There's bug in the latest CVS version of openssl s_server:
# openssl s_server -dtls1 -cipher PSK-RC4-SHA -psk abcd -accept 4443
Using default temp DH parameters
Using default temp ECDH parameters
ACCEPT
ERROR
17405:error:140B6044:SSL routines:SSL_GET_SERVER_SEND_CERT:internal
Hello,
I did not see this patch was added to snapshot...
Is there anything more I can do? Is something missing?
Is something wrong? I will be glad to know about that.
Best Regards,
Alon Bar-Lev.
__
OpenSSL Project
While using openssl 0.9.8c I get:
$ openssl ciphers EXPORT56
Error in cipher list
19034:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher
match:ssl_lib.c:1176:
and with 0.9.8d:
$ openssl ciphers EXPORT56
Error in cipher list
10434:error:1410D0B9:SSL
I have just published a pre-alfa of a patch that has the goal to make
OpenSSH aware with PMI.
Reference site : http://nutmay.sourceforge.net
--
Vincenzo Sciarra
Hi Richard,
$ openssl ciphers EXPORT56
Error in cipher list
10434:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher
match:ssl_lib.c:1176:
This is because of the recently disabled 56 bit (named *Rogue
Ciphersuites*) from OpenSSL 0.9.8c. This is been well documented in
CHANGES.log