Lines Matching defs:session

167         /// Disables the use of session tickets for session resumption.
170 /// Always start a new session when performing a renegotiation on the server side.
184 /// Creates a new key for each session when using ECDHE.
189 /// Creates a new key for each session when using DHE.
296 /// Enables automatic retries after TLS session events such as renegotiations or heartbeats.
314 /// Release memory buffers when the session does not need them.
323 /// attempted to downgrade the protocol version of the session.
412 /// Options controlling the behavior of session caching.
414 /// No session caching for the client or server takes place.
417 /// Enable session caching on the client side.
419 /// OpenSSL has no way of identifying the proper session to reuse automatically, so the
425 /// Enable session caching on the server side.
430 /// Enable session caching on both the client and server side.
433 /// Disable automatic removal of expired sessions from the session cache.
436 /// Disable use of the internal session cache for session lookups.
439 /// Disable use of the internal session cache for session storage.
442 /// Disable use of the internal session cache for storage and lookup.
524 /// An identifier of a session name type.
855 /// The callback is provided with a reference to the `Ssl` for the session, as well as a boolean
882 /// The callback is provided with a reference to the `Ssl` for the session, as well as a boolean
946 /// This value identifies the server's session cache to clients, telling them when they're
948 /// servers share a session cache.
1394 /// This can be used by clients to implement session caching. While in TLSv1.2 the session is
1395 /// available to access via [`SslRef::session`] immediately after the handshake completes, this
1396 /// is not the case for TLSv1.3. There, a session is not generally available immediately, and
1397 /// the server may provide multiple session tokens to the client over a single session. The new
1398 /// session callback is a portable way to deal with both cases.
1400 /// Note that session caching must be enabled for the callback to be invoked, and it defaults
1403 /// [`SslRef::session`]: struct.SslRef.html#method.session
1433 /// Sets the callback which is called when a client proposed to resume a session but it was not
1436 /// The callback is passed a reference to the session ID provided by the client. It should
1437 /// return the session corresponding to that ID if available. This is only used for servers, not
1471 /// Sets the session caching mode use for connections made with the context.
1473 /// Returns the previous session caching mode.
1665 /// Sets the context's session cache size limit, returning the previous limit.
1701 /// Sets the number of TLS 1.3 session tickets that will be sent to a client after a full
1861 /// Adds a session to the context's cache.
1863 /// Returns `true` if the session was successfully added to the cache, and `false` if it was already present.
1867 /// The caller of this method is responsible for ensuring that the session has never been used with another
1870 pub unsafe fn add_session(&self, session: &SslSessionRef) -> bool {
1871 ffi::SSL_CTX_add_session(self.as_ptr(), session.as_ptr()) != 0
1874 /// Removes a session from the context's cache and marks it as non-resumable.
1876 /// Returns `true` if the session was successfully found and removed, and `false` otherwise.
1880 /// The caller of this method is responsible for ensuring that the session has never been used with another
1883 pub unsafe fn remove_session(&self, session: &SslSessionRef) -> bool {
1884 ffi::SSL_CTX_remove_session(self.as_ptr(), session.as_ptr()) != 0
1887 /// Returns the context's session cache size limit.
1905 /// Gets the number of TLS 1.3 session tickets that will be sent to a client after a full
2080 /// An encoded SSL session.
2099 /// Deserializes a DER-encoded session structure.
2119 /// Returns the SSL session ID.
2143 /// Gets the maximum amount of early data that can be sent on this session.
2152 /// Returns the time at which the session was established, in seconds since the Unix epoch.
2161 /// A session older than this time should not be used for session resumption.
2168 /// Returns the session's TLS protocol version.
2181 /// Serializes the session into a DER-encoded structure.
2192 /// The state of an SSL/TLS session.
2464 /// Returns the current cipher if the session is active.
2474 /// Returns a short string describing the state of the session.
2485 /// Returns a longer string describing the state of the session.
2572 /// Returns the protocol version of the session.
2585 /// Returns a string describing the protocol version of the session.
2747 /// Returns a shared reference to the SSL session.
2749 pub fn session(&self) -> Option<&SslSessionRef> {
2839 /// Sets the session to be used.
2842 /// session. If the server is not willing to reuse the session, a new one will be transparently
2847 /// The caller of this method is responsible for ensuring that the session is associated
2850 pub unsafe fn set_session(&mut self, session: &SslSessionRef) -> Result<(), ErrorStack> {
2851 cvt(ffi::SSL_set_session(self.as_ptr(), session.as_ptr())).map(|_| ())
2854 /// Determines if the session provided to `set_session` was successfully reused.
2868 /// Determines if current session used Extended Master Secret
3065 /// Returns the session ID field of the client's hello message.
3374 /// Sets the number of TLS 1.3 session tickets that will be sent to a client after a full
3384 /// Gets the number of TLS 1.3 session tickets that will be sent to a client after a full
3454 /// A TLS session over a stream.
3698 /// Shuts down the session.
3705 /// session down. In particular, it must be fully shut down if the connection is to be used for
3716 /// Returns the session's shutdown state.
3725 /// Sets the session's shutdown state.
3727 /// This can be used to tell OpenSSL that the session should be cached even if a full two-way
3784 /// will most likely corrupt the SSL session.
4013 /// will most likely corrupt the SSL session.
4053 /// The shutdown state of a session.
4080 session: *const ffi::SSL_SESSION,
4085 return (*session).master_key_length as usize;
4087 if outlen > (*session).master_key_length as usize {
4088 outlen = (*session).master_key_length as usize;
4090 ptr::copy_nonoverlapping((*session).master_key.as_ptr(), out, outlen);