; Matt
>
>
> On 21/11/17 08:53, mahesh gs wrote:
> > Hi,
> >
> > We were able to further localize this problem and found the problem is
> > with the function "BIO_dgram_sctp_wait_for_dry". In this function after
> > enabling the "sctp_sender_dry_e
Current version of openssl we are using is 01.01.00g.
We have tested and able to reproduce this issue with the OPENSSL 01.00.02k
version that is packaged with RHEL 7.4 as well.
Thanks,
Mahesh G S
On Mon, Nov 20, 2017 at 4:42 PM, mahesh gs wrote:
> Hi Matt,
>
> Thanks for the response.
rs "read_state_machine" where alert is to be red.This causes
SSL_Connect to be in infinite loop.
Thanks,
Mahesh G S
On Fri, Nov 17, 2017 at 3:36 PM, Matt Caswell wrote:
>
>
> On 17/11/17 06:42, mahesh gs wrote:
> > Why
> > does client respond with "Client key exc
the the handshake failure alert
is sent from server?
Openssl version used is 01.01.00g. I am also attaching the latest pcap file
for your reference.
On Tue, Nov 14, 2017 at 4:35 PM, Matt Caswell wrote:
>
>
> On 14/11/17 10:44, mahesh gs wrote:
>
> > case SSL_ERROR_SYSCALL:
> >
elect(nfds + 1, NULL, &writeFds, NULL, &timeout);
if (retValue <= 0)
{
// Timeout or error just return failure
return false;
}
}
return true;
}
Thanks,
Mahesh G S
On Tue, Nov 14, 2017 at 4:01 PM, Graham Leggett wrote:
> On 14 Nov 2017, at 12:00 PM, mahesh gs wrote:
>
>
Hi All,
We have application that provide DTLS security for SCTP connections. During
our testing we found that API "*SSL_connect* " fail and always returns
SSL_ERROR_WANT_READ which causes infinite loop in the application.
Scenario:
1) On Server side "Client Certificate Request" is enabled by set
Hi All,
I have query regarding the SSL_read on blocking socket. How to come out of
blocking SSL_read when we have to close the connection ?
As per the documentation SSL_read will only return if there is any data or
an error occurred.
"If the underlying BIO is *blocking*, SSL_read() will only re
Hi,
We have an application which has SCTP connections we have secured the SCTP
connections using the openssl DTLS. DTLS is working as expected other than
the SCTP events.
We use the API "BIO_new_dgram_sctp" to create a BIO objects and we register
a callback function to openssl using API "BIO_dgra
Hi All,
I am using openssl version 01.01.00f for providing TLS and DTLS security
for TCP and SCTP connection for our application. I have query regarding the
"Ciphers" that are accepted by the SSL_CTX_set_cpiher_list API. The list of
ciphers that are supported by openssl version 01.01.00f that is o
Hello All,
We are using openssl for providing the secured communication for our
application. I have some basic queries about the openssl behaviour.
1) What happens to the existing SSL connections on certification expiry?
Does the openssl disconnects the existing connection?
2) How can i get the
On Tue, May 2, 2017 at 2:36 PM, Matt Caswell wrote:
>
>
> On 02/05/17 06:59, mahesh gs wrote:
> > Hi Matt,
> >
> > Sorry for delayed response. I was on leave.
> >
> > Yes, ours is a library and we do not wish to ignore the signal process
> > wide bec
On Sun, Apr 30, 2017 at 11:11 PM, Michael Tuexen <
michael.tue...@lurchi.franken.de> wrote:
> > On 20. Apr 2017, at 20:01, mahesh gs wrote:
> >
> > Hi,
> >
> > This issue occur purely based on the time (sequence of events) at which
> SSL read_sta
, Matt Caswell wrote:
>
>
> On 27/04/17 11:56, mahesh gs wrote:
> > Hi,
> >
> > We are using Openssl for establish a secure communications for both
> > TCP/SCTP connections.
> >
> > In our application it is possible that remote end forceful
Hi,
We are using Openssl for establish a secure communications for both
TCP/SCTP connections.
In our application it is possible that remote end forcefully disconnect the
connection due to which
SSL_Write raises a SIGPIPE which we want to suppress. Does openssl
provide any way to set MSG_NOSIGNA
(at least I am assuming this is the same issue):
>
> https://github.com/openssl/openssl/issues/3251
>
> Matt
>
>
> On 18/04/17 21:17, Michael Tuexen wrote:
> >> On 13. Apr 2017, at 11:11, mahesh gs wrote:
> >>
> >> Hi,
> >>
> >> We are
Hi,
We are running SCTP connections with DTLS enabled in our application. We
have adapted openssl version (openssl-1.1.0e) to achieve the same.
We have generated the self signed root and node certificates for testing.
We have a strange problem with the incomplete DTLS handshake if we run the
DTLS
support.
On Thu, Feb 23, 2017 at 10:43 AM, mahesh gs wrote:
> Hi Michael,
>
> I am using "Red Hat Enterprise Linux Server release 6.4 (Santiago)" and
> openssl version is 1.1.0.
>
> SCTP version :
>
> [root@localhost DIAMETER]# rpm -qa | grep -i "sc
Thanks,
Mahesh G S
On Wed, Feb 22, 2017 at 8:33 PM, Michael Tuexen <
michael.tue...@lurchi.franken.de> wrote:
> > On 22 Feb 2017, at 07:47, mahesh gs wrote:
> >
> > Hi,
> >
> > Thank you for sharing the sample code.
> >
> > I tried running SCTP DTLS
echo -L 16.181.38.161 -p 4443 -l
50 -n 5 16.181.38.161
Thanks in advance for your valuable input
Regards,
Mahesh G S
On Tue, Feb 21, 2017 at 2:28 PM, Michael Tuexen <
michael.tue...@lurchi.franken.de> wrote:
> > On 21 Feb 2017, at 09:53, mahesh gs wrote:
> >
> > Hi,
> >
>
Hi,
We have a client, server applications that is using SCTP as a transport
protocol. We have to secure the connections using DTLS. I am using openssl
version 1.0.2 which supports DTLS. But the problem i am facing is usage of
DTLS SCTP related API's. Openssl documentation does not clearly explain
20 matches
Mail list logo