I'm trying to merge the work from Martin Witzel (openssl-e dated from Nov.
2003) to reduce the OpensSSL footprint (for 386'er x86). With OpenSSL 0.9.7
is was able to reduce the library size down to
1070834 bytes libcrypto.a
159774 bytes libssl.a
if only DES, MD5, RSA and SHA are used. Now
Bodo Moeller wrote:
On Fri, Oct 07, 2005 at 11:17:47AM +0200, Peter Sylvester wrote:
In s23_srvr.c there is a length test
if ((csl+sil+cl+11) != s-packet_length)
{
SSLerr(SSL_F_GET_CLIENT_HELLO,SSL_R_RECORD_LENGTH_MISMATCH)
in case that the record contains a SSLV3 or
Hi all,
I have developed an OpenSSL Engine for our hw crypto accelerator.
I have no problems in using it as a dynamic engine with OpenSSL 0.9.8,
neither I have problems in loading it with OpenSSL 0.9.7d.
But I get problems with 0.9.7g/i (so, I guess 'h' too) versions.
Here I report the
On Mon, Oct 24, 2005 at 04:08:19PM +0200, Peter Sylvester wrote:
[...] I.e., a client that connects to a
server can *either* support SSL 2.0 servers *or* use TLS extensions,
but not both.
The SSL 3.0 and TLS 1.0 specifications have the forward compatibility
Bodo Moeller wrote:
On Mon, Oct 24, 2005 at 04:08:19PM +0200, Peter Sylvester wrote:
[...] I.e., a client that connects to a
server can *either* support SSL 2.0 servers *or* use TLS extensions,
but not both.
The SSL 3.0 and TLS 1.0 specifications have the
Dear Developers,
I am interested in plugging in my own implementations of the crypto algorithm AES(rijndael) into the open ssl source code.Later on I would also like to do the same for the RSA algo and the symmetric key generator(AES based PRBG as per FIPS stds).
Please guide me how to go about