errors in DTLS implementation in openssl0.9.8a

2005-12-10 Thread robert dugal
Openssl 0.9.8a is incorrectly encoding the DTLS version as 0x01,0x00 instead of 0xfe,0xff $ ./openssl s_client -dtls1 -debug CONNECTED(0003) write to 0x5d3640 [0x5dd3f8] (119 bytes => 119 (0x77)) - 16 01 00 00 00 00 00 00-00 00 00 00 6a 01 00 00 j... Openssl 0.9.8a is in

Thread safety

2005-12-10 Thread Alain Damiral
Hello, I'm trying to write an interface to OpenSSL using BIO pairs. For testing purposes, I'm doing communication locally in two seperate threads (one accessing a server context, the other a client context) so I figured I should worry about thread safety. I read in the OpenSSL documentation t

Re: Decryption and encryption of packet using openssl command line

2005-12-10 Thread Riaz Farnaz
hmmmtough to imagine but no body seems to know it or it might be to simple.On 12/9/05, Riaz Farnaz <[EMAIL PROTECTED] > wrote:Hi, I have a query about how to use the openssl command line to decrypt and encrypt my packet. Below is an ipsec encrypted packet which i decrypt and print on the consol

Re: Doubt regarding x509_verify_cert

2005-12-10 Thread Kiyoshi Watanabe
The Bridge CA is a CA(hub) to bridge the two different CAs, so no need to have a Self-signed certificate for BridgeCA. If you are relying party in Root CA1 domain and if you want to create a certificate path, you will probably have: SelfCert1byRootCA1, CrossCertFromRootCA1toBridgeCA, CrossCert