> From: openssl-users [mailto:openssl-users-bounces@xxxxxxxxxxx] On Behalf Of Sai Teja Chowdary > Sent: Friday, December 29, 2017 21:44 > I am using OpenSSL client to create a custom TLS client which can send or manipulate the default TLS handshake > messages so that i can test for any bugs in our TLS server implementation. I spent about 4 months in reading OpenSSL > code and making changes and adding new arguments to modify the default client. So in that process i came across the > WPACKET API. For framing SSL records I had to use it. I can't help with your specific issue. I don't know the 1.1.x codebase (my teams are still using 1.0.2). But I'd suggest that perhaps OpenSSL is not the ideal starting point for this. When security researchers do this sort of thing - generate specific TLS messages to test a peer implementation - they often use a scripting language with suitable add-on modules, such as Python with the ssl, cryptography, and gmpy2 modules. While these scripts are often quick-and-dirty, they're probably easier to modify. So you might look at various open-source TLS test scripts, such as the one Hanno Böck wrote for ROBOT (see robotattack.org). There are also various open-source test frameworks for TLS, such as TLSPretense. I don't have any experience with them myself, but it's worth taking a look. -- Michael Wojcik Distinguished Engineer, Micro Focus -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users