In that case, I'm planning a client/server tool however I want all network
traffic to be encrypted. I'd also like to sign requests to the server
that a client may make so that I can trust that the message is
authentic.
Before plunging ahead and writing this, I thought it might be prudent to
enquire if anyone had used these tools to do something similar and have
some advice to impart.
cheers,
r.
- Re: ucspi w/ crypto. Russell Davies
- Re: ucspi w/ crypto. Chin Fang
- Re: ucspi w/ crypto. Russell Davies
- Re: ucspi w/ crypto. Jamie Heilman
- Re: ucspi w/ crypto. John van V.
