How to use the BIO_set_bind_mode() in OpenSSL ...

2013-02-26 Thread Saikat Das
Hi All, My OpenSSL code is like below: if ( !SSL_library_init()) { } SSL_load_error_strings(); BIO* conn = BIO_new_accept((char *)_port.data()); if ( BIO_do_accept( g_conn ) = 0 ) { } if ( BIO_do_accept( g_conn ) = 0 ) { } BIO* client = (BIO *)

read error: decryption failed or bad record mac

2013-02-26 Thread Imre Deak
Hi, I have Ubuntu-12.10/irssi 0.8.15/libssl 1.0.1c-3. After connecting successfully to an SSL IRC server and joining some channel on it, I get the error read error: decryption failed or bad record mac after which the connection terminates. I didn't have any problem with this before, the error

[openssl.org #2999] Incomplete fix to remove SSL3_RECORD-orig_len

2013-02-26 Thread geoff_l...@mcafee.com via RT
On 0.9.8 branch: ssl/t1_enc.c tls1_mac() approximately line 771: #ifdef OPENSSL_FIPS if (!send FIPS_mode()) tls_fips_digest_extra( ssl-enc_read_ctx, hash,

[openssl.org #3000] is openssl supports TLSv1.2 completely

2013-02-26 Thread Arashad Ahamad via RT
Hi , I have gone through the change log of openssl implementation and come to know that there is initial support for TLSv1.2 in the openssl library. Please let me know following are the only TLSv1.2 support in the openssl library. Can we say openssl supports TLSv1.2 completely

[openssl.org #3000] is openssl supports TLSv1.2 completely

2013-02-26 Thread Stephen Henson via RT
On Tue Feb 26 12:56:43 2013, araha...@in.ibm.com wrote: Hi , I have gone through the change log of openssl implementation and come to know that there is initial support for TLSv1.2 in the openssl library. Please let me know following are the only TLSv1.2 support in the openssl library. Can

What is the reason for error SSL negotiation failed: error:04075070:rsa routines:RSA_sign:digest too big for rsa key

2013-02-26 Thread Nayna Jain
Hi all, I have a server and client. Both server and client authenticate each other. And so client also sends the certificate. Here client certificate has RSA 512 bits and md5. Server certificates has RSA 1024 bits and md5. Both server and client are using the API SSLv23_server_method() and

[openssl.org #3001] [PATCH] Reduce unnecessary verifying iteration in rsa_test.c

2013-02-26 Thread Le Huang via RT
Hi there, In the file crypto/rsa/rsa_test.c, line 308~326, there is a check to ensure no corrupted data can be decrypted by the RSA implementation. However, in the loop, when it has already detected an error in current one, it will still continue the check in all left iterations, which is not

RE: [openssl.org #3001] [PATCH] Reduce unnecessary verifying iteration in rsa_test.c

2013-02-26 Thread Salz, Rich via RT
You might want to read about timing attacks. -- Principal Security Engineer Akamai Technology Cambridge, MA __ OpenSSL Project http://www.openssl.org Development Mailing List