Lines Matching defs:sess2
2025 SSL_SESSION *sess1 = NULL, *sess2 = NULL;
2123 if (!TEST_ptr(sess2 = SSL_get1_session(clientssl2)))
2133 * This should clear sess2 from the cache because it is a "bad" session.
2146 if (!TEST_true(SSL_CTX_add_session(cctx, sess2))
2147 || !TEST_true(SSL_CTX_remove_session(cctx, sess2)))
2153 if (!TEST_false(SSL_CTX_remove_session(cctx, sess2)))
2178 if (use_int_cache && !TEST_true(SSL_CTX_add_session(cctx, sess2)))
2207 SSL_SESSION_free(sess2);
2208 sess2 = NULL;
2219 || !TEST_ptr(sess2 = SSL_get1_session(serverssl1)))
2230 if (!TEST_false(SSL_CTX_remove_session(sctx, sess2)))
2234 if (!TEST_false(SSL_CTX_add_session(sctx, sess2)))
2240 SSL_SESSION *tmp = sess2;
2252 if (!TEST_ptr(tmp = SSL_SESSION_dup(sess2))
2253 || !TEST_true(sess2->owner != NULL)
2255 || !TEST_true(SSL_CTX_remove_session(sctx, sess2)))
2257 SSL_SESSION_free(sess2);
2259 sess2 = tmp;
2263 get_sess_val = sess2;
2288 * sess2, try to add sess1, which should succeed. Then
2290 * the timeouts, sess1 should have kicked out sess2
2293 /* Make sess1 expire before sess2 */
2296 || !TEST_long_gt(SSL_SESSION_set_time(sess2, 2000), 0)
2297 || !TEST_long_gt(SSL_SESSION_set_timeout(sess2, 2000), 0))
2303 /* Don't care about results - cache should only be sess2 at end */
2305 SSL_CTX_add_session(sctx, sess2);
2310 || !TEST_ptr_null(sess2->owner))
2325 SSL_SESSION_free(sess2);