Hi Marek,
 
I have some doubts over the ssl buffer. Let I put my questions below
 
1. What happens when the server keeps on writing and no data has been read from the client?, Is there any possibility of buffer overflow?. Please explain this senarion briefly.
 
2. Assume that during the ssl handshake we have some un read data in the ssl buffer. When the application is crashed or closed in the middle of the transacion will that the buffer(which holds the un read data ) will lead to memory leaking.
 
3. Where the ssl have its default buffer?, either in stack or heap locations? 

----- Original Message ----
From: Marek Marcola <[EMAIL PROTECTED]>
To: openssl-users@openssl.org
Sent: Saturday, 7 October, 2006 12:22:13 AM
Subject: RE: large data read error

Hello,
> Is there a way to overcome the 16k limit besides breaking down the
> message/response?  
Try to set SSL_CTX option SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
to extend SSL buffer to 32k.

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]


Send instant messages to your online friends http://uk.messenger.yahoo.com

Reply via email to