Class: OpenSSL::SSL::Session
- Inherits:
-
Object
- Object
- OpenSSL::SSL::Session
- Defined in:
- ossl_ssl_session.c
Defined Under Namespace
Classes: SessionError
Instance Method Summary collapse
- #==(session2) ⇒ Boolean
-
#id ⇒ aString
Returns the Session ID.
-
#new(SSLSocket|string) ⇒ Object
constructor
Parameters
SSLSocket
is an OpenSSL::SSL::SSLSocketstring
must be a DER or PEM encoded Session. -
#time ⇒ Time
Gets start time of the session.
-
#time=(time_v) ⇒ Object
Sets start time of the session.
-
#timeout ⇒ Integer
Gets how long until the session expires in seconds.
-
#timeout=(integer) ⇒ Integer
Sets how long until the session expires in seconds.
-
#to_der ⇒ aString
Returns an ASN1 encoded String that contains the Session object.
-
#to_pem ⇒ String
Returns a PEM encoded String that contains the Session object.
-
#to_text ⇒ String
Shows everything in the Session object.
Constructor Details
#new(SSLSocket|string) ⇒ Object
Parameters
SSLSocket
is an OpenSSL::SSL::SSLSocket string
must be a DER or PEM encoded Session.
37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 |
# File 'ossl_ssl_session.c', line 37
static VALUE ossl_ssl_session_initialize(VALUE self, VALUE arg1)
{
SSL_SESSION *ctx = NULL;
if (RDATA(self)->data)
ossl_raise(eSSLSession, "SSL Session already initialized");
if (rb_obj_is_instance_of(arg1, cSSLSocket)) {
SSL *ssl;
GetSSL(arg1, ssl);
if (!ssl || (ctx = SSL_get1_session(ssl)) == NULL)
ossl_raise(eSSLSession, "no session available");
} else {
BIO *in = ossl_obj2bio(arg1);
ctx = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
if (!ctx) {
OSSL_BIO_reset(in);
ctx = d2i_SSL_SESSION_bio(in, NULL);
}
BIO_free(in);
if (!ctx)
ossl_raise(rb_eArgError, "unknown type");
}
/* should not happen */
if (ctx == NULL)
ossl_raise(eSSLSession, "ctx not set - internal error");
RDATA(self)->data = ctx;
return self;
}
|
Instance Method Details
#==(session2) ⇒ Boolean
91 92 93 94 95 96 97 98 99 100 101 102 |
# File 'ossl_ssl_session.c', line 91
static VALUE ossl_ssl_session_eq(VALUE val1, VALUE val2)
{
SSL_SESSION *ctx1, *ctx2;
GetSSLSession(val1, ctx1);
SafeGetSSLSession(val2, ctx2);
switch (SSL_SESSION_cmp(ctx1, ctx2)) {
case 0: return Qtrue;
default: return Qfalse;
}
}
|
#id ⇒ aString
Returns the Session ID.
192 193 194 195 196 197 198 199 200 201 202 203 |
# File 'ossl_ssl_session.c', line 192
static VALUE ossl_ssl_session_get_id(VALUE self)
{
SSL_SESSION *ctx;
const unsigned char *p = NULL;
unsigned int i = 0;
GetSSLSession(self, ctx);
p = SSL_SESSION_get_id(ctx, &i);
return rb_str_new((const char *) p, i);
}
|
#time ⇒ Time
Gets start time of the session.
111 112 113 114 115 116 117 118 119 120 121 122 123 124 |
# File 'ossl_ssl_session.c', line 111
static VALUE ossl_ssl_session_get_time(VALUE self)
{
SSL_SESSION *ctx;
time_t t;
GetSSLSession(self, ctx);
t = SSL_SESSION_get_time(ctx);
if (t == 0)
return Qnil;
return rb_funcall(rb_cTime, rb_intern("at"), 1, TIMET2NUM(t));
}
|
#time=(Time) ⇒ Time #time=(integer) ⇒ Time
Sets start time of the session. Time resolution is in seconds.
