bytes.
Same here,there would only be 12 bytes of padding as record is already 36
bytes, making it 64 bytes.
Thanks,
Thulasi.
On 11 December 2014 at 04:15, Vyas Pentakota
mailto:npent...@brocade.com>> wrote:
Hi
I am working on issue involving openssl TLS 1.2 finish message decryption. I
w
Hi
I am working on issue involving openssl TLS 1.2 finish message decryption. I
was wondering if anyone can tell me how I can generate "encrypted handshake
message" (client finish message) record larger than 64 bytes only using RSA
AES256-SHA/ AES128-SHA/DES-CBC3-SHA.
Your suggestion is greatly
I am not a 100% sure but I think s->s3 control structure is not being freed in
case of app enabling OPENSSL_NO_SSL3 patch code. Ssl23_get_client_hello will
return with s->method==NULL. SSL_free will skip over ssl3_free. 0.9.8zc might
be leaking more than just s->s3. ( may be dgst msgs). Please c