Lines Matching defs:session

173 /* SSLeay version number for ASN.1 encoding of the session information */
445 int ssl_version; /* what ssl version session info is
456 /* this is used to determine whether the session is being reused in
480 /* when app_verify_callback accepts a session where the peer's certificate
481 * is not ok, we must remember the error for session reuse: */
499 /* These are used to make removal of session-ids more
550 /* As server, disallow session resumption on renegotiation */
656 * them. It is used to override the generation of SSL/TLS session IDs in a
662 * The length value passed in is set at the maximum size the session ID can be.
664 * can alter this length to be less if desired, but under SSLv2 session IDs are
695 /* Most session-ids that will be cached, default is
714 * time a session id is added to the cache. If this function
719 * a session-id is removed from the cache. After the call,
734 int sess_miss; /* session lookup misses */
735 int sess_timeout; /* reuse attempt on timeouted session */
736 int sess_cache_full; /* session removed due to full cache */
737 int sess_hit; /* session reuse actually done */
738 int sess_cb_hit; /* session-id that was not
742 * supplying session-id's from other
807 /* Default generate session ID callback. */
835 /* RFC 4507 session ticket keys */
981 BIO *bbio; /* used during session-id reuse to concatenate
1008 int new_session;/* 1 if we are to use a new session.
1011 * NB: For servers, the 'new' session may actually be a previously
1012 * cached session or even the previous session unless
1040 int hit; /* reusing a previous session */
1072 /* session info */
1083 /* This can also be in the session once a session is established */
1084 SSL_SESSION *session;
1086 /* Default generate session ID callback. */
1155 /* RFC4507 session ticket expected to be received or sent */
1175 /* TLS pre-shared secret session resumption */
1561 int SSL_set_session(SSL *to, SSL_SESSION *session);
1806 /* Pre-shared secret session resumption functions */