On Fri, Mar 08, 2002 at 09:42:42AM +0100, Joerg Bartholdt wrote:
> During the SSL Handshake, OpenSSL can call a verify_callback
> that can manipulate the outcome of the certificate verification
> process.
> If I use some longterm evaluation like an OCSP-Request, my single
> threaded application is blocked during this time. I cannot return
> a value like "I don't know yet, ask later" - I have to have the
> decision before I return from the callback.
> So, there is no change for handling other connections (I usually use
> select() and async IO to handle multiple connection which OpenSSL
> can do pretty well in all other states...) during that time.
>
> Does anybody have a solution?
Hmm, hmm. Sounds like this case has not been prepared. When asking the
user for a client certificate, the case seems to be prepared
(look for SSL_X509_LOOKUP in s3_clnt.c). However: as far as I understand,
OCSP has only been introduced after the verify_callback() thing was
invented, so the case you describe has not been covered.
I think it would be possible to enhance libssl to also handle this
case, but it would require quite some rewrite of the mechanism...
> P.S.: I thought I had send this email a couple of days ago already,
> but it did not show up - so I assume, I didn't :-(
I remember reading about it, but I also remember not having an answer
at that time.
Good luck,
Lutz
--
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]