Home | History | Annotate | Download | only in vtls

Lines Matching defs:session

111   gnutls_session_t session;
130 * session-specific error variable, and when not set also its own global
133 * Windows builds these callbacks should ideally set the session-specific
289 gnutls_session_t session = BACKEND->session;
334 rc = gnutls_handshake(session);
338 gnutls_record_get_direction(session)?
346 int alert = gnutls_alert_get(session);
360 int alert = gnutls_alert_get(session);
489 gnutls_session_t session;
628 /* Initialize TLS session as a client */
632 /* Disable TLS session tickets */
636 rc = gnutls_init(&BACKEND->session, init_flags);
643 session = BACKEND->session;
650 (gnutls_server_name_set(session, GNUTLS_NAME_DNS, hostname,
656 rc = gnutls_set_default_priority(session);
661 rc = gnutls_cipher_set_priority(session, cipher_priority);
668 rc = gnutls_certificate_type_set_priority(session, cert_type_priority);
706 rc = gnutls_protocol_set_priority(session, protocol_priority);
742 rc = gnutls_priority_set_direct(session, prioritylist, &err);
756 rc = gnutls_priority_set_direct(session, prioritycopy, &err);
787 gnutls_alpn_set_protocols(session, protocols, cur, 0);
833 /* put the credentials to the current session */
835 rc = gnutls_credentials_set(session, GNUTLS_CRD_SRP,
845 rc = gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE,
854 transport_ptr = conn->proxy_ssl[sockindex].backend->session;
866 gnutls_transport_set_ptr(session, transport_ptr);
869 gnutls_transport_set_push_function(session, gnutls_transport_push);
870 gnutls_transport_set_pull_function(session, gnutls_transport_pull);
873 gnutls_transport_set_lowat(session, 0);
877 rc = gnutls_ocsp_status_request_enable_client(session, NULL, 0, NULL);
885 /* This might be a reconnect, so we check for a session ID in the cache
893 /* we got a session id, use it! */
894 gnutls_session_set_data(session, ssl_sessionid, ssl_idsize);
897 infof(data, "SSL re-using session ID\n");
980 gnutls_session_t session = BACKEND->session;
989 gnutls_protocol_t version = gnutls_protocol_get_version(session);
995 ptr = gnutls_cipher_suite_get_name(gnutls_kx_get(session),
996 gnutls_cipher_get(session),
997 gnutls_mac_get(session));
1008 chainp = gnutls_certificate_get_peers(session, &cert_list_size);
1017 && gnutls_cipher_get(session)) {
1057 rc = gnutls_certificate_verify_peers2(session, &verify_status);
1083 if(gnutls_ocsp_status_request_is_checked(session, 0) == 0) {
1090 rc = gnutls_ocsp_status_request_get(session, &status_request);
1385 ptr = gnutls_compression_get_name(gnutls_compression_get(session));
1394 rc = gnutls_alpn_get_selected_protocol(session, &proto);
1422 /* we always unconditionally get the session id here, as even if we
1431 /* get the session ID data size */
1432 gnutls_session_get_data(session, NULL, &connect_idsize);
1436 /* extract session ID to the allocated buffer */
1437 gnutls_session_get_data(session, connect_sessionid, &connect_idsize);
1448 /* store this session id */
1532 if(BACKEND->session &&
1533 0 != gnutls_record_check_pending(BACKEND->session))
1537 if(BACKEND->session &&
1538 0 != gnutls_record_check_pending(BACKEND->session))
1551 ssize_t rc = gnutls_record_send(BACKEND->session, mem, len);
1566 if(BACKEND->session) {
1567 gnutls_bye(BACKEND->session, GNUTLS_SHUT_RDWR);
1568 gnutls_deinit(BACKEND->session);
1569 BACKEND->session = NULL;
1608 gnutls_bye(BACKEND->session, GNUTLS_SHUT_WR);
1610 if(BACKEND->session) {
1617 result = gnutls_record_recv(BACKEND->session,
1648 gnutls_deinit(BACKEND->session);
1659 BACKEND->session = NULL;
1673 ret = gnutls_record_recv(BACKEND->session, buf, buffersize);
1805 return BACKEND->session;