Hi Ivan,
the functionality similar to your request is contained in the Wireshark.
See http://wiki.wireshark.org/SSL
It can decrypt SSL/TLS conversation using server's private RSA key.
The code is not based on OpenSSL but on GnuTLS+libgcrypt.
Best regards,
Tomas
> -Original Message
> Is openssl using some kind of memory
> caching for its ssl handshake which is not getting released when the
> handshake is over?
Each established SSL/TLS connection allocates at least 58983 bytes.
All those 3 buffers (18437 B, 18698 B, 21848 B) are allocated when the
new connection is accepted w
> > is there any reasonable way how to copy certificate (and
> private key) from
> SSL_CTX to SSL object if
> > certificate in SSL_CTX is changed?
>
> Are you asking if you can change the key and certificate
> being used by a
> session that's already in progress?
My question is not "if" but "h
Hi,
is there any reasonable way how to copy certificate (and private key)
from SSL_CTX to SSL object if certificate in SSL_CTX is changed?
I would like to call something like:
SSL_use_certificate(ssl, SSL_get_certificate(ctx));
SSL_use_RSAPrivateKey(ssl, SSL_get_key(ctx));
but I can not find an