diff options
author | Rob Austein <sra@hactrn.net> | 2006-06-20 17:32:05 +0000 |
---|---|---|
committer | Rob Austein <sra@hactrn.net> | 2006-06-20 17:32:05 +0000 |
commit | eca4feb580cffd6af474f599efe3fe99505a525c (patch) | |
tree | 59fa47c6f197931d6da746cadf7ad37ff1ec4557 /openssl/vendor/current/doc/ssl/SSL_session_reused.pod |
Importing OpenSSL 0.9.8b
svn path=/openssl/vendor/current/CHANGES; revision=1
Diffstat (limited to 'openssl/vendor/current/doc/ssl/SSL_session_reused.pod')
-rw-r--r-- | openssl/vendor/current/doc/ssl/SSL_session_reused.pod | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/openssl/vendor/current/doc/ssl/SSL_session_reused.pod b/openssl/vendor/current/doc/ssl/SSL_session_reused.pod new file mode 100644 index 00000000..da7d0626 --- /dev/null +++ b/openssl/vendor/current/doc/ssl/SSL_session_reused.pod @@ -0,0 +1,45 @@ +=pod + +=head1 NAME + +SSL_session_reused - query whether a reused session was negotiated during handshake + +=head1 SYNOPSIS + + #include <openssl/ssl.h> + + int SSL_session_reused(SSL *ssl); + +=head1 DESCRIPTION + +Query, whether a reused session was negotiated during the handshake. + +=head1 NOTES + +During the negotiation, a client can propose to reuse a session. The server +then looks up the session in its cache. If both client and server agree +on the session, it will be reused and a flag is being set that can be +queried by the application. + +=head1 RETURN VALUES + +The following return values can occur: + +=over 4 + +=item 0 + +A new session was negotiated. + +=item 1 + +A session was reused. + +=back + +=head1 SEE ALSO + +L<ssl(3)|ssl(3)>, L<SSL_set_session(3)|SSL_set_session(3)>, +L<SSL_CTX_set_session_cache_mode(3)|SSL_CTX_set_session_cache_mode(3)> + +=cut |