Home
last modified time | relevance | path

Searched refs:resumption (Results 26 – 42 of 42) sorted by relevance

12

/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_status_cb.pod53 callback will not be called in the event of a handshake where session resumption
H A DSSL_CTX_sess_set_get_cb.pod79 resumption once. One way of enforcing that is for applications to call
H A DSSL_CTX_use_psk_identity_hint.pod90 A connection established via a TLSv1.3 PSK will appear as if session resumption
H A DSSL_CTX_set_options.pod111 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means
116 In TLSv1.3, on resumption let the server prefer a non-(ec)dhe based key
295 (i.e., session resumption requests are only accepted in the initial
H A DSSL_CTX_set_client_hello_cb.pod102 resumption and the historical servername callback.
H A DSSL_CTX_set_psk_client_callback.pod134 A connection established via a TLSv1.3 PSK will appear as if session resumption
H A DSSL_CONF_cmd.pod98 In TLSv1.3 allow a non-(ec)dhe based key exchange mode on resumption. This means
103 In TLSv1.3, on resumption let the server prefer a non-(ec)dhe based key
550 resumption. This means that there will be no forward secrecy for the resumed
553 B<PreferNoDHEKEX>: In TLSv1.3, on resumption let the server prefer a
H A DSSL_read_early_data.pod307 then the resumption is allowed and the session is removed from the cache. If it
308 does not exist then the resumption is not allowed and a full handshake will
H A DSSL_CTX_dane_enable.pod283 * Load any saved session for resumption, making sure that the previous
H A DSSL_shutdown.pod213 to benefit from session resumption are advised to perform a complete shutdown
/openssl/doc/man7/
H A Dossl-guide-tls-server-block.pod143 TLS handshake. With TLS 1.3, session resumption typically still performs a fresh
147 * Servers that want to enable session resumption must specify a cache id
H A Dossl-guide-tls-introduction.pod239 speed up the process of connecting. This is known as "resumption". Sessions are
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in904 Attempt to reconnect to the server using a resumption handshake.
949 Reconnect to the peer and attempt a resumption handshake
H A Dopenssl-s_server.pod.in651 affect the number of tickets sent after a resumption handshake.
/openssl/
H A DNEWS.md192 server to prefer session resumption using PSK-only key exchange over PSK
1327 * Compression session resumption fixed.
1798 * Fixed a security hole related to session resumption
H A DCHANGES.md376 server to prefer session resumption using PSK-only key exchange over PSK
3648 was not quite right. The behaviour was not consistent between resumption
10495 a new session (session resumption can resume whatever was
10971 stored in that context to allow for session resumption, even after the
11189 * Fixes to stateless session resumption handling. Use initial_ctx when
11192 stateless session resumption: this makes it possible to determine if
11193 a resumption has occurred immediately after receiving server hello
11678 stored in that context to allow for session resumption, even after the
13517 checked on reconnect on the client side, therefore session resumption
14151 By default, clients may request session resumption even during
[all …]
/openssl/include/openssl/
H A Dssl.h.in366 /* As server, disallow session resumption on renegotiation */
2246 /* Pre-shared secret session resumption functions */

Completed in 89 milliseconds

12