This might be helpful:
http://comments.gmane.org/gmane.comp.encryption.openssl.devel/17743
On Mon, Oct 8, 2012 at 11:35 AM, Thirumal, Karthikeyan <
kthiru...@inautix.co.in> wrote:
> Team,
>
> We used "openssl-0.9.8a" version of openssl for the SSL communication, for
> our desktop based TCP a
Team,
We used "openssl-0.9.8a" version of openssl for the SSL communication, for our
desktop based TCP application.
When we enable it, looks like the memory growth was alarming around 30 times
than normal which is really huge.
Can someone throw lights on this version or any known memory leaks he
Hi!
Are there any plans to apply any changes to OpenSSL related to the
recent CRIME attack? Unlike other libraries (e.g. GnuTLS or NSS),
OpenSSL enables zlib by default. Is there a plan to change the default
in response to the published attack? I'm aware of the existing
SSL_OP_NO_COMPRESSION op