yone share me sample SSL based client server
programme which I could use to measure performance.
Regards,
Alok
On Tue, Sep 9, 2014 at 3:54 AM, Iñaki Baz Castillo wrote:
>
> 2014-09-08 19:46 GMT+02:00 Alok Sharma :
> > One thing I observerd by looking into scp
> > code that it doe
;
int client = accept(server, (struct sockaddr*)&addr, &len); /*
accept connection as usual */
printf("Connection: %s:%d\n",inet_ntoa(addr.sin_addr),
ntohs(addr.sin_port));
ssl = SSL_new(ctx); /* get new SSL state with context
*/
SSL_set
Hi,
I am writing one sample ssl based client server model which uses
SSL_Read & SSL_Write API provided by openssl. But I found that my
application is very slow it takes around 40 mins to copy 700MB file. While
same file using scp finishes in 10 mins.
So my query is that is there an alternati
:23 PM, Dr. Stephen Henson wrote:
> On Tue, Nov 12, 2013, Alok Sharma wrote:
>
> > One of the openSSL vulnerabilities is:
> >
> > CVE-2013-0169:
> >
> > The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used
> > in OpenSSL, , do not pro
Hi,
I am using 0.9.8.s openssl and due to some limitation I cann't upgrade to
latest versions to tackle CVE-201300169. So is there any easy process to
disable CBC based ciphers.
Also is there a way to know which ciphers client and servers are using?
Regards,
Alok
Hi Steve,
Thanks for reply. Do you have idea how CBC ciphers can be disabled?
Regards,
Alok
On Tue, Nov 12, 2013 at 8:23 PM, Dr. Stephen Henson wrote:
> On Tue, Nov 12, 2013, Alok Sharma wrote:
>
> > One of the openSSL vulnerabilities is:
> >
> > CVE-2013-0169:
&g
One of the openSSL vulnerabilities is:
CVE-2013-0169:
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used
in OpenSSL, , do not properly consider timing side-channel attacks on a MAC
check requirement during the processing of malformed CBC padding, which
allows remote attack
Hi,
Thanks for the help, it resolved my problem.
Regards,
Alok
On Fri, Sep 23, 2011 at 5:59 PM, Dr. Stephen Henson wrote:
> On Fri, Sep 23, 2011, alok sharma wrote:
>
> > Hi,
> > Ok I got your point. I think it will be helpful.Do you have any link
> or
> > pr
Fri, Sep 23, 2011, alok sharma wrote:
>
> > Hi,
> > The error message comes when we invoke SSL_accept() API. But taking
> > lock on it will affect performance as it performs network operation
> inside
> > this API (like client hello message and other). So if network is
case
it holds lock for around 5-6 mins.
Regards,
Alok
On Fri, Sep 23, 2011 at 5:04 PM, Dr. Stephen Henson wrote:
> On Fri, Sep 23, 2011, alok sharma wrote:
>
> > I am using the openssl fips version for my application.So, I have not
> made
> > any change in openssl or Fips cod
1 at 4:46 PM, Dr. Stephen Henson wrote:
> On Fri, Sep 23, 2011, alok sharma wrote:
>
> > Hi,
> > So is there any method on Windows to generate non-predictable
> > randomnumbers. I think mostly FileSytem time is used to seed randomness
> > which is failing
Hi,
So is there any method on Windows to generate non-predictable
randomnumbers. I think mostly FileSytem time is used to seed randomness
which is failing in my case.
Regards,
Alok
On Mon, Sep 19, 2011 at 4:52 PM, Dr. Stephen Henson wrote:
> On Mon, Sep 19, 2011, alok sharma wrote:
>
011 6:33 PM, alok sharma wrote:
>
>> Hi,
>> I am having my client server on Windows. The server is concurrent
>> and
>> having each thread for each connection. When the number of connection
>> increases to 400-500 i.e having high thread load, my server crashe
Hi,
I am having my client server on Windows. The server is concurrent and
having each thread for each connection. When the number of connection
increases to 400-500 i.e having high thread load, my server crashes. I
debuged it and found that it gives error (“random number
generator:FIPS_RAND:p
Hi,
I am using openssl to one of my application. The application has
support of multithreading and runs on Windows platform. This application
uses openssl 0.9.8.0 version and has support of fips. The application
listens on a particular port and for each new connection it creates a
separate t
15 matches
Mail list logo