-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Nelson,

On 05/04/2010 03:11 AM, Nelson B Bolyard wrote:
> On 2010-05-03 12:58 PST, Ramon de Carvalho Valle wrote:
>> I'm having problems with my PKCS #11 implementation and mod_nss. The
>> requests using SSLv3 protocol fails with bad_record_mac (20). I think
>> the problem is in client_key_exchange (16), and 
> 
> OK, that's a possibility, one of many.
> 
>> I would like to know if
>> both TLSv1 and SSLv3 protocols use the PKCS #1 Encryption-block
>> formatting according to RFC 2313:
>>
>> EB = 00 || BT || PS || 00 || D .
> 
> Yes, they both do, when the key exchange algorithm is RSA.

Yes, in this case, the key exchange algorithm is RSA.


> 
>> SSLTAP shows the ClientKeyExchange message length in client_key_exchange
>> (16) is 130 (0x82) for TLSv1 and 128 (0x80) for SSLv3.
> 
> Yes, that is a difference between the two protocol versions.
> 
> TLS encodes the encrypted pre-master secret with an additional explicit
> length.  SSL 3.0 does not.  That additional explicit length takes 2 bytes.
> 

Do you know if this additional explicit length should be handled by my
PKCS #11 implementation when SSLv3 protocol is used or if it is handled
by mod_nss/NSS library?


Best regards,

- -- 
Ramon de Carvalho Valle
Software Engineer
IBM Linux Technology Center
E-Mail: rcva...@linux.vnet.ibm.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkvgFgkACgkQGIS0iEuhp4NRdwCg0HySNBBJ01bgX6gI3cCBL3O7
vuoAn1yR5ZYpXcuq2Q/YkZ2KcLD+Zb7RiEYEARECAAYFAkvgFgkACgkQkcIYeh81
wLlRdwCfYop1FJYX+xHGHhjS/LktMUymZOkAn2yv3dk3OgMZdenV4kdGuFb8uKYt
=x8S1
-----END PGP SIGNATURE-----
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to