the SSL_METHOD structure?
Taral
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
'd be
happy to help.
Taral
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
ly, and I need to know what
else it needs to check.
Taral
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automate
"nonblocking"?]
> Reads in effect all the time on one thread while I'm writing on another. I
> can't very well single-thread the reads and writes.
Open mouth, insert foot. Ignore my previous repl
is
> real.
Well, if BIO is thread-safe, then you can just have two locks, an
inbound lock and an outbound lock.
SSL_read:
lock inbound lock
...
(in some BIO thing)
unlock inbound lock
recv()/read()
lock inbound lock
...
(back in SSL_read)
unlock inbound lock
return
SSL_write is similar, but
ably get around his problem
the same way it's done in licq - do a select() on the descriptor itself
before doing an SSL_read.
By the way, what's all the code in crypto/threads for?
Taral
__
OpenSSL Project
SSL_write wrappers that
claim/release that lock with each call. That way only concurrent
accesses to the _same_ SSL structure will be serialized.
Taral
__
OpenSSL Project http://www
On 27 Jun, Tewari, Vijay wrote:
> Hi,
> How would I support 40 bit encryption in
> an SSL application built using OpenSSL.
It's already supported by default.
Taral
__
OpenSSL Project
he fact that the whole thing isn't tested much on
machines without good randomness sources in general.
--
Taral <[EMAIL PROTECTED]>
__
OpenSSL Project http://www.openssl.org
Us
On 21 Jun, Ulf Möller wrote:
> On Wed, Jun 21, 2000 at 03:41:58PM -0500, Taral wrote:
>
>> I have a /dev/urandom, and openssl reads 16 bytes from it. However the
>> PRNG still reports insufficient entropy. Anyone have any idea why, and
>> how I can fix it? (beside
I have a /dev/urandom, and openssl reads 16 bytes from it. However the
PRNG still reports insufficient entropy. Anyone have any idea why, and
how I can fix it? (besides using the -rand option)
Taral
__
OpenSSL Project
11 matches
Mail list logo