Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 72) sorted by relevance

123

/curl/docs/libcurl/opts/
H A DCURLOPT_COOKIESESSION.md18 CURLOPT_COOKIESESSION - start a new cookie session
30 Pass a long set to 1 to mark this as a new cookie "session". It forces libcurl
31 to ignore all cookies it is about to load that are "session cookies" from the
32 previous session. By default, libcurl always loads all cookies, independent if
33 they are session cookies or not. Session cookies are cookies without expiry
34 date and they are meant to be alive and existing for this "session" only.
36 A "session" is usually defined in browser land for as long as you have your
38 tell it when a new session starts, otherwise it assumes everything is still in
39 the same session.
57 /* new "session", do not load session cookies */
[all …]
H A DCURLINFO_TLS_SESSION.md21 CURLINFO_TLS_SESSION - get TLS session info
29 struct curl_tlssessioninfo **session);
39 case of OpenSSL. If the session *backend* is CURLSSLBACKEND_OPENSSL the
40 session *internals* pointer varies depending on the option:
42 CURLINFO_TLS_SESSION(3) OpenSSL session *internals* is **SSL_CTX ***.
44 CURLINFO_TLS_SSL_PTR(3) OpenSSL session *internals* is **SSL ***.
H A DCURLOPT_RTSP_REQUEST.md36 responsible for parsing and obeying the response. The session ID is not needed
45 option is used. (The session ID is not needed for this method)
49 When sent by a client, this method changes the description of the session. For
52 session. ANNOUNCE acts like an HTTP PUT or POST just like
57 Setup is used to initialize the transport layer for the session. The
58 application must set the desired Transport options for a session by using the
59 CURLOPT_RTSP_TRANSPORT(3) option prior to calling setup. If no session
61 and uses the session ID in the response to this request. The session ID is not
77 This command terminates an RTSP session. Simply closing a connection does not
78 terminate the RTSP session since it is valid to control an RTSP session over
[all …]
H A DCURLOPT_SSL_SESSIONID_CACHE.md21 CURLOPT_SSL_SESSIONID_CACHE - use the SSL session-ID cache
34 Pass a long set to 0 to disable libcurl's use of SSL session-ID caching. Set
37 session-IDs, there seem to be or have been broken SSL implementations in the
55 /* switch off session-id use */
H A DCURLINFO_TLS_SSL_PTR.md26 CURLINFO_TLS_SESSION, CURLINFO_TLS_SSL_PTR - get TLS session info
34 struct curl_tlssessioninfo **session);
40 struct curl_tlssessioninfo **session);
48 internal TLS session structure of this underlying SSL library.
102 supported, an SSL session has not yet been established or the connection is no
111 This option only retrieves the first in-use SSL session pointer for your easy
112 handle, however your easy handle may have more than one in-use SSL session if
115 retrieve a second in-use SSL session associated with an easy handle.
H A DCURLINFO_RTSP_SESSION_ID.md18 CURLINFO_RTSP_SESSION_ID - get RTSP session ID
33 Applications wishing to resume an RTSP session on another connection should
H A DCURLOPT_RTSP_SESSION_ID.md17 CURLOPT_RTSP_SESSION_ID - RTSP session ID
30 Session ID for the handle. Useful for resuming an in-progress session. Once
/curl/docs/cmdline-opts/
H A Djunk-session-cookies.md4 Long: junk-session-cookies
6 Help: Ignore session cookies read from file
15 - --junk-session-cookies -b cookies.txt $URL
18 # `--junk-session-cookies`
21 discard all "session cookies". This has the same effect as if a new session is
22 started. Typical browsers discard session cookies when they are closed down.
H A Dno-sessionid.md5 Help: Disable SSL session-ID reusing
18 Disable curl's use of SSL session-ID caching. By default all transfers are
20 attempting to reuse SSL session-IDs, there seem to be broken SSL
25 --sessionid to enforce session-ID caching.
H A Dtls-earlydata.md25 as part of the TLS "session" sent back to curl. Until curl has seen such
26 a session in a previous request, early data cannot be used.
28 When a new connection is initiated with a known TLSv1.3 session, and that
29 session announced early data support, the first request on this connection is
H A Dcurves.md19 Set specific curves to use during SSL session establishment according to RFC
/curl/lib/vtls/
H A Dgtls.c250 gnutls_session_t session; in handshake() local
254 session = backend->gtls.session; in handshake()
300 rc = gnutls_handshake(session); in handshake()
