SSL Handshake difference between 0.9.8g v/s 1.0.0e

2014-01-16 Thread Rohit Bansal
lert 7 13 0.0070 (0.) S>CV3.1(24) Alert 70.0071 (0.) C>S TCP RST I am wondering why ssldump is printing an extra handshake message with the cipher which i have not enabled in my code. Any pointers on what could be going on here? -- Rohit Bansal

Re: AES-256 using CTR mode.

2013-01-15 Thread Rohit Bansal
Thanks Matt. On that note, do we have support for OCB mode in openssl. Where can i find the documentation for all the modes supported by openssl?? Regards, Rohit Bansal On Mon, Jan 14, 2013 at 1:16 PM, Matt Caswell wrote: > The EVP API is documented here: > https://www.openssl.or

Re: AES-256 using CTR mode.

2013-01-14 Thread Rohit Bansal
Thanks Matt. Is there a sample code i can look into? In my case the key is unique across different messages, so having same IV across messages should not lead me into problem Thanks, Rohit Bansal On Mon, Jan 14, 2013 at 12:22 PM, Matt Caswell wrote: > Yes, you can use CTR mode for AES-

Re: renegotiation during a handshake failure

2011-12-02 Thread Rohit Bansal
hly appreciated. Thanks, handshak3 On Fri, Dec 2, 2011 at 3:42 AM, Jakob Bohm wrote: > On 12/1/2011 6:33 PM, Rohit Bansal wrote: > >> Hi, >> >> Let me start with a disclaimer that i am not very experienced with >> openssl. >> >> I have a requirement. In a

renegotiation during a handshake failure

2011-12-01 Thread Rohit Bansal
Hi, Let me start with a disclaimer that i am not very experienced with openssl. I have a requirement. In an enterprise all clients and servers communicate over ssl. the certs in client and server are self signed. There is one client application which talks to 100+ different services. Currently t