/curl/docs/cmdline-opts/ |
H A D | junk-session-cookies.md | 4 Long: junk-session-cookies 6 Help: Ignore session cookies read from file 15 - --junk-session-cookies -b cookies.txt $URL 18 # `--junk-session-cookies` 21 discard all "session cookies". This has the same effect as if a new session is 22 started. Typical browsers discard session cookies when they are closed down.
|
H A D | no-sessionid.md | 5 Help: Disable SSL session-ID reusing 18 Disable curl's use of SSL session-ID caching. By default all transfers are 20 attempting to reuse SSL session-IDs, there seem to be broken SSL 25 --sessionid to enforce session-ID caching.
|
H A D | ssl-sessions.md | 7 Help: Load/save SSL session tickets from/to this file 19 Use the given file to load SSL session tickets into curl's cache before 27 Using a session file allows `--tls-earlydata` to send the first request 28 in "0-RTT" mode, should an SSL session with the feature be found. Note that 32 The SSL session tickets are stored as base64 encoded text, each ticket on
|
H A D | tls-earlydata.md | 26 as part of the TLS "session" sent back to curl. Until curl has seen such 27 a session in a previous request, early data cannot be used. 29 When a new connection is initiated with a known TLSv1.3 session, and that 30 session announced early data support, the first request on this connection is
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_COOKIESESSION.md | 18 CURLOPT_COOKIESESSION - start a new cookie session 30 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl 31 to ignore all cookies it is about to load that are "session cookies" from the 32 previous session. By default, libcurl always loads all cookies, independent if 33 they are session cookies or not. Session cookies are cookies without expiry 34 date and they are meant to be alive and existing for this "session" only. 36 A "session" is usually defined in browser land for as long as you have your 38 tell it when a new session starts, otherwise it assumes everything is still in 39 the same session. 57 /* new "session", do not load session cookies */ [all …]
|
H A D | CURLINFO_TLS_SESSION.md | 21 CURLINFO_TLS_SESSION - get TLS session info 29 struct curl_tlssessioninfo **session); 39 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the 40 session *internals* pointer varies depending on the option: 42 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***. 44 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
|
H A D | CURLOPT_RTSP_REQUEST.md | 36 responsible for parsing and obeying the response. The session ID is not needed 45 option is used. (The session ID is not needed for this method) 49 When sent by a client, this method changes the description of the session. For 52 session. ANNOUNCE acts like an HTTP PUT or POST just like 57 Setup is used to initialize the transport layer for the session. The 58 application must set the desired Transport options for a session by using the 59 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session 61 and uses the session ID in the response to this request. The session ID is not 77 This command terminates an RTSP session. Simply closing a connection does not 78 terminate the RTSP session since it is valid to control an RTSP session over [all …]
|
H A D | CURLOPT_SSL_SESSIONID_CACHE.md | 21 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache 34 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set 37 session-IDs, there seem to be or have been broken SSL implementations in the 55 /* switch off session-id use */
|
H A D | CURLINFO_TLS_SSL_PTR.md | 26 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info 34 struct curl_tlssessioninfo **session); 40 struct curl_tlssessioninfo **session); 48 internal TLS session structure of this underlying SSL library. 102 supported, an SSL session has not yet been established or the connection is no 111 This option only retrieves the first in-use SSL session pointer for your easy 112 handle, however your easy handle may have more than one in-use SSL session if 115 retrieve a second in-use SSL session associated with an easy handle.
