Re: [openssl-users] Any way to create a large encrypted finish message?

2014-12-11 Thread Vyas Pentakota
bytes. Same here,there would only be 12 bytes of padding as record is already 36 bytes, making it 64 bytes. Thanks, Thulasi. On 11 December 2014 at 04:15, Vyas Pentakota mailto:npent...@brocade.com>> wrote: Hi I am working on issue involving openssl TLS 1.2 finish message decryption. I w

[openssl-users] Any way to create a large encrypted finish message?

2014-12-10 Thread Vyas Pentakota
Hi I am working on issue involving openssl TLS 1.2 finish message decryption. I was wondering if anyone can tell me how I can generate "encrypted handshake message" (client finish message) record larger than 64 bytes only using RSA AES256-SHA/ AES128-SHA/DES-CBC3-SHA. Your suggestion is greatly

memory leak in OPENSSL_NO_SSL3 patch

2014-10-23 Thread Vyas Pentakota
I am not a 100% sure but I think s->s3 control structure is not being freed in case of app enabling OPENSSL_NO_SSL3 patch code. Ssl23_get_client_hello will return with s->method==NULL. SSL_free will skip over ssl3_free. 0.9.8zc might be leaking more than just s->s3. ( may be dgst msgs). Please c