Hi,

I am implementing a HTTPS client software using SSLeay 0.8.1, which
"talks" to secure web servers.

Now I am trying to optimize the performance, and it looks like
generating of "handshake" for each time I access the same server
is an overhead, and there should be a way to reuse the crypto
information  between the requests, so that after the first time
only encryption and decryption of HTTP information will be performed.

So, I have a few questions:

* Is that possible at all with SSLeay?

* Is that true that the handshake and keys generation is done 
  upon the call to SSL_connect() ?

* How can I reuse the "active" handshake information?
  Where is it stored?

* Is there any way to know whether this information is still valid
  for the server (I guess the server's policy will be invalidation
  after some timeout...) ?

* Is Keep-Alive option in HTTP (reuse of the same socket for the
  connection) actually required to do the trick I want to, or is it
  possible to do that without Keep-Alive?


Thanks in advance,

Max.
Software Developer - Mercury Interactive Israel
[EMAIL PROTECTED] or [EMAIL PROTECTED]



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to