|
H A D | CURLINFO_RTSP_SESSION_ID.md | 18 CURLINFO_RTSP_SESSION_ID - get RTSP session ID 33 Applications wishing to resume an RTSP session on another connection should
|
H A D | CURLOPT_RTSP_SESSION_ID.md | 17 CURLOPT_RTSP_SESSION_ID - RTSP session ID 30 Session ID for the handle. Useful for resuming an in-progress session. Once
|
/curl/lib/vtls/ |
H A D | gtls.c | 248 gnutls_session_t session; in handshake() local 252 session = backend->gtls.session; in handshake() 298 rc = gnutls_handshake(session); in handshake() 310 gnutls_record_get_direction(session) ? in handshake() 1239 gnutls_alpn_set_protocols(gctx->session, in Curl_gtls_ctx_init() 1408 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver() 2054 if(backend->gtls.session && in gtls_data_pending() 2221 if(backend->gtls.session) { in gtls_close() 2222 gnutls_deinit(backend->gtls.session); in gtls_close() 2223 backend->gtls.session = NULL; in gtls_close() [all …]
|
H A D | gtls.h | 51 int Curl_glts_get_ietf_proto(gnutls_session_t session); 67 gnutls_session_t session; member 102 gnutls_session_t session, 112 gnutls_session_t session,
|
H A D | bearssl.c | 614 const br_ssl_session_parameters *session; in bearssl_connect_step1() local 619 session = (br_ssl_session_parameters *)(void *)sc_session->sdata; in bearssl_connect_step1() 766 br_ssl_session_parameters session; in bearssl_connect_step2() local 798 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2() 799 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2() 830 br_ssl_session_parameters *session; in bearssl_connect_step3() local 832 session = malloc(sizeof(*session)); in bearssl_connect_step3() 833 if(!session) in bearssl_connect_step3() 835 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3() 836 ret = Curl_ssl_session_create((unsigned char *)session, sizeof(*session), in bearssl_connect_step3() [all …]
|
H A D | wolfssl.h | 64 WOLFSSL_SESSION *session,
|
/curl/docs/libcurl/ |
H A D | curl_easy_ssls_export.md | 50 This function iterates over all SSL session tickets that belong to the 55 in another libcurl instance to add SSL session tickets again. Reuse of 56 SSL session tickets may result in faster handshakes and some connections 62 on specific session tickets. 72 the session ticket is originating from and also contains all relevant 84 for every session individually. Storing **shmac** is recommended when 85 placing session tickets in a file, for example. 93 SSL session ticket information for a later import - apart from **session_key** 98 Seconds since EPOCH (1970-01-01) until the session ticket is considered 103 The IETF assigned number for the TLS version the session ticket originates
|
H A D | curl_easy_ssls_import.md | 39 This function imports a previously exported SSL session ticket. **sdata** and 44 Import of session tickets from other curl versions may fail due to changes 45 in the handling of **shmac** or **sdata**. A session ticket which has
|
H A D | libcurl-easy.md | 25 When using libcurl's "easy" interface you init your session and get a handle 51 transfer, or if you are done, cleanup the session by calling
|
/curl/tests/http/clients/ |
H A D | Makefile.inc | 32 tls-session-reuse \
|
H A D | .gitignore | 10 tls-session-reuse
|
/curl/lib/ |
H A D | http2.c | 493 static int on_begin_headers(nghttp2_session *session, 501 static int error_callback(nghttp2_session *session, const char *msg, 1283 (void)session; in on_frame_send() 1323 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv() 1325 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv() 1396 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv() 1419 (void)session; in on_stream_close() 1469 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument 1659 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument 1708 static int error_callback(nghttp2_session *session, in error_callback() argument [all …]
|
H A D | cf-h2-proxy.c | 302 static int proxy_h2_on_frame_recv(nghttp2_session *session, 306 static int proxy_h2_on_frame_send(nghttp2_session *session, 313 static int proxy_h2_on_header(nghttp2_session *session, 644 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument 651 (void)session; in proxy_h2_on_frame_send() 664 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument 673 (void)session; in proxy_h2_on_frame_recv() 740 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument 755 (void)session; in proxy_h2_on_header() 858 (void)session; in tunnel_recv_callback() [all …]
|
/curl/tests/data/ |
H A D | test320 | 22 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
|
H A D | test568 | 68 i=A Seminar on the session description protocol 92 i=A Seminar on the session description protocol
|
H A D | test53 | 29 HTTP, junk session cookies
|