RE: Generation of the Finished message

2007-12-09 Thread Gayathri S
On Mon, 10 Dec 2007, Marek Marcola wrote: Hello, Your description seems like on Certificate Verify message? I was talking about Finished message. Finished message is build with two hashes: dgst1=md1(hs_msgs+label+master_secret+48*0x36) dgst1=md1(master_secret+48*0x5c+dgst1)

Re: Generation of the Finished message

2007-12-06 Thread Gayathri S
Yes, if the negotiated algorithm is RSA, then the hash is a combinatin of MD5 and SHA-1 (16+20 = 36) which is further encrypted using the public key of the server/client depending on who is sending the finished message, using the RSA algorithm, and the padding ensures that the message is an

Re: cyphers and keys

2007-10-30 Thread Gayathri S
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote: Hi I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an

RE: Segmentation fault in application creating too many threads.

2007-10-17 Thread Gayathri S
The stack trace showing a null sha1 transform kindof caught my attention here, I wouldnt go by the the GDB call trace coz its obviously a memory leak and the gdb stack could have been corrupted, many a times I see 0x0 in the frames but when you actually try to print the ctx address it would be

Re: Segmentation fault in application creating too many threads.

2007-10-15 Thread Gayathri S
Hi Prabhu, Can you check the sha1 usage count in the lsmod? I am thinking you have not freed the sha tfm and eventually run out of it. I hit a similar issue when making use of linux sha1. Thanks --Gayathri On Mon, 15 Oct 2007, Prabhu S wrote: Hi, The SSL enabled client application seg