It's OK that I have to use this function, but what I don't understand is
why do I have to use it? Why do I have to set an arbitrary string? Why
doesn't openssl do this internally so that I don't have to know about an
obscure thing to set to make it work.
On Sep 26, 2014 3:18 AM, "Viktor Dukhovni"
On Thu, Sep 25, 2014 at 02:51:16PM +0200, DEXTER wrote:
> Also checking openssl source (apps/s_server.c) to find out why it
> works with plain s_client, s_server, I see this:
>
> static int s_server_session_id_context = 1; /* anything will do */
>
> SSL_CTX_set_session_id_context(ctx,(void*)&s_s
For our application we have a corner case that involves an SSL stream being
tunneled through another SSL stream. In other words, we already have an
SSL session with the client, and inside that session the client wants to
create another tunnel.
Is it possible to create a BIO off an existing SSL ob
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
OpenSSL version 1.0.2 beta 3
=
OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/
OpenSSL 1.0.2 is currently in beta. OpenSSL 1.0.2 beta 3 has now
been released. For details of changes
Starting with the next release after 1.0.2, we're planning on removing the
following platforms from the codebase.
NeXT NEWS SUNOS
It looks like SUNOS can be handled by adding -Dssize_t=int as a compiler flag.
For your information, we have already removed BEOS, MWERKS and pre-OSx Mac
supp
Also checking openssl source (apps/s_server.c) to find out why it
works with plain s_client, s_server, I see this:
static int s_server_session_id_context = 1; /* anything will do */
SSL_CTX_set_session_id_context(ctx,(void*)&s_server_session_id_context,
sizeof s_server_session_id_
Hi!
I have an openssl server, and I'm using the
SSL_CTX_set_tlsext_ticket_key_cb to set a callback to be able to use
tls tickets.
When the SSL_CTX_set_verify callback is not set, then it works as it should.
But as soon as I set a verify callback (to verify the client cert) I
this error when the c