We should only update the session cache when we issue a NewSessionTicket.
These are issued automatically after processing a client certificate.
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5644)
sk_X509_pop_free(s->session->peer_chain, X509_free);
s->session->peer_chain = sk;
- if (new_sess != NULL)
- ssl_update_cache(s, SSL_SESS_CACHE_SERVER);
-
/*
* Freeze the handshake buffer. For <TLS1.3 we do this after the CKE
* message