Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 66) sorted by relevance

123

/curl/docs/cmdline-opts/
H A Djunk-session-cookies.md4 Long: junk-session-cookies
6 Help: Ignore session cookies read from file
15 - --junk-session-cookies -b cookies.txt $URL
18 # `--junk-session-cookies`
21 discard all "session cookies". This has the same effect as if a new session is
22 started. Typical browsers discard session cookies when they are closed down.
H A Dno-sessionid.md5 Help: Disable SSL session-ID reusing
18 Disable curl's use of SSL session-ID caching. By default all transfers are
20 attempting to reuse SSL session-IDs, there seem to be broken SSL
25 --sessionid to enforce session-ID caching.
H A Dcurves.md19 Set specific curves to use during SSL session establishment according to RFC
/curl/docs/libcurl/opts/
H A DCURLOPT_COOKIESESSION.md17 CURLOPT_COOKIESESSION - start a new cookie session
29 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl
30 to ignore all cookies it is about to load that are "session cookies" from the
31 previous session. By default, libcurl always loads all cookies, independent if
32 they are session cookies or not. Session cookies are cookies without expiry
33 date and they are meant to be alive and existing for this "session" only.
35 A "session" is usually defined in browser land for as long as you have your
37 tell it when a new session starts, otherwise it assumes everything is still in
38 the same session.
54 /* new "session", do not load session cookies */
[all …]
H A DCURLINFO_TLS_SESSION.md20 CURLINFO_TLS_SESSION - get TLS session info
28 struct curl_tlssessioninfo **session);
38 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the
39 session *internals* pointer varies depending on the option:
41 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***.
43 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
H A DCURLOPT_RTSP_REQUEST.md35 responsible for parsing and obeying the response. The session ID is not needed
44 option is used. (The session ID is not needed for this method)
48 When sent by a client, this method changes the description of the session. For
51 session. ANNOUNCE acts like an HTTP PUT or POST just like
56 Setup is used to initialize the transport layer for the session. The
57 application must set the desired Transport options for a session by using the
58 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session
60 and uses the session ID in the response to this request. The session ID is not
76 This command terminates an RTSP session. Simply closing a connection does not
77 terminate the RTSP session since it is valid to control an RTSP session over
[all …]
H A DCURLOPT_SSL_SESSIONID_CACHE.md20 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache
33 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set
36 session-IDs, there seem to be or have been broken SSL implementations in the
52 /* switch off session-id use! */
H A DCURLINFO_TLS_SSL_PTR.md25 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info
33 struct curl_tlssessioninfo **session);
39 struct curl_tlssessioninfo **session);
47 internal TLS session structure of this underlying SSL library.
101 supported, an SSL session has not yet been established or the connection is no
110 This option only retrieves the first in-use SSL session pointer for your easy
111 handle, however your easy handle may have more than one in-use SSL session if
114 retrieve a second in-use SSL session associated with an easy handle.
H A DCURLINFO_RTSP_SESSION_ID.md17 CURLINFO_RTSP_SESSION_ID - get RTSP session ID
32 Applications wishing to resume an RTSP session on another connection should
H A DCURLOPT_RTSP_SESSION_ID.md16 CURLOPT_RTSP_SESSION_ID - RTSP session ID
29 Session ID for the handle. Useful for resuming an in-progress session. Once
H A DCURLINFO_RTSP_SERVER_CSEQ.md35 Applications wishing to resume an RTSP session on another connection should
/curl/lib/vtls/
H A Dgtls.c249 gnutls_session_t session; in handshake() local
253 session = backend->gtls.session; in handshake()
299 rc = gnutls_handshake(session); in handshake()
1256 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver()
1727 gnutls_session_t session; in gtls_connect_common() local
1729 session = backend->gtls.session; in gtls_connect_common()
1775 if(backend->gtls.session && in gtls_data_pending()
1893 if(backend->gtls.session) { in gtls_close()
1898 gnutls_deinit(backend->gtls.session); in gtls_close()
1899 backend->gtls.session = NULL; in gtls_close()
[all …]
H A Dgtls.h63 gnutls_session_t session; member
90 gnutls_session_t session,
H A Dvtls.c606 if(session->sessionid) { in Curl_ssl_kill_session()
610 session->sessionid_free(session->sessionid, session->idsize); in Curl_ssl_kill_session()
612 session->sessionid = NULL; in Curl_ssl_kill_session()
613 session->sessionid_free = NULL; in Curl_ssl_kill_session()
614 session->age = 0; /* fresh */ in Curl_ssl_kill_session()
618 Curl_safefree(session->name); in Curl_ssl_kill_session()
667 if(!data->state.session) { in Curl_ssl_addsessionid()
672 store = &data->state.session[0]; in Curl_ssl_addsessionid()
824 if(data->state.session) in Curl_ssl_initsessions()
829 if(!session) in Curl_ssl_initsessions()
[all …]
H A Dbearssl.c588 void *session; in bearssl_connect_step1() local
592 if(!Curl_ssl_getsessionid(cf, data, &connssl->peer, &session, NULL)) { in bearssl_connect_step1()
593 br_ssl_engine_set_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step1()
756 br_ssl_session_parameters session; in bearssl_connect_step2() local
786 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2()
787 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2()
824 br_ssl_session_parameters *session; in bearssl_connect_step3() local
826 session = malloc(sizeof(*session)); in bearssl_connect_step3()
827 if(!session) in bearssl_connect_step3()
829 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3()
[all …]
/curl/tests/http/clients/
H A DMakefile.inc32 tls-session-reuse \
H A D.gitignore10 tls-session-reuse
/curl/lib/
H A Dcf-h2-proxy.c299 static int proxy_h2_on_frame_recv(nghttp2_session *session,
303 static int proxy_h2_on_frame_send(nghttp2_session *session,
310 static int proxy_h2_on_header(nghttp2_session *session,
643 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument
650 (void)session; in proxy_h2_on_frame_send()
663 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument
672 (void)session; in proxy_h2_on_frame_recv()
739 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument
754 (void)session; in proxy_h2_on_header()
857 (void)session; in tunnel_recv_callback()
[all …]
H A Dhttp2.c410 static int on_begin_headers(nghttp2_session *session,
417 static int error_callback(nghttp2_session *session, const char *msg,
1180 (void)session; in on_frame_send()
1220 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv()
1222 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv()
1293 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv()
1319 (void)session; in on_stream_close()
1371 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument
1561 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument
1616 static int error_callback(nghttp2_session *session, in error_callback() argument
[all …]
/curl/tests/data/
H A Dtest32022 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
H A Dtest56868 i=A Seminar on the session description protocol
92 i=A Seminar on the session description protocol
H A Dtest5329 HTTP, junk session cookies
/curl/lib/vquic/
H A Dvquic-tls.c265 if(ctx->gtls.session) in Curl_vquic_tls_cleanup()
266 gnutls_deinit(ctx->gtls.session); in Curl_vquic_tls_cleanup()
323 result = Curl_gtls_verifyserver(data, ctx->gtls.session, in Curl_vquic_tls_verify_peer()
/curl/docs/libcurl/
H A Dlibcurl-easy.md24 When using libcurl's "easy" interface you init your session and get a handle
51 transfer, or if you are done, cleanup the session by calling
H A Dcurl_easy_reset.md18 curl_easy_reset - reset all options of a libcurl session handle

Completed in 99 milliseconds

123