> > > Perhaps you should ask for a better definition of "session based" first.
> > >
> > > > I believe that I would have to
> > > > disable key caching on the server, correct?
> > >
> > > You have to disable *session* caching on the server. Thus for every new
> > > connect a full SSL handshake is
Hi,
On Thu, 28 Oct 1999, Richard Levitte - VMS Whacker wrote:
> SalzR> Absolutely. For my servers, I know better than openssl how to
> SalzR> manage memory. For example, I want my memory pools per-thread
> SalzR> so that I don't have to make "malloc" be a critical-region.
>
> Like you don't h
Ben Laurie schrieb:
>
> Holger Reif wrote:
> > Sean Walker schrieb:
> > > We are writing both client and server applications
> > > and so have complete control over the design. What would be a good means
> > > of generating a "session based" key?
> >
> > Perhaps you should ask for a better defini
Hi, would anyone know off-hand either of the following ?
1. On the client side, how do I verify the certificate a server would
send down ?
i.e. how do I store the public key on the client side and then verify
the cert
using that ?
2. For a commercial cert, on the server side is there any way of
Richard Levitte - VMS Whacker wrote:
>
> From: [EMAIL PROTECTED] (Bodo Moeller)
>
> Bodo_Moeller> Proposal: Turn SOME_STRUCTURE_init into a macro that
> Bodo_Moeller> calls SOME_STRUCTURE_init_internal with the same
> Bodo_Moeller> arguments plus an additional one that contains the
> Bodo_Moelle