Return-Path: Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: (qmail 19282 invoked from network); 26 Sep 2007 16:13:46 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 26 Sep 2007 16:13:45 -0000 Received: (qmail 49551 invoked by uid 500); 26 Sep 2007 16:13:32 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 49485 invoked by uid 500); 26 Sep 2007 16:13:32 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 49474 invoked by uid 99); 26 Sep 2007 16:13:32 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 26 Sep 2007 09:13:32 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: local policy) Received: from [195.200.162.158] (HELO mail.bee-ware.net) (195.200.162.158) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 26 Sep 2007 16:13:33 +0000 Received: from [192.168.100.231] ([192.168.100.231]) (authenticated bits=0) by mail.bee-ware.net (8.13.8/8.13.8/Debian-3) with ESMTP id l8QGD6IH029142 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for ; Wed, 26 Sep 2007 18:13:08 +0200 Subject: ssl session cache From: nada To: dev@httpd.apache.org Content-Type: text/plain Date: Wed, 26 Sep 2007 18:13:08 +0200 Message-Id: <1190823188.27007.1.camel@nada-laptop> Mime-Version: 1.0 X-Mailer: Evolution 2.6.1 Content-Transfer-Encoding: 7bit X-Spam-Checker-Version: SpamAssassin 3.1.7-deb (2006-10-05) on mail.bee-ware.net X-Virus-Scanned: ClamAV 0.91.2/4404/Wed Sep 26 14:53:15 2007 on mail.bee-ware.net X-Virus-Status: Clean X-Virus-Checked: Checked by ClamAV on apache.org X-Old-Spam-Status: No, score=-1.4 required=5.0 tests=ALL_TRUSTED autolearn=disabled version=3.1.7-deb Hello, I'm currently implementing an encrypted and authenticated client server communication. I use the same mechanism as ssl does, ie resumed sessions, using a memory cache where I store sessions. I did browse the s3_clnt.c file and did not find anywhere the way old sessions are retrieved. However, it is done server side in S3_srvr.c thanks to the ssl_get_prev session function. If you know how are old sessions retrieved client side can you help me please ? Nada.