Hi All Any suggestion on the problem?
Thanks Darshan From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Mody, Darshan (Darshan) Sent: Sunday, May 6, 2018 7:28 PM To: openssl-users@openssl.org Subject: Re: [openssl-users] disable session id reuse Hi We do set SSL_CTX_set_options(ctx, SSL_OP_NO_TICKET); while initializing Context Thanks Darshan From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Devang Kubavat Sent: Sunday, May 6, 2018 1:42 PM To: openssl-users@openssl.org<mailto:openssl-users@openssl.org> Subject: Re: [openssl-users] disable session id reuse Hi Darshan, In Addition, Make sure that you should disable the session ticket based session resumption using SSL_OP_NO_TICKET. By default SSL_OP_NO_TICKET is not disabled. Thanks Devang Sent from my iPhone On 03-May-2018, at 2:12 PM, Mody, Darshan (Darshan) <darshanm...@avaya.com<mailto:darshanm...@avaya.com>> wrote: Hi, While doing a openssl s_time command I find that by default it tries for Session Id Reuse. “Now timing with session id reuse.” In case if we don’t want openssl to reuse session id’s how can we configure openssl in the application for the same. The application here is acting as a server. I have set SSL_CTX_set_session_cache_mode to SSL_SESS_CACHE_OFF Thanks Darshan -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users<https://urldefense.proofpoint.com/v2/url?u=https-3A__mta.openssl.org_mailman_listinfo_openssl-2Dusers&d=DwMFaQ&c=BFpWQw8bsuKpl1SgiZH64Q&r=bsEULbVnjelD7InzgsegHBEbtXzaIDagy9EuEhJrKfQ&m=6EwdsImPOhlHS6cQdur-UNtSfmU8P5PrY6_Yr_tCo2U&s=SJPsG8EXG55k4n7fzDiMayd1OUlyHCWP2JzifuoOKg0&e=>
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users