From f9b0b45238851e8e0904408838a0b05ca1ee99b9 Mon Sep 17 00:00:00 2001 From: "Dr. Stephen Henson" Date: Thu, 22 Dec 2011 15:14:32 +0000 Subject: New ctrl values to clear or retrieve extra chain certs from an SSL_CTX. New function to retrieve compression method from SSL_SESSION structure. Delete SSL_SESSION_get_id_len and SSL_SESSION_get0_id functions as they duplicate functionality of SSL_SESSION_get_id. Note: these functions have never appeared in any release version of OpenSSL. --- ssl/ssl_sess.c | 15 +++++---------- 1 file changed, 5 insertions(+), 10 deletions(-) (limited to 'ssl/ssl_sess.c') diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c index 74e8f7b99d..05e4fb9fda 100644 --- a/ssl/ssl_sess.c +++ b/ssl/ssl_sess.c @@ -231,6 +231,11 @@ const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len) return s->session_id; } +unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *s) + { + return s->compress_meth; + } + /* Even with SSLv2, we have 16 bytes (128 bits) of session ID space. SSLv3/TLSv1 * has 32 bytes (256 bits). As such, filling the ID with random gunk repeatedly * until we have no conflict is going to complete in one iteration pretty much @@ -862,16 +867,6 @@ long SSL_SESSION_set_time(SSL_SESSION *s, long t) return(t); } -unsigned int SSL_SESSION_get_id_len(SSL_SESSION *s) - { - return s->session_id_length; - } - -const unsigned char *SSL_SESSION_get0_id(SSL_SESSION *s) - { - return s->session_id; - } - X509 *SSL_SESSION_get0_peer(SSL_SESSION *s) { return s->peer; -- cgit v1.2.3