Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 77) sorted by relevance

1234

/curl/docs/cmdline-opts/
H A Djunk-session-cookies.md4 Long: junk-session-cookies
6 Help: Ignore session cookies read from file
15 - --junk-session-cookies -b cookies.txt $URL
18 # `--junk-session-cookies`
21 discard all "session cookies". This has the same effect as if a new session is
22 started. Typical browsers discard session cookies when they are closed down.
H A Dno-sessionid.md5 Help: Disable SSL session-ID reusing
18 Disable curl's use of SSL session-ID caching. By default all transfers are
20 attempting to reuse SSL session-IDs, there seem to be broken SSL
25 --sessionid to enforce session-ID caching.
H A Dssl-sessions.md7 Help: Load/save SSL session tickets from/to this file
19 Use the given file to load SSL session tickets into curl's cache before
27 Using a session file allows `--tls-earlydata` to send the first request
28 in "0-RTT" mode, should an SSL session with the feature be found. Note that
32 The SSL session tickets are stored as base64 encoded text, each ticket on
H A Dtls-earlydata.md26 as part of the TLS "session" sent back to curl. Until curl has seen such
27 a session in a previous request, early data cannot be used.
29 When a new connection is initiated with a known TLSv1.3 session, and that
30 session announced early data support, the first request on this connection is
/curl/docs/libcurl/opts/
H A DCURLOPT_COOKIESESSION.md18 CURLOPT_COOKIESESSION - start a new cookie session
30 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl
31 to ignore all cookies it is about to load that are "session cookies" from the
32 previous session. By default, libcurl always loads all cookies, independent if
33 they are session cookies or not. Session cookies are cookies without expiry
34 date and they are meant to be alive and existing for this "session" only.
36 A "session" is usually defined in browser land for as long as you have your
38 tell it when a new session starts, otherwise it assumes everything is still in
39 the same session.
57 /* new "session", do not load session cookies */
[all …]
H A DCURLINFO_TLS_SESSION.md21 CURLINFO_TLS_SESSION - get TLS session info
29 struct curl_tlssessioninfo **session);
39 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the
40 session *internals* pointer varies depending on the option:
42 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***.
44 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
H A DCURLOPT_RTSP_REQUEST.md36 responsible for parsing and obeying the response. The session ID is not needed
45 option is used. (The session ID is not needed for this method)
49 When sent by a client, this method changes the description of the session. For
52 session. ANNOUNCE acts like an HTTP PUT or POST just like
57 Setup is used to initialize the transport layer for the session. The
58 application must set the desired Transport options for a session by using the
59 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session
61 and uses the session ID in the response to this request. The session ID is not
77 This command terminates an RTSP session. Simply closing a connection does not
78 terminate the RTSP session since it is valid to control an RTSP session over
[all …]
H A DCURLOPT_SSL_SESSIONID_CACHE.md21 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache
34 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set
37 session-IDs, there seem to be or have been broken SSL implementations in the
55 /* switch off session-id use */
H A DCURLINFO_TLS_SSL_PTR.md26 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info
34 struct curl_tlssessioninfo **session);
40 struct curl_tlssessioninfo **session);
48 internal TLS session structure of this underlying SSL library.
102 supported, an SSL session has not yet been established or the connection is no
111 This option only retrieves the first in-use SSL session pointer for your easy
112 handle, however your easy handle may have more than one in-use SSL session if
115 retrieve a second in-use SSL session associated with an easy handle.
H A DCURLINFO_RTSP_SESSION_ID.md18 CURLINFO_RTSP_SESSION_ID - get RTSP session ID
33 Applications wishing to resume an RTSP session on another connection should
H A DCURLOPT_RTSP_SESSION_ID.md17 CURLOPT_RTSP_SESSION_ID - RTSP session ID
