189837Skris=pod 289837Skris 389837Skris=head1 NAME 489837Skris 589837SkrisSSL_session_reused - query whether a reused session was negotiated during handshake 689837Skris 789837Skris=head1 SYNOPSIS 889837Skris 989837Skris #include <openssl/ssl.h> 1089837Skris 1189837Skris int SSL_session_reused(SSL *ssl); 1289837Skris 1389837Skris=head1 DESCRIPTION 1489837Skris 1589837SkrisQuery, whether a reused session was negotiated during the handshake. 1689837Skris 1789837Skris=head1 NOTES 1889837Skris 1989837SkrisDuring the negotiation, a client can propose to reuse a session. The server 2089837Skristhen looks up the session in its cache. If both client and server agree 2189837Skrison the session, it will be reused and a flag is being set that can be 2289837Skrisqueried by the application. 2389837Skris 2489837Skris=head1 RETURN VALUES 2589837Skris 2689837SkrisThe following return values can occur: 2789837Skris 2889837Skris=over 4 2989837Skris 30267285Sjkim=item Z<>0 3189837Skris 3289837SkrisA new session was negotiated. 3389837Skris 34267285Sjkim=item Z<>1 3589837Skris 3689837SkrisA session was reused. 3789837Skris 3889837Skris=back 3989837Skris 4089837Skris=head1 SEE ALSO 4189837Skris 4289837SkrisL<ssl(3)|ssl(3)>, L<SSL_set_session(3)|SSL_set_session(3)>, 4389837SkrisL<SSL_CTX_set_session_cache_mode(3)|SSL_CTX_set_session_cache_mode(3)> 4489837Skris 4589837Skris=cut 46