@@ -1142,10 +1142,8 @@ static int CheckSessionMatch(const WOLFSSL* ssl, const WOLFSSL_SESSION* sess)
11421142 XMEMCMP (ssl -> sessionCtx , sess -> sessionCtx , sess -> sessionCtxSz ) != 0 ))
11431143 return 0 ;
11441144#endif
1145- #if defined(WOLFSSL_TLS13 ) && defined(HAVE_SESSION_TICKET )
11461145 if (IsAtLeastTLSv1_3 (ssl -> version ) != IsAtLeastTLSv1_3 (sess -> version ))
11471146 return 0 ;
1148- #endif
11491147 return 1 ;
11501148}
11511149
@@ -2601,11 +2599,8 @@ int wolfSSL_i2d_SSL_SESSION(WOLFSSL_SESSION* sess, unsigned char** p)
26012599 for (i = 0 ; i < sess -> chain .count ; i ++ )
26022600 size += OPAQUE16_LEN + sess -> chain .certs [i ].length ;
26032601#endif
2604- #if defined(SESSION_CERTS ) || (defined(WOLFSSL_TLS13 ) && \
2605- defined(HAVE_SESSION_TICKET ))
26062602 /* Protocol version */
26072603 size += OPAQUE16_LEN ;
2608- #endif
26092604#if defined(SESSION_CERTS ) || !defined(NO_RESUME_SUITE_CHECK ) || \
26102605 (defined(WOLFSSL_TLS13 ) && defined(HAVE_SESSION_TICKET ))
26112606 /* cipher suite */
@@ -2681,11 +2676,8 @@ int wolfSSL_i2d_SSL_SESSION(WOLFSSL_SESSION* sess, unsigned char** p)
26812676 idx += sess -> chain .certs [i ].length ;
26822677 }
26832678#endif
2684- #if defined(SESSION_CERTS ) || (defined(WOLFSSL_TLS13 ) && \
2685- defined(HAVE_SESSION_TICKET ))
26862679 data [idx ++ ] = sess -> version .major ;
26872680 data [idx ++ ] = sess -> version .minor ;
2688- #endif
26892681#if defined(SESSION_CERTS ) || !defined(NO_RESUME_SUITE_CHECK ) || \
26902682 (defined(WOLFSSL_TLS13 ) && defined(HAVE_SESSION_TICKET ))
26912683 data [idx ++ ] = sess -> cipherSuite0 ;
@@ -2854,16 +2846,13 @@ WOLFSSL_SESSION* wolfSSL_d2i_SSL_SESSION(WOLFSSL_SESSION** sess,
28542846 idx += length ;
28552847 }
28562848#endif
2857- #if defined(SESSION_CERTS ) || (defined(WOLFSSL_TLS13 ) && \
2858- defined(HAVE_SESSION_TICKET ))
28592849 /* Protocol Version */
28602850 if (i - idx < OPAQUE16_LEN ) {
28612851 ret = BUFFER_ERROR ;
28622852 goto end ;
28632853 }
28642854 s -> version .major = data [idx ++ ];
28652855 s -> version .minor = data [idx ++ ];
2866- #endif
28672856#if defined(SESSION_CERTS ) || !defined(NO_RESUME_SUITE_CHECK ) || \
28682857 (defined(WOLFSSL_TLS13 ) && defined(HAVE_SESSION_TICKET ))
28692858 /* Cipher suite */
@@ -3176,10 +3165,8 @@ static void SESSION_ex_data_cache_update(WOLFSSL_SESSION* session, int idx,
31763165 if (cacheSession && cacheSession -> sessionIDSz == ID_LEN &&
31773166 XMEMCMP (id , cacheSession -> sessionID , ID_LEN ) == 0
31783167 && session -> side == cacheSession -> side
3179- #if defined(WOLFSSL_TLS13 ) & & defined (HAVE_SESSION_TICKET )
31803168 && (IsAtLeastTLSv1_3 (session -> version ) ==
31813169 IsAtLeastTLSv1_3 (cacheSession -> version ))
3182- #endif
31833170 ) {
31843171 if (get ) {
31853172 if (getRet ) {
@@ -3604,10 +3591,7 @@ void SetupSession(WOLFSSL* ssl)
36043591#ifndef NO_ASN_TIME
36053592 session -> bornOn = LowResTimer ();
36063593#endif
3607- #if defined(SESSION_CERTS ) || (defined(WOLFSSL_TLS13 ) && \
3608- defined(HAVE_SESSION_TICKET ))
36093594 session -> version = ssl -> version ;
3610- #endif
36113595#if defined(SESSION_CERTS ) || !defined(NO_RESUME_SUITE_CHECK ) || \
36123596 (defined(WOLFSSL_TLS13 ) && defined(HAVE_SESSION_TICKET ))
36133597 session -> cipherSuite0 = ssl -> options .cipherSuite0 ;
0 commit comments