/curl/docs/libcurl/opts/ |
H A D | CURLOPT_COOKIESESSION.md | 18 CURLOPT_COOKIESESSION - start a new cookie session 30 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl 31 to ignore all cookies it is about to load that are "session cookies" from the 32 previous session. By default, libcurl always loads all cookies, independent if 33 they are session cookies or not. Session cookies are cookies without expiry 34 date and they are meant to be alive and existing for this "session" only. 36 A "session" is usually defined in browser land for as long as you have your 38 tell it when a new session starts, otherwise it assumes everything is still in 39 the same session. 57 /* new "session", do not load session cookies */ [all …]
|
H A D | CURLINFO_TLS_SESSION.md | 21 CURLINFO_TLS_SESSION - get TLS session info 29 struct curl_tlssessioninfo **session); 39 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the 40 session *internals* pointer varies depending on the option: 42 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***. 44 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
|
H A D | CURLOPT_RTSP_REQUEST.md | 36 responsible for parsing and obeying the response. The session ID is not needed 45 option is used. (The session ID is not needed for this method) 49 When sent by a client, this method changes the description of the session. For 52 session. ANNOUNCE acts like an HTTP PUT or POST just like 57 Setup is used to initialize the transport layer for the session. The 58 application must set the desired Transport options for a session by using the 59 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session 61 and uses the session ID in the response to this request. The session ID is not 77 This command terminates an RTSP session. Simply closing a connection does not 78 terminate the RTSP session since it is valid to control an RTSP session over [all …]
|
H A D | CURLOPT_SSL_SESSIONID_CACHE.md | 21 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache 34 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set 37 session-IDs, there seem to be or have been broken SSL implementations in the 55 /* switch off session-id use */
|
H A D | CURLINFO_TLS_SSL_PTR.md | 26 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info 34 struct curl_tlssessioninfo **session); 40 struct curl_tlssessioninfo **session); 48 internal TLS session structure of this underlying SSL library. 102 supported, an SSL session has not yet been established or the connection is no 111 This option only retrieves the first in-use SSL session pointer for your easy 112 handle, however your easy handle may have more than one in-use SSL session if 115 retrieve a second in-use SSL session associated with an easy handle.
|
H A D | CURLINFO_RTSP_SESSION_ID.md | 18 CURLINFO_RTSP_SESSION_ID - get RTSP session ID 33 Applications wishing to resume an RTSP session on another connection should
|
H A D | CURLOPT_RTSP_SESSION_ID.md | 17 CURLOPT_RTSP_SESSION_ID - RTSP session ID 30 Session ID for the handle. Useful for resuming an in-progress session. Once
|
/curl/docs/cmdline-opts/ |
H A D | junk-session-cookies.md | 4 Long: junk-session-cookies 6 Help: Ignore session cookies read from file 15 - --junk-session-cookies -b cookies.txt $URL 18 # `--junk-session-cookies` 21 discard all "session cookies". This has the same effect as if a new session is 22 started. Typical browsers discard session cookies when they are closed down.
|
H A D | no-sessionid.md | 5 Help: Disable SSL session-ID reusing 18 Disable curl's use of SSL session-ID caching. By default all transfers are 20 attempting to reuse SSL session-IDs, there seem to be broken SSL 25 --sessionid to enforce session-ID caching.
