X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=lib%2Fopenssl%2Fdoc%2Fssl%2FSSL_CTX_set_session_cache_mode.pod;h=a2e82664d0949959044fdbaa63e8e365a6a95084;hb=02ed66432c92de70694700164f986190aad3cbc5;hp=c5d2f43dff15da5222904ef74b1d49bc8b4a0bb0;hpb=89016837dcbf2775cd15dc8cbaba00dc6379f86e;p=cassiopeia.git diff --git a/lib/openssl/doc/ssl/SSL_CTX_set_session_cache_mode.pod b/lib/openssl/doc/ssl/SSL_CTX_set_session_cache_mode.pod index c5d2f43..a2e8266 100644 --- a/lib/openssl/doc/ssl/SSL_CTX_set_session_cache_mode.pod +++ b/lib/openssl/doc/ssl/SSL_CTX_set_session_cache_mode.pod @@ -26,7 +26,7 @@ SSL_CTX object is being maintained, the sessions are unique for each SSL_CTX object. In order to reuse a session, a client must send the session's id to the -server. It can only send exactly one id. The server then either +server. It can only send exactly one id. The server then either agrees to reuse the session or it starts a full handshake (to create a new session). @@ -37,7 +37,7 @@ the external storage if available. Since a client may try to reuse a session intended for use in a different context, the session id context must be set by the server (see -L). +L). The following session cache modes and modifiers are available: @@ -53,7 +53,7 @@ Client sessions are added to the session cache. As there is no reliable way for the OpenSSL library to know whether a session should be reused or which session to choose (due to the abstract BIO layer the SSL engine does not have details about the connection), the application must select the session -to be reused by using the L +to be reused by using the L function. This option is not activated by default. =item SSL_SESS_CACHE_SERVER @@ -72,10 +72,10 @@ Enable both SSL_SESS_CACHE_CLIENT and SSL_SESS_CACHE_SERVER at the same time. Normally the session cache is checked for expired sessions every 255 connections using the -L function. Since +L function. Since this may lead to a delay which cannot be controlled, the automatic flushing may be disabled and -L can be called +L can be called explicitly by the application. =item SSL_SESS_CACHE_NO_INTERNAL_LOOKUP @@ -94,7 +94,7 @@ sessions negotiated in an SSL/TLS handshake may be cached for possible reuse. Normally a new session is added to the internal cache as well as any external session caching (callback) that is configured for the SSL_CTX. This flag will prevent sessions being stored in the internal cache (though the application can -add them manually using L). Note: +add them manually using L). Note: in any SSL/TLS servers where external caching is configured, any successful session lookups in the external cache (ie. for session-resume requests) would normally be copied into the local cache before processing continues - this flag @@ -119,19 +119,23 @@ SSL_CTX_get_session_cache_mode() returns the currently set cache mode. =head1 SEE ALSO -L, L, -L, -L, -L, -L, -L, -L, -L, -L +L, L, +L, +L, +L, +L, +L, +L, +L, +L -=head1 HISTORY +=head1 COPYRIGHT -SSL_SESS_CACHE_NO_INTERNAL_STORE and SSL_SESS_CACHE_NO_INTERNAL -were introduced in OpenSSL 0.9.6h. +Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved. + +Licensed under the OpenSSL license (the "License"). You may not use +this file except in compliance with the License. You can obtain a copy +in the file LICENSE in the source distribution or at +L. =cut