Re: Session based keys

1999-10-29 Thread Sean Walker
> > > Perhaps you should ask for a better definition of "session based" first. > > > > > > > I believe that I would have to > > > > disable key caching on the server, correct? > > > > > > You have to disable *session* caching on the server. Thus for every new > > > connect a full SSL handshake is

RE: OpenSSL nasty shared library issue...

1999-10-29 Thread Geoff Thorpe
Hi, On Thu, 28 Oct 1999, Richard Levitte - VMS Whacker wrote: > SalzR> Absolutely. For my servers, I know better than openssl how to > SalzR> manage memory. For example, I want my memory pools per-thread > SalzR> so that I don't have to make "malloc" be a critical-region. > > Like you don't h

Re: Session based keys

1999-10-29 Thread Holger Reif
Ben Laurie schrieb: > > Holger Reif wrote: > > Sean Walker schrieb: > > > We are writing both client and server applications > > > and so have complete control over the design. What would be a good means > > > of generating a "session based" key? > > > > Perhaps you should ask for a better defini

Cert verification

1999-10-29 Thread Ray O'Hagan
Hi, would anyone know off-hand either of the following ? 1. On the client side, how do I verify the certificate a server would send down ? i.e. how do I store the public key on the client side and then verify the cert using that ? 2. For a commercial cert, on the server side is there any way of

Re: OpenSSL nasty shared library issue...

1999-10-29 Thread Ben Laurie
Richard Levitte - VMS Whacker wrote: > > From: [EMAIL PROTECTED] (Bodo Moeller) > > Bodo_Moeller> Proposal: Turn SOME_STRUCTURE_init into a macro that > Bodo_Moeller> calls SOME_STRUCTURE_init_internal with the same > Bodo_Moeller> arguments plus an additional one that contains the > Bodo_Moelle