On Fri, Jul 14, 2006, Marek Marcola wrote:

> Hello,
> > > Well ... In that case,
> > > A] how is it that s_server and s_client can
> > > communicate
> > > 1) Using the same ssl library
> > > 2) Using the same certificates
> > > 3) Using the same cipher suits
> > 
> > You mean can't , don't u? That is bcoz SSL protocol
> > itself is different in the export case. As Steve
> > mentioned there is an additional key exchange stage,
> > kex in the case of export ciphers.
> > 
> > [Urjit]: Nops. I mean that they can! and thats why I am confused. Not just
> > that, but even my sample client can connect to the s_server with same
> > certificate and same cipher suite
> SSL protocol differs in server_key_exchange packet
> (with may be used not only for export restriction).
> This requires temporary RSA key in context.
> If you add to server initialization routine something like:
>       RSA *rsa;
>       rsa=RSA_generate_key(512,RSA_F4,NULL,NULL);
>       if (!SSL_CTX_set_tmp_rsa(SSL_context,rsa)){
>               ExitPostmaster(1);
>       }
>       RSA_free(rsa);
> your code will work.
> 

Which I might add s_server sets up automatically which explains why connecting
to s_server works...

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to