,
SSL_HandshakeCallback,
4) Finally call SSL_ResetHandshake with 2nd parameter as PR_FALSE
Umesh.
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:dev-tech-crypto-
> [EMAIL PROTECTED] On Behalf Of D3|\||\|!$
> Sent: Saturday, February 16, 2008 4:37 PM
> To: dev-tech-crypto@lists.mozill
Bruce:
You may want to look at Paros. Its an open source proxy where you can
see the HTTPS traffic in plain text.
Best Regards.
Umesh.
- Original Message -
From: "Bruce Keats" <[EMAIL PROTECTED]>
To:
Sent: Monday, December 10, 2007 9:28 PM
Subject: Re: Terminatin
http://www.mozilla.org/projects/security/pki/nss/ref/ssl/sslfnc.html
should help, I guess.
Umesh.
> Hi!!!
> I have been using the SSL client-server executables bundled with the
> binaries of NSS package to test SSL packet sending and recieving.
> However, these applications do not
help you with PSM.
Thanks Nelson. Looks like I'll have to post my queries in some other
newsgroup(s).
Umesh.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
like
ssl_SecureRecv().
Umesh.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
formation. Please suggest, if
possible, how I can arrive at a solution.
Thanks.
Best Regards,
Umesh.
> Umesh Bywar wrote:
>
>> I am having a problem in configuring a socket to do hand shake as
>> server. I
>> have a socket on which some communication has already taken
roblem in locking the reader?
Any idea how to tackle this? Strangely enough, this doesn't happen all the
time. Sometimes the SSL_ResetHandshake successfully upgrades the socket.
Please let me know if more infomation is required.
Thanks
Thanks Samrat. I was using Visual Studio .Net's debugger. But anyway I
could debug it even with that by building the code with debug flag on and
optimize flag off.
Best Regards.
Umesh.
- Original Message -
From: "samrat saha" <[EMAIL PROTECTED]>
To: "Umes
11 on SSL_ResetHandshake call, instead of
stepping through this function, the debugger points at the next statement in
the code (i.e. exactly what would happen on pressing F10). Do I need to build
mozilla with some special flags to be able to step through this code?
Best Regards.
> Unfortunately umesh didn't explain exactly which path was taken. And
> umesh didn't indicate if he used the NSS debug env vars to get extra
> logging. Nor did umesh indicate if he had tried using ssltap in
> conjunction with this, or using a mozilla as the client with it
&
gSecureServer(s2, cert, privKey, certKEA))
goto loser;
if (SECSuccess != SSL_ResetHandshake(s2, PR_TRUE))
goto loser;
return NS_OK;
loser:
return NS_ERROR_FAILURE;
}
--
Best Regards.
Umesh.
"Nelson Bolyard" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
&g
happen. Any ideas
what might be going wrong? Basically, when I call startSSLServer(), the
handshake should happen. But I guess, something is going wrong.
Best Regards.
Umesh.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
I could solve it. SSL_OptionSet(socket, SSL_ENABLE_SSL3, PR_TRUE) does
the trick.
Best Regards.
Umesh.
- Original Message -
From: "Umesh Bywar" <[EMAIL PROTECTED]>
To:
Cc:
Sent: Tuesday, April 03, 2007 6:41 PM
Subject: SSL Client
> Hi all:
>
>
anything
missing (especially regarding SSLv3) in the SSLsample that is available in
mozilla's code base? If so, what is it?
Thanks.
Best Regards.
Umesh.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/lis
goto finish;
finish:
if (srv != SECSuccess) {
handleError(PIP_PKCS12_NSS_ERROR);
} else if (NS_FAILED(rv)) {
handleError(PIP_PKCS12_RESTORE_FAILED);
}
if (slot)
PK11_FreeSlot(slot);
// finish the decoder
if (dcx)
SEC_PKCS12DecoderFinish(dcx);
return NS_OK;
}
--
Best Regards.
Umesh
Nelson:
Thanks for your detailed reply. It was, indeed a problem with memory
leaks.
Best Regards.
Umesh.
- Original Message -
From: "Nelson B" <[EMAIL PROTECTED]>
Newsgroups: mozilla.dev.tech.crypto
To:
Sent: Thursday, April 06, 2006 10:53 PM
Subject: Re: NSS_
if (!c)
{
currRemainingTime = 0;
}
else
{
CERT_GetCertTimes(c,¬beforeT,¬afterT);
PRTime currTime = PR_Now();
currRemainingTime = currTime - notafterT;
}
PR_Close(s);
if (NSS_Shutdown() != SECSuccess)
{
return 1;
}
if (!isSSLv2Gl)
{
if (currentCipher >= startSSLv2 || currentCipher <= endSSLv2)
{
isSSLv2Gl=1;
}
}
return ss_secretsize;
}
Best Regards.
Umesh.
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
17 matches
Mail list logo