Lines Matching defs:session

368 # define USE_MAX_FRAGMENT_LENGTH_EXT(session) \
369 IS_MAX_FRAGMENT_LENGTH_EXT_VALID(session->ext.max_fragment_len_mode)
370 # define GET_MAX_FRAGMENT_LENGTH(session) \
371 (512U << (session->ext.max_fragment_len_mode - 1))
497 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket
498 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only)
507 int ssl_version; /* what ssl version session info is being kept
522 * this is used to determine whether the session is being reused in the
533 * Used to indicate that session resumption is not allowed. Applications
534 * can also set this bit for a new session via not_resumable_session_cb
535 * to disable session caching and tickets.
543 * when app_verify_callback accepts a session where the peer's
544 * certificate is not ok, we must remember the error for session reuse:
556 * These are used to make removal of session-ids more efficient and to
571 /* The ALPN protocol selected for this session */
745 * Most session-ids that will be cached, default is
764 * If this callback is not null, it will be called each time a session id
768 * remove_session_cb is not null, it will be called when a session-id is
784 TSAN_QUALIFIER int sess_miss; /* session lookup misses */
785 TSAN_QUALIFIER int sess_timeout; /* reuse attempt on timeouted session */
786 TSAN_QUALIFIER int sess_cache_full; /* session removed due to full cache */
787 TSAN_QUALIFIER int sess_hit; /* session reuse actually done */
788 TSAN_QUALIFIER int sess_cb_hit; /* session-id that was not in
792 * supplying session-id's from
879 /* Default generate session ID callback. */
929 /* RFC 4507 session ticket keys */
1022 * Callback for disabling session caching and ticket support on a session
1036 * The maximum number of bytes advertised in session tickets that can be
1084 /* used during session-id reuse to concatenate messages */
1103 * Generate a new session or reuse an old one.
1104 * NB: For servers, the 'new' session may actually be a previously
1105 * cached session or even the previous session unless
1127 int hit; /* reusing a previous session */
1165 /* session info */
1187 /* This can also be in the session once a session is established */
1188 SSL_SESSION *session;
1189 /* TLSv1.3 PSK session */
1193 /* Default generate session ID callback. */
1196 * The temporary TLSv1.3 session id. This isn't really a session id at all
1197 * but is a random value sent in the legacy session id field.
1290 /* RFC4507 session ticket expected to be received or sent */
1314 /* TLS pre-shared secret session resumption */
1341 /* Is the session suitable for early data? */
1426 * Callback for disabling session caching and ticket support on a session
1441 * The maximum number of bytes advertised in session tickets that can be
1632 * SSL session: e.g. appropriate curve, signature algorithms etc.
1639 * *disabled* algorithms based on the current session.
1721 SSL_SESSION *session;
2260 __owur int ssl_get_new_session(SSL *s, int session);