SSL_session_reused - query whether a reused session was negotiated during handshake
#include <openssl/ssl.h> int SSL_session_reused(SSL *ssl);
OpenSSL SSL_session_reused(3openssl) NAME SSL_session_reused - query whether a reused session was negotiated during handshake SYNOPSIS #include <openssl/ssl.h> int SSL_session_reused(SSL *ssl); DESCRIPTION Query, whether a reused session was negotiated during the handshake. ATTRIBUTES See attributes(7) for descriptions of the following attributes: +---------------+--------------------------+ |ATTRIBUTE TYPE | ATTRIBUTE VALUE | +---------------+--------------------------+ |Availability | library/security/openssl | +---------------+--------------------------+ |Stability | Pass-through uncommitted | +---------------+--------------------------+ NOTES During the negotiation, a client can propose to reuse a session. The server then looks up the session in its cache. If both client and server agree on the session, it will be reused and a flag is being set that can be queried by the application. Source code for open source software components in Oracle Solaris can be found at https://www.oracle.com/downloads/opensource/solaris-source- code-downloads.html. This software was built from source available at https://github.com/oracle/solaris-userland. The original community source was downloaded from https://www.openssl.org/source/openssl-1.0.2ze.tar.gz. Further information about this software can be found on the open source community website at https://www.openssl.org/. RETURN VALUES The following return values can occur: 0 A new session was negotiated. 1 A session was reused. SEE ALSO ssl(3), SSL_set_session(3), SSL_CTX_set_session_cache_mode(3) 1.0.2ze 2022-05-03 SSL_session_reused(3openssl)