/curl/docs/cmdline-opts/ |
H A D | junk-session-cookies.md | 4 Long: junk-session-cookies 6 Help: Ignore session cookies read from file 15 - --junk-session-cookies -b cookies.txt $URL 18 # `--junk-session-cookies` 21 discard all "session cookies". This has the same effect as if a new session is 22 started. Typical browsers discard session cookies when they are closed down.
|
H A D | no-sessionid.md | 5 Help: Disable SSL session-ID reusing 18 Disable curl's use of SSL session-ID caching. By default all transfers are 20 attempting to reuse SSL session-IDs, there seem to be broken SSL 25 --sessionid to enforce session-ID caching.
|
H A D | curves.md | 19 Set specific curves to use during SSL session establishment according to RFC
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_COOKIESESSION.md | 17 CURLOPT_COOKIESESSION - start a new cookie session 29 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl 30 to ignore all cookies it is about to load that are "session cookies" from the 31 previous session. By default, libcurl always loads all cookies, independent if 32 they are session cookies or not. Session cookies are cookies without expiry 33 date and they are meant to be alive and existing for this "session" only. 35 A "session" is usually defined in browser land for as long as you have your 37 tell it when a new session starts, otherwise it assumes everything is still in 38 the same session. 54 /* new "session", do not load session cookies */ [all …]
|
H A D | CURLINFO_TLS_SESSION.md | 20 CURLINFO_TLS_SESSION - get TLS session info 28 struct curl_tlssessioninfo **session); 38 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the 39 session *internals* pointer varies depending on the option: 41 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***. 43 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
|
H A D | CURLOPT_RTSP_REQUEST.md | 35 responsible for parsing and obeying the response. The session ID is not needed 44 option is used. (The session ID is not needed for this method) 48 When sent by a client, this method changes the description of the session. For 51 session. ANNOUNCE acts like an HTTP PUT or POST just like 56 Setup is used to initialize the transport layer for the session. The 57 application must set the desired Transport options for a session by using the 58 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session 60 and uses the session ID in the response to this request. The session ID is not 76 This command terminates an RTSP session. Simply closing a connection does not 77 terminate the RTSP session since it is valid to control an RTSP session over [all …]
|
H A D | CURLOPT_SSL_SESSIONID_CACHE.md | 20 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache 33 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set 36 session-IDs, there seem to be or have been broken SSL implementations in the 52 /* switch off session-id use! */
|
H A D | CURLINFO_TLS_SSL_PTR.md | 25 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info 33 struct curl_tlssessioninfo **session); 39 struct curl_tlssessioninfo **session); 47 internal TLS session structure of this underlying SSL library. 101 supported, an SSL session has not yet been established or the connection is no 110 This option only retrieves the first in-use SSL session pointer for your easy 111 handle, however your easy handle may have more than one in-use SSL session if 114 retrieve a second in-use SSL session associated with an easy handle.
|
H A D | CURLINFO_RTSP_SESSION_ID.md | 17 CURLINFO_RTSP_SESSION_ID - get RTSP session ID 32 Applications wishing to resume an RTSP session on another connection should
|
H A D | CURLOPT_RTSP_SESSION_ID.md | 16 CURLOPT_RTSP_SESSION_ID - RTSP session ID 29 Session ID for the handle. Useful for resuming an in-progress session. Once
|
H A D | CURLINFO_RTSP_SERVER_CSEQ.md | 35 Applications wishing to resume an RTSP session on another connection should
|
/curl/lib/vtls/ |
H A D | gtls.c | 249 gnutls_session_t session; in handshake() local 253 session = backend->gtls.session; in handshake() 299 rc = gnutls_handshake(session); in handshake() 1256 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver() 1727 gnutls_session_t session; in gtls_connect_common() local 1729 session = backend->gtls.session; in gtls_connect_common() 1775 if(backend->gtls.session && in gtls_data_pending() 1893 if(backend->gtls.session) { in gtls_close() 1898 gnutls_deinit(backend->gtls.session); in gtls_close() 1899 backend->gtls.session = NULL; in gtls_close() [all …]
|
H A D | gtls.h | 63 gnutls_session_t session; member 90 gnutls_session_t session,
|
H A D | vtls.c | 606 if(session->sessionid) { in Curl_ssl_kill_session() 610 session->sessionid_free(session->sessionid, session->idsize); in Curl_ssl_kill_session() 612 session->sessionid = NULL; in Curl_ssl_kill_session() 613 session->sessionid_free = NULL; in Curl_ssl_kill_session() 614 session->age = 0; /* fresh */ in Curl_ssl_kill_session() 618 Curl_safefree(session->name); in Curl_ssl_kill_session() 667 if(!data->state.session) { in Curl_ssl_addsessionid() 672 store = &data->state.session[0]; in Curl_ssl_addsessionid() 824 if(data->state.session) in Curl_ssl_initsessions() 829 if(!session) in Curl_ssl_initsessions() [all …]
|
H A D | bearssl.c | 588 void *session; in bearssl_connect_step1() local 592 if(!Curl_ssl_getsessionid(cf, data, &connssl->peer, &session, NULL)) { in bearssl_connect_step1() 593 br_ssl_engine_set_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step1() 756 br_ssl_session_parameters session; in bearssl_connect_step2() local 786 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2() 787 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2() 824 br_ssl_session_parameters *session; in bearssl_connect_step3() local 826 session = malloc(sizeof(*session)); in bearssl_connect_step3() 827 if(!session) in bearssl_connect_step3() 829 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3() [all …]
|
/curl/tests/http/clients/ |
H A D | Makefile.inc | 32 tls-session-reuse \
|
H A D | .gitignore | 10 tls-session-reuse
|
/curl/lib/ |
H A D | cf-h2-proxy.c | 299 static int proxy_h2_on_frame_recv(nghttp2_session *session, 303 static int proxy_h2_on_frame_send(nghttp2_session *session, 310 static int proxy_h2_on_header(nghttp2_session *session, 643 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument 650 (void)session; in proxy_h2_on_frame_send() 663 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument 672 (void)session; in proxy_h2_on_frame_recv() 739 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument 754 (void)session; in proxy_h2_on_header() 857 (void)session; in tunnel_recv_callback() [all …]
|
H A D | http2.c | 410 static int on_begin_headers(nghttp2_session *session, 417 static int error_callback(nghttp2_session *session, const char *msg, 1180 (void)session; in on_frame_send() 1220 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv() 1222 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv() 1293 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv() 1319 (void)session; in on_stream_close() 1371 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument 1561 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument 1616 static int error_callback(nghttp2_session *session, in error_callback() argument [all …]
|
/curl/tests/data/ |
H A D | test320 | 22 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
|
H A D | test568 | 68 i=A Seminar on the session description protocol 92 i=A Seminar on the session description protocol
|
H A D | test53 | 29 HTTP, junk session cookies
|
/curl/lib/vquic/ |
H A D | vquic-tls.c | 265 if(ctx->gtls.session) in Curl_vquic_tls_cleanup() 266 gnutls_deinit(ctx->gtls.session); in Curl_vquic_tls_cleanup() 323 result = Curl_gtls_verifyserver(data, ctx->gtls.session, in Curl_vquic_tls_verify_peer()
|
/curl/docs/libcurl/ |
H A D | libcurl-easy.md | 24 When using libcurl's "easy" interface you init your session and get a handle 51 transfer, or if you are done, cleanup the session by calling
|
H A D | curl_easy_reset.md | 18 curl_easy_reset - reset all options of a libcurl session handle
|