void *
mysql_get_ssl_session_data(MYSQL *,
unsigned int n_ticket,
unsigned int *out_len)
mysql_get_ssl_session_data()
permits SSL session reuse by extracting a ticket from an
established session and submitting that ticket when
connecting, provided the server still has the session in its
runtime cache. This function returns a session data string and
provides the length of the string in
out_len
(if non-NULL). Otherwise, it
returns nullptr
to indicate the expected
session data is not possible or the connection is not in the
right state. To prevent leaks, you must release the session
data handle by calling
mysql_free_ssl_session_data()
when your application is finished with the pointer.
The format of the data is PEM serialization of the session. A session can be reused only if it was fetched from a prior session to the same mysqld server on the same port. In addition, the SSL version of the new session must match the SSL version of the original session.
n_ticket
specifies which ticket or tickets
to returned. For TLS 1.3, the server generates two session
tickets by default for new sessions and one when a session is
reused. For TLS 1.2, the server generates one session ticket
by default. This should be considered when deciding on the
size of the SSL session cache on the server.
Currently, only the last transmitted session is returned.
Specifically, anything other than 0 for
n_ticket
causes an error. OpenSSL version
1.0.2 imposes this limitation.
Avoid reusing SSL sessions more than one time.