Thanks for the response.  As I mentioned in my more detailed followup, we're 
planning to use SSL to protect the file data (and metadata) while it's in 
flight, and a separate encryption scheme for the data "at rest".  Because the 
file upload might require several (or many) attempts, I was hoping to find a 
way to avoid a) either breaking the file up into separately encrypted chunks on 
the server or b) doing a lot of processing (decrypting, re-encrypting, etc.) to 
sync things back up.

Note that we're expecting upload interruptions to be not infrequent, and that a 
not insignificant amount of time may pass between upload attempts--hours or 
even days.

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
Sent: Wednesday, May 30, 2007 3:30 PM
To: openssl-users@openssl.org
Subject: Re: Saving (and restoring) cipher context

You may have already gotten this answer, but just in case you haven't...

You're looking at two distinct problems.  The first is protecting the data "in 
motion", and you basically need to look at the SSL routines and related 
authentication information (e.g., X.509 certificates).  The data you put in the 
pipe is what you will get out on the other side.  It could be plaintext or a 
previously encrypted file.

The other problem is protecting the data "at rest".  This is where your AES 
encryption comes in, and all of the key management issues involved with 
symmetrical keys.

HTH

Bear

> Folks,
>
> I apologize if this is a somewhat naïve or misinformed question, as 
> I'm new to the OpenSSL APIs and not quite sure how things work yet.
>
> I'm developing an application in which we're using AES to encrypt 
> files as they're transferred from another system and saved to disk.  
> We'd like to provide the ability for the application to resume a 
> transfer that was interrupted mid-stream, but the encryption throws a 
> bit of a wrench into things because of the state associated with the 
> encryption context.
>
> Is there a safe, supported way to stash the context somewhere on disk 
> so that encryption can be resumed where it left off when the file 
> transfer starts up again?  We're currently looking at the EVP 
> functions; would we have to drop down to the lower-level, 
> algorithm-specific routines to do this right?
>
> Thanks in advance for any guidance you can provide.
>
> --
> Jim Wong ([EMAIL PROTECTED])
>
>


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to