153 154 155 156 157 158 159 160 161 162 163 164 165 |
# File 'ossl_ssl_session.c', line 153
static VALUE ossl_ssl_session_set_time(VALUE self, VALUE time_v)
{
SSL_SESSION *ctx;
long t;
GetSSLSession(self, ctx);
if (rb_obj_is_instance_of(time_v, rb_cTime)) {
time_v = rb_funcall(time_v, rb_intern("to_i"), 0);
}
t = NUM2LONG(time_v);
SSL_SESSION_set_time(ctx, t);
return ossl_ssl_session_get_time(self);
}
|
#timeout ⇒ Integer
Gets how long until the session expires in seconds.
133 134 135 136 137 138 139 140 141 142 143 |
# File 'ossl_ssl_session.c', line 133
static VALUE ossl_ssl_session_get_timeout(VALUE self)
{
SSL_SESSION *ctx;
time_t t;
GetSSLSession(self, ctx);
t = SSL_SESSION_get_timeout(ctx);
return TIMET2NUM(t);
}
|
#timeout=(integer) ⇒ Integer
Sets how long until the session expires in seconds.
174 175 176 177 178 179 180 181 182 183 |
# File 'ossl_ssl_session.c', line 174
static VALUE ossl_ssl_session_set_timeout(VALUE self, VALUE time_v)
{
SSL_SESSION *ctx;
long t;
GetSSLSession(self, ctx);
t = NUM2LONG(time_v);
SSL_SESSION_set_timeout(ctx, t);
return ossl_ssl_session_get_timeout(self);
}
|
#to_der ⇒ aString
Returns an ASN1 encoded String that contains the Session object.
212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 |
# File 'ossl_ssl_session.c', line 212
static VALUE ossl_ssl_session_to_der(VALUE self)
{
SSL_SESSION *ctx;
unsigned char *p;
int len;
VALUE str;
GetSSLSession(self, ctx);
len = i2d_SSL_SESSION(ctx, NULL);
if (len <= 0) {
ossl_raise(eSSLSession, "i2d_SSL_SESSION");
}
str = rb_str_new(0, len);
p = (unsigned char *)RSTRING_PTR(str);
i2d_SSL_SESSION(ctx, &p);
ossl_str_adjust(str, p);
return str;
}
|
#to_pem ⇒ String
Returns a PEM encoded String that contains the Session object.
238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 |
# File 'ossl_ssl_session.c', line 238
static VALUE ossl_ssl_session_to_pem(VALUE self)
{
SSL_SESSION *ctx;
BIO *out;
BUF_MEM *buf;
VALUE str;
int i;
GetSSLSession(self, ctx);
if (!(out = BIO_new(BIO_s_mem()))) {
ossl_raise(eSSLSession, "BIO_s_mem()");
}
if (!(i=PEM_write_bio_SSL_SESSION(out, ctx))) {
BIO_free(out);
ossl_raise(eSSLSession, "SSL_SESSION_print()");
}
BIO_get_mem_ptr(out, &buf);
str = rb_str_new(buf->data, buf->length);
BIO_free(out);
return str;
}
|
#to_text ⇒ String
Shows everything in the Session object.
271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 |
# File 'ossl_ssl_session.c', line 271
static VALUE ossl_ssl_session_to_text(VALUE self)
{
SSL_SESSION *ctx;
BIO *out;
BUF_MEM *buf;
VALUE str;
GetSSLSession(self, ctx);
if (!(out = BIO_new(BIO_s_mem()))) {
ossl_raise(eSSLSession, "BIO_s_mem()");
}
if (!SSL_SESSION_print(out, ctx)) {
BIO_free(out);
ossl_raise(eSSLSession, "SSL_SESSION_print()");
}
BIO_get_mem_ptr(out, &buf);
str = rb_str_new(buf->data, buf->length);
BIO_free(out);
return str;
}
|