> On Nov 14, 2018, at 6:54 AM, Hemant Ranvir <hemantran...@gmail.com> wrote:
> 
> My main goal here is to use openssl for initial handshake sequence. Once the 
> connection is established between server and client, decrypt the incoming 
> message (this time not using the openssl api but rather by using the decrypt 
> AES function implemented earlier)

This makes no sense, because TLS does not just emit a simple CBC encrypted 
stream
after performing the handshake.  So you can't do that.  Use 
SSL_read()/SSL_write,
and let the library do the message decryption/encryption for you.  When done use
SSL_shutdown() to cleanly terminate the stream, and depending on the application
protocol, make wait for the peer's SSL_shutdown() in turn to avoid truncation
attacks where completion of the stream is not implied by the higher level 
protocol.

-- 
        Viktor.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to