On Mon, 10 Dec 2007, Marek Marcola wrote:
Hello,
Your description seems like on Certificate Verify message?
I was talking about Finished message.
Finished message is build with two hashes:
dgst1=md1(hs_msgs+label+master_secret+48*0x36)
dgst1=md1(master_secret+48*0x5c+dgst1)
Yes, if the negotiated algorithm is RSA, then the hash is a combinatin of
MD5 and SHA-1 (16+20 = 36) which is further encrypted using the public key
of the server/client depending on who is sending the finished message,
using the RSA algorithm, and the padding ensures that the message is an
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote:
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an
The stack trace showing a null sha1 transform kindof caught my attention
here, I wouldnt go by the the GDB call trace coz its obviously a memory
leak and the gdb stack could have been corrupted, many a times I see 0x0
in the frames but when you actually try to print the ctx address it would
be
Hi Prabhu,
Can you check the sha1 usage count in the lsmod?
I am thinking you have not freed the sha tfm and eventually run out of it.
I hit a similar issue when making use of linux sha1.
Thanks
--Gayathri
On Mon, 15 Oct 2007, Prabhu S wrote:
Hi,
The SSL enabled client application seg