Lines Matching defs:session
1731 * point to the resulting session.
1761 * tls_decrypt_ticket attempts to decrypt a session ticket.
1765 * session tickets and one will never be decrypted, nor will
1770 * a new session ticket to the client because the client indicated support
1772 * a session ticket or we couldn't use the one it gave us, or if
1776 * etick: points to the body of the session ticket extension.
1777 * eticklen: the length of the session tickets extension.
1778 * sess_id: points at the session ID.
1779 * sesslen: the length of the session ID.
1781 * point to the resulting session.
1809 * generating the session from ticket now, trigger
1823 /* Initialize session ticket encryption and HMAC contexts */
1894 * Attempt to process session ticket, first conduct sanity and integrity
1926 /* Attempt to decrypt session data */
1957 * The session ID, if non-empty, is used by some clients to detect
1958 * that the ticket has been accepted. So we copy it to the session
1974 * For session parse failure, indicate that we need to send a new ticket.
3381 uint8_t SSL_SESSION_get_max_fragment_length(const SSL_SESSION *session)
3383 return session->ext.max_fragment_len_mode;