Hi Lutz, I am using the following handshake for communication in ssl v2:
<snip> CLIENT SERVER ------ ------ client hello = {session id + challenge } sent --------------------------> <-------------------------- server hello = { conn_id + certificate } sent process server hello and identify conn_id generate master key generate key material generate session keys using key material {master key}pks sent ---------------------------> (master key encrypted by public key of server) client finished = { conn_id } sent ---------------------------> <--------------------------- server finished received data transfer </snip> However, i guess ssl3 handshake handler at server expects changecipherspec from client side Please let me know if i am wrong! Thanks and Regards, Suchindra Chandrahas Lutz Jaenicke <[EMAIL PROTECTED]> wrote: Suchindra Chandrahas wrote: > Hi all, > I am using the following client hello message format > for an SSL V3 Server: > > > > unsigned char buf[BUFSIZE] = > "\x01" /* client hello msg */ > > "\x03\x00" /* client version */ > "\x00\x18" /* cipher specs length */ > "\x00\x00" /* session id length */ > "\x00\x10" /* challenge length */ > > "\x07\x00\xc0\x05\x00\x80\x03\x00" /* cipher > specs data */ > "\x80\x01\x00\x80\x08\x00\x80\x06" > "\x00\x40\x04\x00\x80\x02\x00\x80" > > > ""; /* session id > data */ > > > > > The message i am getting at server end is: > > > > error:1408A0B6:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers passed > > > > Can you please tell me where the error is? > > I have sent ciphers actually Have you tried ssldump? It should give you its interpretation of your data. Best regards, Lutz ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED] --------------------------------- Luggage? GPS? Comic books? Check out fitting gifts for grads at Yahoo! Search.