This makes the errors slightly more enlightening...

diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c
index 41769fe..b2b8d31 100644
--- a/ssl/s3_clnt.c
+++ b/ssl/s3_clnt.c
@@ -2688,7 +2688,7 @@ int ssl3_send_client_verify(SSL *s)
                        }
                else
                        {
-                       ERR_clear_error();
+                       //ERR_clear_error();
                        }
 #ifndef OPENSSL_NO_RSA
                if (pkey->type == EVP_PKEY_RSA)

Now I get:
140606362789544:error:0608D096:digital envelope 
routines:EVP_PKEY_sign_init:operation not supported for this 
keytype:pmeth_fn.c:88:
140606362789544:error:06089093:digital envelope 
routines:EVP_PKEY_CTX_ctrl:command not supported:pmeth_lib.c:335:
140606362789544:error:1409441B:SSL routines:SSL3_READ_BYTES:tlsv1 alert decrypt 
error:s3_pkt.c:1212:SSL alert number 51
140606362789544:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake 
failure:s23_lib.c:184:

Reverting just that hunk of the 'offending' commit so that it's just
calling s->method->ssl3_enc->cert_verify_mac() unconditionally makes it
work again, even with 1.0.0.

In the TPM engine case, EVP_PKEY_CTX_new() is returning NULL because 
!pkey->ameth.

-- 
dwmw2


------------------------------------------------------------------------------
Download Intel® Parallel Studio Eval
Try the new software tools for yourself. Speed compiling, find bugs
proactively, and fine-tune applications for parallel performance.
See why Intel Parallel Studio got high marks during beta.
http://p.sf.net/sfu/intel-sw-dev
_______________________________________________
TrouSerS-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-tech

Reply via email to