Hi Lutz,
I am using the following handshake for communication in ssl
v2:
<snip>
CLIENT
SERVER
------
------
client hello = {session id + challenge } sent -------------------------->
<--------------------------
server hello = { conn_id + certificate } sent
process server hello and identify conn_id
generate master key
generate key material
generate session keys using key material
{master key}pks sent --------------------------->
(master key encrypted by public key of server)
client finished = { conn_id } sent --------------------------->
<---------------------------
server finished received
data transfer
</snip>
However, i guess ssl3 handshake handler at server expects changecipherspec from
client side
Please let me know if i am wrong!
Thanks and Regards,
Suchindra Chandrahas
Lutz Jaenicke <[EMAIL PROTECTED]> wrote: Suchindra Chandrahas wrote:
> Hi all,
> I am using the following client hello message format
> for an SSL V3 Server:
>
>
>
> unsigned char buf[BUFSIZE] =
> "\x01" /* client hello msg */
>
> "\x03\x00" /* client version */
> "\x00\x18" /* cipher specs length */
> "\x00\x00" /* session id length */
> "\x00\x10" /* challenge length */
>
> "\x07\x00\xc0\x05\x00\x80\x03\x00" /* cipher
> specs data */
> "\x80\x01\x00\x80\x08\x00\x80\x06"
> "\x00\x40\x04\x00\x80\x02\x00\x80"
>
>
> ""; /* session id
> data */
>
>
>
>
> The message i am getting at server end is:
>
>
>
> error:1408A0B6:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers passed
>
>
>
> Can you please tell me where the error is?
>
> I have sent ciphers actually
Have you tried ssldump? It should give you its interpretation of your
data.
Best regards,
Lutz
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [email protected]
Automated List Manager [EMAIL PROTECTED]
---------------------------------
Luggage? GPS? Comic books?
Check out fitting gifts for grads at Yahoo! Search.