Hi,
I would like to hear somebody's opinion about the
issue below (couldn't figure it out from code)
The question is related to the fourth parameter of
X509_STORE_CTX_init function (I've implemented an SSL
client):
int X509_STORE_CTX_init(X509_STORE_CTX *ctx,
X509_STORE *store,
X509 *x509,
ST
Hi Avinash,
Sorry for late reply, but I didn't follow the emails
on weekend.
You sent:
.
Key for HMAC_MD5 = server_auth_key
Input msg to MAC algorithm
{
seq no = 0x00 (8bytes)
Type = 0x23 (application data)
version = 0x0301
Length = 0x05
Data = 0x01 0x07 0x00 0x05 0x01
}
..
Hi Avinash,
The paragraph you mentioned is little bit vague,
better look at 6.2.3.1 from the same RFC; below is a
fragment from 6.2.3.1 paragraph:
..
The MAC is generated as:
HMAC_hash(MAC_write_secret, seq_num +
TLSCompressed.type +
TLSCompressed.version +
T
Hi,
I've created a TLS client and currently I'm testing it
with openssl TLS server (s_server option)
When client send its KEY EXCHANGE message, the
server reports the error below:
SSL3_get_client_key_exchange"tls rsa encrypted value
length is wrong"
I've double-checked the size of the premast