|
H A D | tls-earlydata.md | 25 as part of the TLS "session" sent back to curl. Until curl has seen such 26 a session in a previous request, early data cannot be used. 28 When a new connection is initiated with a known TLSv1.3 session, and that 29 session announced early data support, the first request on this connection is
|
H A D | curves.md | 19 Set specific curves to use during SSL session establishment according to RFC
|
/curl/lib/vtls/ |
H A D | gtls.c | 250 gnutls_session_t session; in handshake() local 254 session = backend->gtls.session; in handshake() 300 rc = gnutls_handshake(session); in handshake() 312 gnutls_record_get_direction(session) ? in handshake() 1163 gnutls_alpn_set_protocols(gctx->session, in Curl_gtls_ctx_init() 1329 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver() 1972 if(backend->gtls.session && in gtls_data_pending() 2139 if(backend->gtls.session) { in gtls_close() 2140 gnutls_deinit(backend->gtls.session); in gtls_close() 2141 backend->gtls.session = NULL; in gtls_close() [all …]
|
H A D | gtls.h | 64 gnutls_session_t session; member 92 gnutls_session_t session, 101 gnutls_session_t session,
|
H A D | vtls.c | 612 if(session->sessionid) { in Curl_ssl_kill_session() 616 session->sessionid_free(session->sessionid, session->idsize); in Curl_ssl_kill_session() 618 session->sessionid = NULL; in Curl_ssl_kill_session() 620 session->age = 0; /* fresh */ in Curl_ssl_kill_session() 624 Curl_safefree(session->name); in Curl_ssl_kill_session() 626 Curl_safefree(session->alpn); in Curl_ssl_kill_session() 672 if(!data->state.session) { in Curl_ssl_set_sessionid() 688 store = &data->state.session[0]; in Curl_ssl_set_sessionid() 855 if(data->state.session) in Curl_ssl_initsessions() 860 if(!session) in Curl_ssl_initsessions() [all …]
|
H A D | wolfssl.h | 62 WOLFSSL_SESSION *session);
|
H A D | bearssl.c | 614 const br_ssl_session_parameters *session; in bearssl_connect_step1() local 619 slen == sizeof(*session)) { in bearssl_connect_step1() 620 session = sdata; in bearssl_connect_step1() 766 br_ssl_session_parameters session; in bearssl_connect_step2() local 798 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2() 799 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2() 835 br_ssl_session_parameters *session; in bearssl_connect_step3() local 837 session = malloc(sizeof(*session)); in bearssl_connect_step3() 838 if(!session) in bearssl_connect_step3() 840 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3() [all …]
|
H A D | mbedtls.c | 884 mbedtls_ssl_session session; local 886 mbedtls_ssl_session_init(&session); 887 ret = mbedtls_ssl_session_load(&session, sdata, slen); 898 mbedtls_ssl_session_free(&session); 1121 free(session); 1136 mbedtls_ssl_session session; local 1140 mbedtls_ssl_session_init(&session); 1141 ret = mbedtls_ssl_get_session(&backend->ssl, &session); 1144 mbedtls_ssl_session_free(&session); 1149 mbedtls_ssl_session_save(&session, NULL, 0, &slen); [all …]
|
/curl/tests/http/clients/ |
H A D | Makefile.inc | 32 tls-session-reuse \
|
H A D | .gitignore | 11 tls-session-reuse
|
/curl/lib/ |
H A D | http2.c | 496 static int on_begin_headers(nghttp2_session *session, 504 static int error_callback(nghttp2_session *session, const char *msg, 1286 (void)session; in on_frame_send() 1326 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv() 1328 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv() 1399 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv() 1422 (void)session; in on_stream_close() 1472 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument 1662 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument 1711 static int error_callback(nghttp2_session *session, in error_callback() argument [all …]
|
H A D | cf-h2-proxy.c | 302 static int proxy_h2_on_frame_recv(nghttp2_session *session, 306 static int proxy_h2_on_frame_send(nghttp2_session *session, 313 static int proxy_h2_on_header(nghttp2_session *session, 644 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument 651 (void)session; in proxy_h2_on_frame_send() 664 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument 673 (void)session; in proxy_h2_on_frame_recv() 740 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument 755 (void)session; in proxy_h2_on_header() 858 (void)session; in tunnel_recv_callback() [all …]
|
/curl/tests/data/ |
H A D | test320 | 22 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
|
H A D | test568 | 68 i=A Seminar on the session description protocol 92 i=A Seminar on the session description protocol
|
H A D | test53 | 29 HTTP, junk session cookies
|
/curl/docs/libcurl/ |
H A D | libcurl-easy.md | 25 When using libcurl's "easy" interface you init your session and get a handle 51 transfer, or if you are done, cleanup the session by calling
|