> A Wireshark trace reveals that the client shuts down the handshake
> connection with the reason ‘Unknown CA’.
> So if the client knows that the cert is self-signed as indicated by the debug
> logs, why would it issue the above reason for failure when it doesn’t need to
> know the CA?
You st
Thanks Matthew.
However the problem seems to be occurring before the processing of the return
codes you mentioned.
The problem occurs from a bad return value from:
if(SSL_connect(ssl) <= 0)
int_error("Error connecting SSL object");
A Wireshark trace reveals that the client shuts do
I had some further analysis.
I am looking for RSA-decryption with OAEP-padding and MGF1 and digest
SHA-256.
Is there a way to do it??
Thanks!
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Hello!
I try to do some XML-ENC with OpenSSL
(https://www.w3.org/TR/xmlenc-core1/#sec-RSA-OAEP, section 5.5.2) and I
have some problems with the padding.
Now I have some problems with decrypting a RSA-encoded string.
For identifier "rsa-oaep-mgf1p" I use RSA_PKCS1_OAEP_PADDING for padding
an