SSL_session_reused - query whether a reused session was negotiated during handshake
#include <openssl/ssl.h> int SSL_session_reused(SSL *ssl);
OpenSSL SSL_session_reused(3openssl)
NAME
SSL_session_reused - query whether a reused session was negotiated
during handshake
SYNOPSIS
#include <openssl/ssl.h>
int SSL_session_reused(SSL *ssl);
DESCRIPTION
Query, whether a reused session was negotiated during the handshake.
ATTRIBUTES
See attributes(7) for descriptions of the following attributes:
+---------------+--------------------------+
|ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+---------------+--------------------------+
|Availability | library/security/openssl |
+---------------+--------------------------+
|Stability | Pass-through uncommitted |
+---------------+--------------------------+
NOTES
During the negotiation, a client can propose to reuse a session. The
server then looks up the session in its cache. If both client and
server agree on the session, it will be reused and a flag is being set
that can be queried by the application.
Source code for open source software components in Oracle Solaris can
be found at https://www.oracle.com/downloads/opensource/solaris-source-
code-downloads.html.
This software was built from source available at
https://github.com/oracle/solaris-userland. The original community
source was downloaded from
https://www.openssl.org/source/openssl-1.0.2ze.tar.gz.
Further information about this software can be found on the open source
community website at https://www.openssl.org/.
RETURN VALUES
The following return values can occur:
0 A new session was negotiated.
1 A session was reused.
SEE ALSO
ssl(3), SSL_set_session(3), SSL_CTX_set_session_cache_mode(3)
1.0.2ze 2022-05-03
SSL_session_reused(3openssl)