Lines Matching defs:session
333 SSL_SESSION *session;
401 "SSL/TLS session closed cleanly.");
787 PyObject *owner, PyObject *session,
911 if (session && session != Py_None) {
912 if (PySSL_set_session(self, session, NULL) == -1) {
2740 /* if session is resumed XOR we are the client */
2744 /* if a new session XOR we are the server */
2789 _ssl_session_dup(SSL_SESSION *session) {
2795 if (session == NULL) {
2796 PyErr_SetString(PyExc_ValueError, "Invalid session");
2801 slen = i2d_SSL_SESSION(session, NULL);
2811 if (!i2d_SSL_SESSION(session, &p)) {
2817 if (session == NULL) {
2834 SSL_SESSION *session;
2836 /* duplicate session as workaround for session bug in OpenSSL 1.1.0,
2838 session = SSL_get0_session(self->ssl); /* borrowed reference */
2839 if (session == NULL) {
2842 if ((session = _ssl_session_dup(session)) == NULL) {
2845 session = SSL_get1_session(self->ssl);
2846 if (session == NULL) {
2851 SSL_SESSION_free(session);
2858 pysess->session = session;
2867 SSL_SESSION *session;
2883 "Cannot set session for server-side SSLSocket.");
2888 "Cannot set session after handshake.");
2891 /* duplicate session */
2892 if ((session = _ssl_session_dup(pysess->session)) == NULL) {
2895 result = SSL_set_session(self->ssl, session);
2897 SSL_SESSION_free(session);
2906 "_setter_session(session)\n\
2920 "Was the client session reused during handshake?");
2931 {"session", (getter) PySSL_get_session,
3606 "Control the number of TLSv1.3 session tickets");
4216 session: object = None
4223 PyObject *owner, PyObject *session)
4238 owner, session,
4253 session: object = None
4261 PyObject *session)
4275 owner, session,
4999 if (self->session != NULL) {
5000 SSL_SESSION_free(self->session);
5026 left_id = SSL_SESSION_get_id(((PySSLSession *)left)->session,
5028 right_id = SSL_SESSION_get_id(((PySSLSession *)right)->session,
5082 return PyLong_FromLong(SSL_SESSION_get_time(self->session));
5091 return PyLong_FromLong(SSL_SESSION_get_timeout(self->session));
5100 unsigned long hint = SSL_SESSION_get_ticket_lifetime_hint(self->session);
5112 id = SSL_SESSION_get_id(self->session, &len);
5122 if (SSL_SESSION_has_ticket(self->session)) {
5130 "Does the session contain a ticket?");