Lines Matching defs:session
1304 * point to the resulting session.
1334 * tls_decrypt_ticket attempts to decrypt a session ticket.
1338 * session tickets and one will never be decrypted, nor will
1343 * a new session ticket to the client because the client indicated support
1345 * a session ticket or we couldn't use the one it gave us, or if
1349 * etick: points to the body of the session ticket extension.
1350 * eticklen: the length of the session tickets extension.
1351 * sess_id: points at the session ID.
1352 * sesslen: the length of the session ID.
1354 * point to the resulting session.
1382 * generating the session from ticket now, trigger
1396 /* Initialize session ticket encryption and HMAC contexts */
1442 * Attempt to process session ticket, first conduct sanity and integrity
1469 /* Attempt to decrypt session data */
1500 * The session ID, if non-empty, is used by some clients to detect
1501 * that the ticket has been accepted. So we copy it to the session
1517 * For session parse failure, indicate that we need to send a new ticket.
2920 uint8_t SSL_SESSION_get_max_fragment_length(const SSL_SESSION *session)
2922 return session->ext.max_fragment_len_mode;