I am trying to wrap my head around the keying material I can access
within my TLS client application using OpenSSL 3.0.3
I have `SSL_CTX_set_keylog_callback` set to just printf() the lines.
I also have the following code to extract the client random:
unsigned char * keymat = malloc(48);
const c
Sorry, I shouldn't have phrased that inartfully.
There is no EVP_CIPHER_CTX_get_padding(), so how does one achieve something
analogous?
> On May 16, 2022, at 1:00 PM, Philip Prindeville
> wrote:
>
> Thanks. That fixed the return value of EVP_CipherFinal().
>
> Is there a reciprocal EVP_CIP
Thanks. That fixed the return value of EVP_CipherFinal().
Is there a reciprocal EVP_CIPHER_CTX_get_padding() method to find out what the
default padding method is for ECB?
> On May 16, 2022, at 12:41 AM, Tomas Mraz wrote:
>
> The EVP_CIPHER_CTX_set_padding(ctx, 0) must be called after the
>
Hi Kevin,
The patch in s_socket.c is likely to be acceptable. It looks reasonable
to me, it may well be useful on other systems and can probably be
described as a bug fix.
The other changes require the new OPENSSL_SYS_SCO5 define and are
essentially adding support for a new platform into the