This is a client hello message in the TLS protocol sent from the client. Full
spec is found on https://www.ietf.org/rfc/rfc5246.txt and
I suggest using Wireshark to analyze network traffic but basically your message
is described by
16 Content type (handshake)
03 01 TLS
gt;
> On 15/02/18 03:52, Curt Johansson wrote:
>> Hi Matt, thanks for your prompt answer. The testclient is using
>> openssl-1.0.2m and my previous assumption that the IV was derived
>> from the key_block as in TLS 1.0 was wrong. It seems that when
>> initialising the
t 0:26 , Matt Caswell <m...@openssl.org> wrote:
>
>
>
> On 13/02/18 22:02, Curt Johansson wrote:
>> Hi all,
>>
>> I'm developing support for TLS 1.1 and 1.2 in a radius-server that until now
>> only handles TLS 1.0. I'm testing with a testtool that t
so I hope someone with a working knowledge can enlighten me. I
might have
misunderstood the spec but in that case I would be grateful if someone could
clarify this specific part of it.
TIA
Curt Johansson
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listin