| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647 |
- .\" generated by cd2nroff 0.1 from CURLOPT_SSL_SESSIONID_CACHE.md
- .TH CURLOPT_SSL_SESSIONID_CACHE 3 "2025-01-17" libcurl
- .SH NAME
- CURLOPT_SSL_SESSIONID_CACHE \- use the SSL session\-ID cache
- .SH SYNOPSIS
- .nf
- #include <curl/curl.h>
- CURLcode curl_easy_setopt(CURL *handle, CURLOPT_SSL_SESSIONID_CACHE,
- long enabled);
- .fi
- .SH DESCRIPTION
- Pass a long set to 0 to disable libcurl\(aqs use of SSL session\-ID caching. Set
- this to 1 to enable it. By default all transfers are done using the cache
- enabled. While nothing ever should get hurt by attempting to reuse SSL
- session\-IDs, there seem to be or have been broken SSL implementations in the
- wild that may require you to disable this in order for you to succeed.
- .SH DEFAULT
- 1
- .SH PROTOCOLS
- This functionality affects all TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc.
- All TLS backends support this option.
- .SH EXAMPLE
- .nf
- int main(void)
- {
- CURL *curl = curl_easy_init();
- if(curl) {
- CURLcode res;
- curl_easy_setopt(curl, CURLOPT_URL, "https://example.com/");
- /* switch off session-id use! */
- curl_easy_setopt(curl, CURLOPT_SSL_SESSIONID_CACHE, 0L);
- res = curl_easy_perform(curl);
- curl_easy_cleanup(curl);
- }
- }
- .fi
- .SH AVAILABILITY
- Added in curl 7.16.0
- .SH RETURN VALUE
- Returns CURLE_OK if the option is supported, and CURLE_UNKNOWN_OPTION if not.
- .SH SEE ALSO
- .BR CURLOPT_DNS_CACHE_TIMEOUT (3),
- .BR CURLOPT_MAXAGE_CONN (3),
- .BR CURLOPT_MAXLIFETIME_CONN (3),
- .BR CURLOPT_SSLVERSION (3)
|