When a user requests SSL protocol debug logging from Postfix, we use
essentially boilerplate code from SSL_CTX_set_info_callback(3):
... initialiation ...
if (where & SSL_CB_LOOP)
{
BIO_printf(bio_err,"%s:%s\n",str,SSL_state_string_long(s)
);
Due to a vulnerability discovered in the OpenSSL FIPS Object Module
v1.1.1 (see http://www.openssl.org/news/secadv_20071129.txt) a patched
version has been submitted for FIPS 140-2 validation approval. We
anticipate at least another week before completion of that "fast track"
approval process.
We
> Indeed, the problem was with my application.
> I was just using ::select() to see if there was data waiting for me
> to SSL_read off the socket, which I cover to discover is not reliable.
How did you know whether to 'select' for reading or for writing?!
It's always possible that SSL can't read
Since I never got any replies to this, I figured it might be useful to
update the group with the solution...
Indeed, the problem was with my application.
I was just using ::select() to see if there was data waiting for me to
SSL_read off the socket, which I cover to discover is not reliable.
Suchindra Chandrahas wrote:
> Hi Jimmy,
> RFC-2246 is for TLS v1. However, i am going for SSL
> v3. I don't know whether there is any function for the same. I went
> through ssl3_enc.c in openssl code:
>
ssl3_generate_master_secret() is the equivalent one for ssl3. Although
i
Hi Helios,
This is probably a linker issue
Thanks and Regards,
Suchindra Chandrahas
Helios Nguyen <[EMAIL PROTECTED]> wrote: hello everybody,
I want to use function of sha library, in my program i haved put this
line #include but i got this error:
: undefined reference
Hi Jimmy,
RFC-2246 is for TLS v1. However, i am going for SSL v3. I
don't know whether there is any function for the same. I went through
ssl3_enc.c in openssl code:
int ssl3_generate_master_secret(SSL *s, unsigned char *out, unsigned char *p,
int len)
{
David,
Thank you. Below is my test program. Could you tell me where is wrong?
(openssl-0.9.8g, under WidowsXP, VC6++)
void select_random_key(unsigned char *key, int b)
{
int i;
RAND_bytes(key, b);
for (i = 0; i < b - 1; i++)
printf("%02X:", key[i]);
printf("%02X\n", key[b
Suchindra Chandrahas wrote:
> Hi Jimmy,
> Yes i changed the no. of bytes to 32 (both client
> and server random). Also, is it ok to use openssl tls1_prf for ssl v3
> handshake?
>
if you only want to do the prf calculation tls1_PRF() does just that for
you. It does the PRF as s
Hi Jimmy,
Yes i changed the no. of bytes to 32 (both client and
server random). Also, is it ok to use openssl tls1_prf for ssl v3 handshake?
Thanks and Regards,
Suchindra Chandrahas
jimmy bahuleyan <[EMAIL PROTECTED]> wrote: Suchindra Chandrahas wrote:
> Hi All,
>
Suchindra Chandrahas wrote:
> Hi All,
> I am trying to write an SSL v3 handshake without using
> openssl libraries. I have some problem with creation of MasterSecret in
> SSL v3. Here is the code snippet of hardcoded client that i am
> experimenting with:
>
> client_random is 28 byte
11 matches
Mail list logo