Hi,
I have to start a new ssl session on previous ssl socket.
Can this be done? Are there any problems I may get into?
Here is what I need to do:
1. start a session
2. send/receive some data
3. close the session but keep the connection open.
4. start a new session
5. send/receive some data
6. c
Hi,
I am searching the openssl source code now but I thought I should also
post a question here. I use SSL_read() on nonblocking socket. SSL_read
() will uses the TCP system call read() to read the data from the
socket. My question is when read() returns EAGAIN, will the control
returned to
1)
Never reuse keys; use a new key for each file. This is
true whether you use a stream or block cipher. Never use
a block cipher in ECB mode for encrypting files. etc. etc.
2)
There are numerous schemes that support random file access
while encrypting. With block c
Help!!!
I successfully make OpenSSL DLL's under Borland Free C++ Compiler 5.5.
After that I try to compile example sign.c program dynamically linked to
libeay32.dll.
I must mention that this little program works good when linked with static
library, but not with dynamic (crash)
I recognized that
Hello,
I am not able to install openssl. I am getting following errors. Can
any one tell me where I am wrong?
Error:
--
ho12fe:edcstat> ./Configure sunos-gcc --prefix=/home/ho12fe/apachefe
--openssldir=/home/ho12fe/apachefe/openssl
Configuring for sunos-gcc
IsWi
On Mon, Mar 11, 2002 at 09:18:08AM +0100, Joerg Bartholdt wrote:
> Dr S N Henson wrote:
>
> >Joerg Bartholdt wrote:
> >
> >>Hi *,
> >>
> >>During the SSL Handshake, OpenSSL can call a verify_callback
> >>that can manipulate the outcome of the certificate verification
> >>process.
> >>If I use so
Lorenzo wrote:
> I have a quick question to ask. I'm using the EVP_EncryptInit and
> EVP_DecryptInit functions to stream data to a file. Basically, I
> encrypt data , one byte at a time, which is in the put area of my
> filebuf object and send it out. I When I get data from the file, I
> decr
Dr S N Henson wrote:
>Joerg Bartholdt wrote:
>
>>Hi *,
>>
>>During the SSL Handshake, OpenSSL can call a verify_callback
>>that can manipulate the outcome of the certificate verification
>>process.
>>If I use some longterm evaluation like an OCSP-Request, my single
>>threaded application is bloc