312 gnutls_record_get_direction(session) ? in handshake()
1163 gnutls_alpn_set_protocols(gctx->session, in Curl_gtls_ctx_init()
1329 gnutls_cipher_get(session)) { in Curl_gtls_verifyserver()
1972 if(backend->gtls.session && in gtls_data_pending()
2139 if(backend->gtls.session) { in gtls_close()
2140 gnutls_deinit(backend->gtls.session); in gtls_close()
2141 backend->gtls.session = NULL; in gtls_close()
[all …]
H A Dgtls.h64 gnutls_session_t session; member
92 gnutls_session_t session,
101 gnutls_session_t session,
H A Dvtls.c612 if(session->sessionid) { in Curl_ssl_kill_session()
616 session->sessionid_free(session->sessionid, session->idsize); in Curl_ssl_kill_session()
618 session->sessionid = NULL; in Curl_ssl_kill_session()
620 session->age = 0; /* fresh */ in Curl_ssl_kill_session()
624 Curl_safefree(session->name); in Curl_ssl_kill_session()
626 Curl_safefree(session->alpn); in Curl_ssl_kill_session()
672 if(!data->state.session) { in Curl_ssl_set_sessionid()
688 store = &data->state.session[0]; in Curl_ssl_set_sessionid()
855 if(data->state.session) in Curl_ssl_initsessions()
860 if(!session) in Curl_ssl_initsessions()
[all …]
H A Dwolfssl.h62 WOLFSSL_SESSION *session);
H A Dbearssl.c614 const br_ssl_session_parameters *session; in bearssl_connect_step1() local
619 slen == sizeof(*session)) { in bearssl_connect_step1()
620 session = sdata; in bearssl_connect_step1()
766 br_ssl_session_parameters session; in bearssl_connect_step2() local
798 br_ssl_engine_get_session_parameters(&backend->ctx.eng, &session); in bearssl_connect_step2()
799 Curl_cipher_suite_get_str(session.cipher_suite, cipher_str, in bearssl_connect_step2()
835 br_ssl_session_parameters *session; in bearssl_connect_step3() local
837 session = malloc(sizeof(*session)); in bearssl_connect_step3()
838 if(!session) in bearssl_connect_step3()
840 br_ssl_engine_get_session_parameters(&backend->ctx.eng, session); in bearssl_connect_step3()
[all …]
H A Dmbedtls.c884 mbedtls_ssl_session session; local
886 mbedtls_ssl_session_init(&session);
887 ret = mbedtls_ssl_session_load(&session, sdata, slen);
898 mbedtls_ssl_session_free(&session);
1121 free(session);
1136 mbedtls_ssl_session session; local
1140 mbedtls_ssl_session_init(&session);
1141 ret = mbedtls_ssl_get_session(&backend->ssl, &session);
1144 mbedtls_ssl_session_free(&session);
1149 mbedtls_ssl_session_save(&session, NULL, 0, &slen);
[all …]
/curl/tests/http/clients/
H A DMakefile.inc32 tls-session-reuse \
H A D.gitignore11 tls-session-reuse
/curl/lib/
H A Dhttp2.c496 static int on_begin_headers(nghttp2_session *session,
504 static int error_callback(nghttp2_session *session, const char *msg,
1286 (void)session; in on_frame_send()
1326 session, NGHTTP2_SETTINGS_MAX_CONCURRENT_STREAMS); in on_frame_recv()
1328 session, NGHTTP2_SETTINGS_ENABLE_PUSH) != 0; in on_frame_recv()
1399 nghttp2_session_consume(session, stream_id, len); in on_data_chunk_recv()
1422 (void)session; in on_stream_close()
1472 static int on_begin_headers(nghttp2_session *session, in on_begin_headers() argument
1662 static ssize_t req_body_read_callback(nghttp2_session *session, in req_body_read_callback() argument
1711 static int error_callback(nghttp2_session *session, in error_callback() argument
[all …]
H A Dcf-h2-proxy.c302 static int proxy_h2_on_frame_recv(nghttp2_session *session,
306 static int proxy_h2_on_frame_send(nghttp2_session *session,
313 static int proxy_h2_on_header(nghttp2_session *session,
644 static int proxy_h2_on_frame_send(nghttp2_session *session, in proxy_h2_on_frame_send() argument
651 (void)session; in proxy_h2_on_frame_send()
664 static int proxy_h2_on_frame_recv(nghttp2_session *session, in proxy_h2_on_frame_recv() argument
673 (void)session; in proxy_h2_on_frame_recv()
740 static int proxy_h2_on_header(nghttp2_session *session, in proxy_h2_on_header() argument
755 (void)session; in proxy_h2_on_header()
858 (void)session; in tunnel_recv_callback()
[all …]
/curl/tests/data/
H A Dtest32022 <h5>If your browser supports session resuming, then you should see the same session ID, when you pr…
H A Dtest56868 i=A Seminar on the session description protocol
92 i=A Seminar on the session description protocol
H A Dtest5329 HTTP, junk session cookies
/curl/docs/libcurl/
H A Dlibcurl-easy.md25 When using libcurl's "easy" interface you init your session and get a handle
51 transfer, or if you are done, cleanup the session by calling

Completed in 48 milliseconds

123