Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ssl_session_reused(3ssl) [ultrix man page]

SSL_session_reused(3SSL)					      OpenSSL						  SSL_session_reused(3SSL)

NAME
SSL_session_reused - query whether a reused session was negotiated during handshake SYNOPSIS
#include <openssl/ssl.h> int SSL_session_reused(SSL *ssl); DESCRIPTION
Query, whether a reused session was negotiated during the handshake. NOTES
During the negotiation, a client can propose to reuse a session. The server then looks up the session in its cache. If both client and server agree on the session, it will be reused and a flag is being set that can be queried by the application. RETURN VALUES
The following return values can occur: 0 A new session was negotiated. 1 A session was reused. SEE ALSO
ssl(3), SSL_set_session(3), SSL_CTX_set_session_cache_mode(3) 1.0.1e 2013-02-11 SSL_session_reused(3SSL)

Check Out this Related Man Page

SSL_set_session(3SSL)						      OpenSSL						     SSL_set_session(3SSL)

NAME
SSL_set_session - set a TLS/SSL session to be used during TLS/SSL connect SYNOPSIS
#include <openssl/ssl.h> int SSL_set_session(SSL *ssl, SSL_SESSION *session); DESCRIPTION
SSL_set_session() sets session to be used when the TLS/SSL connection is to be established. SSL_set_session() is only useful for TLS/SSL clients. When the session is set, the reference count of session is incremented by 1. If the session is not reused, the reference count is decremented again during SSL_connect(). Whether the session was reused can be queried with the SSL_session_reused(3) call. If there is already a session set inside ssl (because it was set with SSL_set_session() before or because the same ssl was already used for a connection), SSL_SESSION_free() will be called for that session. NOTES
SSL_SESSION objects keep internal link information about the session cache list, when being inserted into one SSL_CTX object's session cache. One SSL_SESSION object, regardless of its reference count, must therefore only be used with one SSL_CTX object (and the SSL objects created from this SSL_CTX object). RETURN VALUES
The following return values can occur: 0 The operation failed; check the error stack to find out the reason. 1 The operation succeeded. SEE ALSO
ssl(3), SSL_SESSION_free(3), SSL_get_session(3), SSL_session_reused(3), SSL_CTX_set_session_cache_mode(3) 1.0.1e 2013-02-11 SSL_set_session(3SSL)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies