Re: Urgent Help required how to decrypt TLS Client key exchange 130 bytes

2009-06-10 Thread Harsha gowda
Thanks a lot Your reply was much more usefull On Tue, Jun 9, 2009 at 7:01 AM, Dave Thompson dave.thomp...@princetonpayments.com wrote: From: owner-openssl-...@openssl.org On Behalf Of Harsha gowda Sent: Sunday, 07 June, 2009 07:54 Can any one tell me why 130 bytes

Query on OCSP

2009-06-10 Thread Ashish Agrawal
Hi, I ve a query on the OCSP request command: openssl ocsp -issuer issuer.pem -cert c1.pem -url http://ocsp.myhost.com/ -cafile ca.pem -resp_text -respout resp.der I have a scenario where i have a three certificate chain. Root Cert - Intermediate Cert -- End Cert so here i am

[openssl.org #1952] [PATCH] ECDH renegotiaton bug

2009-06-10 Thread Robin Seggelmann via RT
The variable s-s3-tmp.ecdh is set in ssl3_send_server_key_exchange() or dtls1_send_server_key_exchange(), after it is checked if it points to NULL. Later it is read only once in ssl3_get_client_key_exchange(), but then not freed and set to NULL again. When a renegotiation with a full

Adding CTR mode support for AES in OpenSSL

2009-06-10 Thread rakesh aggarwal
Hi,       I am trying to add CTR mode support for AES in OpenSSL.     The function provided for CTR mode encryption/decryption for AES in OpenSSL has following signature:   void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out,  const unsigned long length, const AES_KEY *key,  

Re: [PATCH] openssl 0.9.8k qnx diffs

2009-06-10 Thread Ger Hobbelt
Looks fine to me. Tip: to give this a chance of NOT disappearing into the background noise of the mailing lists, you might want to send this patch (as attachment, like you originally did on this ML) to the ticket tracker so this pops up on the screens of the core devs for sure. mailing address: