[openssl.org #2418] BUG: 0.9.8m Can\'t decrypt a PKCS7 using ECB Cipher generated from 0.9.7g.

2011-01-05 Thread Randall Geyer via RT
More details on how the 'quirk' came into being.   We have provided our end users the ability to pass into PKCS7 Encryption any cipher that was allowed. We do not recommend or dissuade them from using any cipher that is available. While it may not be a good idea, our end users (large numbers)

sample client-server code with ssl

2011-01-05 Thread Bhola Ray
Hello, Can anyone provide me with a working client-server code with SSL. If there is a pointer to a site from which I can download that's fine also. Any input would be greatly appreciated. Thanks in advance, Warm regards, bhola

Re: Non empty error stack failing non-blocking SSL IO

2011-01-05 Thread David Schwartz
On 1/3/2011 4:22 AM, Uri Simchoni wrote: I’m using OpenSSL 0.9.8i, and have noticed the following scenario: -Some OpenSSL crypto function returns with an error, leaving a description of the error on the error queue -The application neglects to call ERR_clear_error() -SSL_read() is then

secure inline re-negotiation questions

2011-01-05 Thread kunal patel
Hi, I am using openssl 0.9.8q and I am seeing following behavior: client sends SSL3_CK_SCSV for indicating the support of secure renegotiation server on receiving this cipher sets send_connection_binding to true server in response sends empty renegotiation extension client parses the extension

Re: secure inline re-negotiation questions

2011-01-05 Thread kunal patel
Hi, I just came across openssl documentation around the scenario I am testing (patched client and upatched server). My confusion is clear... So only question I have is: How to force the client to send empty RI extension instead of the cipher in first client hello.. Thanks, Kunal On Wed, Jan