Got a bit further
===
#!/bin/bash
rm -f /tmp/test.data* /tmp/sym.cer
cat > /tmp/test.data < /tmp/symINT.cer << EOF
# Signing cert public key
#Issuer: C=US, O=Symantec Corporation, OU=Symantec Trust Network,
CN=Symantec SHA256 TimeStamping CA
#Subject: C=US, O=Symantec Corporation,
> Is it the server sending the error?
No, it is the client sending the error.
> Is the server running OpenSSL?
Yes, I made the ssl_client and server (a simple chat functionality) scripts.
> Does it happen with the same client running the same software with the
> same IP address
> or does it
On Mon, May 02, 2016, Shubham Chauhan wrote:
> Hello,
>
> I wanted to store the freshly negotiated ssl/tls session in a file and
> reuse it (via SSL_set_session()), in the next handshake. I was not able to
> do that since the handshake got terminated giving a fatal error - illegal
> parameters
On Mon, May 02, 2016, Jakob Bohm wrote:
> While trying to convert some 3rd party code from direct calls
> to libcrypto functions to using the EVP API, I have run into
> a problem.
>
> I cannot find the EVP call to change the IV without changing
> (and reexpanding) the key.
>
Try calling the
While trying to convert some 3rd party code from direct calls
to libcrypto functions to using the EVP API, I have run into
a problem.
I cannot find the EVP call to change the IV without changing
(and reexpanding) the key.
If the code should stay in the old (non-EVP) API, I similarly
lack a way
Thanks Viktor.
>
> Client-side sessions can be serialized via i2d_SSL_SESSION and the
> resulting binary data can be stored in a file for reuse by a client
> via d2i_SSL_SESSION() followed by SSL_set_session() (which copies
> the session, so you can free the session obtained via d2i at that
>
On Mon, May 02, 2016 at 12:23:25PM +0530, Shubham Chauhan wrote:
> I wanted to store the freshly negotiated ssl/tls session in a file and
> reuse it (via SSL_set_session()), in the next handshake. I was not able to
> do that since the handshake got terminated giving a fatal error - illegal
>
Hi Rich,
On 27/04/16 18:45, Salz, Rich wrote:
If so, please let us know. Replies to me will be summarized for the
lists.
what exactly do you mean by 'TLS proxy certificates' ? if you mean
RFC3820 (5280) proxy certificates, then yes, we use them extensively
within grid computing.
Hello,
I wanted to store the freshly negotiated ssl/tls session in a file and
reuse it (via SSL_set_session()), in the next handshake. I was not able to
do that since the handshake got terminated giving a fatal error - illegal
parameters (47).
Although this works perfectly fine when I store the