Lines Matching refs:session
614 * an option to change the list for an existing session).
718 /* client cert is in the session cache, but there is
1671 "request=%s status=%s id=%s %s(session %s)",
1679 * added to the internal OpenSSL session cache. We use this hook to spread the
1683 int ssl_callback_NewSessionCacheEntry(SSL *ssl, SSL_SESSION *session)
1698 SSL_set_timeout(session, timeout);
1705 id = (unsigned char *)SSL_SESSION_get_id(session, &idlen);
1707 id = session->session_id;
1708 idlen = session->session_id_length;
1712 apr_time_from_sec(SSL_SESSION_get_time(session)
1714 session, conn->pool);
1721 * return 0 which means to OpenSSL that the session is still
1741 SSL_SESSION *session;
1746 session = ssl_scache_retrieve(s, id, idlen, conn->pool);
1749 session ? "FOUND" : "MISSED",
1750 session ? "reuse" : "renewal", 0);
1760 return session;
1770 SSL_SESSION *session)
1790 id = (unsigned char *)SSL_SESSION_get_id(session, &idlen);
1792 id = session->session_id;
1793 idlen = session->session_id_length;
2048 * Adjust the session id context. ssl_init_ssl_connection()
2050 * calling SSL_new(), but we want to tie the session to the
2052 * that we're not overwriting a session id context which was
2098 * decrypting a TLS session ticket (RFC 5077) and a ticket key file has been
2133 "TLS session ticket key for %s successfully set, "
2134 "creating new session ticket", sc->vhost_id);
2154 "TLS session ticket key for %s successfully set, "
2155 "decrypting existing session ticket", sc->vhost_id);