[openssl-dev] Storing session in file and reusing at client side

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks Viktor.

>
> Client-side sessions can be serialized via i2d_SSL_SESSION and the
> resulting binary data can be stored in a file for reuse by a client
> via d2i_SSL_SESSION() followed by SSL_set_session() (which copies
> the session, so you can free the session obtained via d2i at that
> point).
>
> I did this thing using PEM_write_SSL_SESSION and PEM_write_SSL_SESSION
respectively, which seemed to work for the server side session handling.
But when I use the above mentioned methods, it gives me that illegal
parameter (47) error.
As a matter of fact, I was able to load the session_id into the Client
hello message, and even the server method responded with the same
session_id. But the next message was the fatal error which terminated the
handshake.



> Of course the client needs to want to reconnect to the same SSL
> peer with the same security policy, otherwise session reuse is
> unwise.
>
> I ensured I am using the same client_method (security policy), but still
can't figure out why the error comes up.


> --
>         Viktor.
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>



-- 
Regards
Shubham Chauhan
2013099
B.Tech CSE
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20160502/cefc2b6a/attachment.html>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux