Systems and methods for handling SSL session not reusable across multiple cores
First Claim
1. A method of identifying a not resumable secure sockets layer (SSL) session, the method comprising:
- a) identifying, by a first packet engine of a first core of a multi-core system, that an SSL session is not resumable;
b) setting, by the first packet engine responsive to the identification, at a location in memory accessible by a second core of the multi-core system, an indicator to indicate that the SSL session is not resumable;
c) receiving, by a second packet engine of a second core of the multi-core system, a request identifying the SSL session established by the first core; and
d) determining, by the second packet engine, that a core different from the second core established the SSL session, the second packet engine not resuming the SSL session responsive to the determination.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed towards systems and methods for managing SSL session persistence and reuse in a multi-core system. A first core may indicate that an SSL session established by the first core is non-resumable. Responsive to the indication, the core may set an indicator at a location in memory accessible by each core of the multi-core system, the indicator indicating that the SSL session is non-resumable. A second core of the multi-core system may receive a request to reuse the SSL session. The request may include a session identifier of the SSL session. In addition, the session identifier may identify the first core as an establisher of the SSL session. The second core can identify from encoding of the session identifier whether the second core is not the establisher of the SSL session. Responsive to the identification, the second core may determine whether to resume the SSL session.
23 Citations
13 Claims
-
1. A method of identifying a not resumable secure sockets layer (SSL) session, the method comprising:
-
a) identifying, by a first packet engine of a first core of a multi-core system, that an SSL session is not resumable; b) setting, by the first packet engine responsive to the identification, at a location in memory accessible by a second core of the multi-core system, an indicator to indicate that the SSL session is not resumable; c) receiving, by a second packet engine of a second core of the multi-core system, a request identifying the SSL session established by the first core; and d) determining, by the second packet engine, that a core different from the second core established the SSL session, the second packet engine not resuming the SSL session responsive to the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of identifying an secure sockets layer (SSL) session as not resumable, the method comprising:
-
a) indicating, by a first processor of multiple processors, that an SSL session is not resumable; b) setting, by the first processor responsive to the indication, an indicator at a location in memory accessible by each processor of the multiple processors, the indicator indicating that the SSL session is not resumable; c) receiving, by a second processor of the multiple processors, a request to resume the SSL session established by the first processor, the request comprising a session identifier of the SSL session, the session identifier identifying the first processor as an establisher of the SSL session; and d) identifying, by the second processor, from encoding of the session identifier that the second processor is not the establisher of the SSL session, the second processor not resuming the SSL session responsive to accessing the indicator at the location.
-
Specification