Searched refs:resumption (Results 26 – 42 of 42) sorted by relevance
12
/openssl/doc/man3/ |
H A D | SSL_CTX_set_tlsext_status_cb.pod | 53 callback will not be called in the event of a handshake where session resumption
|
H A D | SSL_CTX_sess_set_get_cb.pod | 79 resumption once. One way of enforcing that is for applications to call
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 90 A connection established via a TLSv1.3 PSK will appear as if session resumption
|
H A D | SSL_CTX_set_options.pod | 111 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means 116 In TLSv1.3, on resumption let the server prefer a non-(ec)dhe based key 295 (i.e., session resumption requests are only accepted in the initial
|
H A D | SSL_CTX_set_client_hello_cb.pod | 102 resumption and the historical servername callback.
|
H A D | SSL_CTX_set_psk_client_callback.pod | 134 A connection established via a TLSv1.3 PSK will appear as if session resumption
|
H A D | SSL_CONF_cmd.pod | 98 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means 103 In TLSv1.3, on resumption let the server prefer a non-(ec)dhe based key 550 resumption. This means that there will be no forward secrecy for the resumed 553 B<PreferNoDHEKEX>: In TLSv1.3, on resumption let the server prefer a
|
H A D | SSL_read_early_data.pod | 307 then the resumption is allowed and the session is removed from the cache. If it 308 does not exist then the resumption is not allowed and a full handshake will
|
H A D | SSL_CTX_dane_enable.pod | 283 * Load any saved session for resumption, making sure that the previous
|
H A D | SSL_shutdown.pod | 213 to benefit from session resumption are advised to perform a complete shutdown
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-server-block.pod | 143 TLS handshake. With TLS 1.3, session resumption typically still performs a fresh 147 * Servers that want to enable session resumption must specify a cache id
|
H A D | ossl-guide-tls-introduction.pod | 239 speed up the process of connecting. This is known as "resumption". Sessions are
|
/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 904 Attempt to reconnect to the server using a resumption handshake. 949 Reconnect to the peer and attempt a resumption handshake
|
H A D | openssl-s_server.pod.in | 651 affect the number of tickets sent after a resumption handshake.
|
/openssl/ |
H A D | NEWS.md | 192 server to prefer session resumption using PSK-only key exchange over PSK 1327 * Compression session resumption fixed. 1798 * Fixed a security hole related to session resumption
|
H A D | CHANGES.md | 376 server to prefer session resumption using PSK-only key exchange over PSK 3648 was not quite right. The behaviour was not consistent between resumption 10495 a new session (session resumption can resume whatever was 10971 stored in that context to allow for session resumption, even after the 11189 * Fixes to stateless session resumption handling. Use initial_ctx when 11192 stateless session resumption: this makes it possible to determine if 11193 a resumption has occurred immediately after receiving server hello 11678 stored in that context to allow for session resumption, even after the 13517 checked on reconnect on the client side, therefore session resumption 14151 By default, clients may request session resumption even during [all …]
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 366 /* As server, disallow session resumption on renegotiation */ 2246 /* Pre-shared secret session resumption functions */
|
Completed in 89 milliseconds
12