189837Skris=pod
289837Skris
389837Skris=head1 NAME
489837Skris
589837SkrisSSL_session_reused - query whether a reused session was negotiated during handshake
689837Skris
789837Skris=head1 SYNOPSIS
889837Skris
989837Skris #include <openssl/ssl.h>
1089837Skris
1189837Skris int SSL_session_reused(SSL *ssl);
1289837Skris
1389837Skris=head1 DESCRIPTION
1489837Skris
1589837SkrisQuery, whether a reused session was negotiated during the handshake.
1689837Skris
1789837Skris=head1 NOTES
1889837Skris
1989837SkrisDuring the negotiation, a client can propose to reuse a session. The server
2089837Skristhen looks up the session in its cache. If both client and server agree
2189837Skrison the session, it will be reused and a flag is being set that can be
2289837Skrisqueried by the application.
2389837Skris
2489837Skris=head1 RETURN VALUES
2589837Skris
2689837SkrisThe following return values can occur:
2789837Skris
2889837Skris=over 4
2989837Skris
30267285Sjkim=item Z<>0
3189837Skris
3289837SkrisA new session was negotiated.
3389837Skris
34267285Sjkim=item Z<>1
3589837Skris
3689837SkrisA session was reused.
3789837Skris
3889837Skris=back
3989837Skris
4089837Skris=head1 SEE ALSO
4189837Skris
4289837SkrisL<ssl(3)|ssl(3)>, L<SSL_set_session(3)|SSL_set_session(3)>,
4389837SkrisL<SSL_CTX_set_session_cache_mode(3)|SSL_CTX_set_session_cache_mode(3)>
4489837Skris
4589837Skris=cut
46