Click here to Skip to main content
15,894,137 members
Please Sign up or sign in to vote.
0.00/5 (No votes)
See more:
I created socket program using OpenSSL.
And I do not want to support SSL renegotiation.
I watched through wireshark, but include "TLS_EMPTY_RENEGOTIATION_INFO_SCSV" in Client Hello Cipher Suites.

How to disable "TLS_EMPTY_RENEGOTIATION_INFO_SCSV" in C programing?

What I have tried:

I read this document RFC 5746 :
https://tools.ietf.org/html/rfc5746#page-4 

3.3.  Renegotiation Protection Request Signaling Cipher Suite Value
.
.
.
Note:  a minimal client that does not support renegotiation at all
can simply use the SCSV in all initial handshakes.  The rules in the
following sections will cause any compliant server to abort the
handshake when it sees an apparent attempt at renegotiation by such a
client.

I want to make minimal client. but I do not know how to implement it. T_T
Posted
Updated 1-Jul-18 19:58pm
v4

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900