Hi All.

We wish to exhange data over sockets in embedded-environments, and
unfortunately can't afford to use the de-facto openssl implementation,
which I believe uses dynamic memory allocations/deallocations in its code
(we intend to deploy our solution using bare-metal C, in environments where
even no RTOS are available).

I googled a lot, but somehow managed to fail in finding the native
SSL-signalling steps.
We are wishing to gain some information on native SSL-signalling, much like
what GET/POST/PUT/DELETE are for HTTP.

Since OpenSSL is the de-facto/expert in this field, may I please put
forward my earnest request for directing us to some literature in this
regard, wherein we can set up a SSL-context using absolute native
SS7-signalling.


Our plan is pretty straighforward ::

1)
Connect to a nginix-erver on its HTTPS port.

2)
<Set up SSL-context using native SS7-signalling, on the same socket of step
1>

3)
Just before what would have been a normal socket "send", we encrypt the
data using the server-public-key obtained from step 2, and then send the
encrypted data (over the socket of step 1).

4)
Just after what would have been a normal socket "recv", we decrypt the data
(obtained from the socket of step 1) using the client-private-key obtained
from step 2, and then have it available to the client's software.



Looking forward to some pointers...


Thanks and Regards,
Ajay
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to