On Fri, Mar 08, 2002 at 09:42:42AM +0100, Joerg Bartholdt wrote:
> During the SSL Handshake, OpenSSL  can call a verify_callback 
> that can manipulate the outcome of the certificate verification
> process.
> If I use some longterm evaluation like an OCSP-Request, my single
> threaded application is blocked during this time. I cannot return
> a value like "I don't know yet, ask later" - I have to have the
> decision before I return from the callback.
> So, there is no change for handling other connections (I usually use
> select() and async IO to handle multiple connection which OpenSSL
> can do pretty well in all other states...) during that time.
> 
> Does anybody have a solution?

Hmm, hmm. Sounds like this case has not been prepared. When asking the
user for a client certificate, the case seems to be prepared
(look for SSL_X509_LOOKUP in s3_clnt.c). However: as far as I understand,
OCSP has only been introduced after the verify_callback() thing was
invented, so the case you describe has not been covered.
I think it would be possible to enhance libssl to also handle this
case, but it would require quite some rewrite of the mechanism...

> P.S.: I thought I had send this email a couple of days ago already,
> but it did not show up - so I assume, I didn't :-(

I remember reading about it, but I also remember not having an answer
at that time.

Good luck,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to