)
treeba861f81fe389afc5a35d6e25d54b143b74e8366 /ssl
parent32305f88509c1d9ccb3ad676209a25fa59b95488 (diff)
Don't update the session cache when processing a client certificate in TLSv1.3
We should only update the session cache when we issue a NewSessionTicket. These are issued automatically after processing a client certificate. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/5644)
Diffstat (limited to 'ssl')
-rw-r--r--ssl/statem/statem_srvr.c3
1 files changed, 0 insertions, 3 deletions
diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c
index 5542a78e21..c198aa7246 100644
--- a/ssl/statem/statem_srvr.c
+++ b/ssl/statem/statem_srvr.c
@@ -3608,9 +3608,6 @@ MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt)
sk_X509_pop_free(s->session->peer_chain, X509_free);
s->session->peer_chain = sk;
- if (new_sess != NULL)
- ssl_update_cache(s, SSL_SESS_CACHE_SERVER);
-
/*
* Freeze the handshake buffer. For <TLS1.3 we do this after the CKE
* message