aboutsummaryrefslogtreecommitdiff
path: root/ssl/ssl_sess.c
diff options
context:
space:
mode:
authorDr. Stephen Henson <steve@openssl.org>2011-04-29 22:56:51 +0000
committerDr. Stephen Henson <steve@openssl.org>2011-04-29 22:56:51 +0000
commit7409d7ad517650db332ae528915a570e4e0ab88b (patch)
tree30ef3e18eff537854b4e443080bfb1f96c0fef12 /ssl/ssl_sess.c
parent08557cf22cd7c337d7430c32fb21ed29a77a8131 (diff)
downloadopenssl-7409d7ad517650db332ae528915a570e4e0ab88b.zip
openssl-7409d7ad517650db332ae528915a570e4e0ab88b.tar.gz
openssl-7409d7ad517650db332ae528915a570e4e0ab88b.tar.bz2
Initial incomplete TLS v1.2 support. New ciphersuites added, new version
checking added, SHA256 PRF support added. At present only RSA key exchange ciphersuites work with TLS v1.2 as the new signature format is not yet implemented.
Diffstat (limited to 'ssl/ssl_sess.c')
-rw-r--r--ssl/ssl_sess.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/ssl/ssl_sess.c b/ssl/ssl_sess.c
index 3f0b195..cbb7e70 100644
--- a/ssl/ssl_sess.c
+++ b/ssl/ssl_sess.c
@@ -308,6 +308,11 @@ int ssl_get_new_session(SSL *s, int session)
ss->ssl_version=TLS1_1_VERSION;
ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH;
}
+ else if (s->version == TLS1_2_VERSION)
+ {
+ ss->ssl_version=TLS1_2_VERSION;
+ ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH;
+ }
else if (s->version == DTLS1_BAD_VER)
{
ss->ssl_version=DTLS1_BAD_VER;