30 Session ID for the handle. Useful for resuming an in-progress session. Once
/curl/lib/vtls/
H A Dgtls.c248 gnutls_session_t session; in handshake() local
252 session = backend->gtls.session; in handshake()
298 rc = gnutls_handshake(session); in handshake()
310 gnutls_record_get_direction(session) ? in handshake()
1239 gnutls_alpn_set_protocols(gctx->session, in Curl_gtls_ctx_init()
1408 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver()
2054 if(backend->gtls.session && in gtls_data_pending()
2221 if(backend->gtls.session) { in gtls_close()
2222 gnutls_deinit(backend->gtls.session); in gtls_close()
2223 backend->gtls.session = NULL; in gtls_close()
[all …]
H A Dgtls.h51 int Curl_glts_get_ietf_proto(gnutls_session_t session);
67 gnutls_session_t session; member
102 gnutls_session_t session,
112 gnutls_session_t session,
H A Dbearssl.c614 const br_ssl_session_parameters *session; in bearssl_connect_step1() local
619 session = (br_ssl_session_parameters *)(void *)sc_session->sdata; in bearssl_connect_step1()
766 br_ssl_session_parameters session; in bearssl_connect_step2() local
798 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2()
799 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2()
830 br_ssl_session_parameters *session; in bearssl_connect_step3() local
832 session = malloc(sizeof(*session)); in bearssl_connect_step3()
833 if(!session) in bearssl_connect_step3()
835 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3()
836 ret = Curl_ssl_session_create((unsigned char *)session, sizeof(*session), in bearssl_connect_step3()
[all …]
H A Dwolfssl.h64 WOLFSSL_SESSION *session,
/curl/docs/libcurl/
H A Dcurl_easy_ssls_export.md50 This function iterates over all SSL session tickets that belong to the
55 in another libcurl instance to add SSL session tickets again. Reuse of
56 SSL session tickets may result in faster handshakes and some connections
62 on specific session tickets.
72 the session ticket is originating from and also contains all relevant
84 for every session individually. Storing **shmac** is recommended when
85 placing session tickets in a file, for example.
93 SSL session ticket information for a later import - apart from **session_key**
98 Seconds since EPOCH (1970-01-01) until the session ticket is considered
103 The IETF assigned number for the TLS version the session ticket originates
H A Dcurl_easy_ssls_import.md39 This function imports a previously exported SSL session ticket. **sdata** and
44 Import of session tickets from other curl versions may fail due to changes
45 in the handling of **shmac** or **sdata**. A session ticket which has
H A Dlibcurl-easy.md25 When using libcurl's "easy" interface you init your session and get a handle
51 transfer, or if you are done, cleanup the session by calling
/curl/tests/http/clients/
H A DMakefile.inc32 tls-session-reuse \
H A D.gitignore10 tls-session-reuse
/curl/lib/
H A Dhttp2.c493 static int on_begin_headers(nghttp2_session *session,
501 static int error_callback(nghttp2_session *session, const char *msg,
1283 (void)session; in on_frame_send()
1323 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv()
1325 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv()
1396 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv()
1419 (void)session; in on_stream_close()
1469 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument
1659 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument
1708 static int error_callback(nghttp2_session *session, in error_callback() argument
[all …]
H A Dcf-h2-proxy.c302 static int proxy_h2_on_frame_recv(nghttp2_session *session,
306 static int proxy_h2_on_frame_send(nghttp2_session *session,
313 static int proxy_h2_on_header(nghttp2_session *session,
644 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument
651 (void)session; in proxy_h2_on_frame_send()
664 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument
673 (void)session; in proxy_h2_on_frame_recv()
740 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument
755 (void)session; in proxy_h2_on_header()
858 (void)session; in tunnel_recv_callback()
[all …]
/curl/tests/data/
H A Dtest32022 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
H A Dtest56868 i=A Seminar on the session description protocol
92 i=A Seminar on the session description protocol
H A Dtest5329 HTTP, junk session cookies

Completed in 53 milliseconds

1234