答复: How run the specific test case //答复: How to run a simple test case
Thanks for the information. NCONF_load will failed with “./test/ssl_test ./test-runs/test_ssl_new/17-renegotiate.cnf.default”. As strdup will failed in case of “${ENV::TEST_CERTS_DIR}/*” . Maybe the ENV should be setted before run the test case. Error information: # ERROR: (int) 'NCONF_load(conf, test_get_argument(0), NULL) > 0' failed @ test/ssl_test.c:550 # [0] compared to [0] # ERROR: @ test/ssl_test.c:553 发件人: Dr. Matthias St. Pierre [mailto:matthias.st.pie...@ncp-e.com] 发送时间: 2022年2月9日 23:31 收件人: Chenxinping ; openssl-users@openssl.org 主题: RE: How run the specific test case //答复: How to run a simple test case Ah ok, maybe I slightly misunderstood your question. From your transcript below I infer that the testsuite ran the perl script `generate_ssl_tests.pl`, which generated some test files an then ran the binary `ssl_test` as follows: ./test/ssl_test ./test-runs/test_ssl_new/17-renegotiate.cnf.default If the testfile `./test-runs/test_ssl_new/17-renegotiate.cnf.default` still exists, you should be able to debug the program in gdb with the aid of the `wrap.pl` helper script as follows: ./util/wrap.pl gdb –args ./test/ssl_test ./test-runs/test_ssl_new/17-renegotiate.cnf.default Hope that helps, Matthias [NCP engingeering GmbH] Dr. Matthias St. Pierre Tech Lead Cryptography matthias.st.pie...@ncp-e.com<mailto:matthias.st.pie...@ncp-e.com> Phone: +49 911 9968-0 www.ncp-e.com<http://www.ncp-e.com> Follow us on: Facebook<https://www.facebook.com/NCPengineering> | Twitter<https://twitter.com/NCP_engineering> | Xing<https://www.xing.com/companies/ncpengineeringgmbh> | YouTube<https://www.youtube.com/user/NCPengineeringGmbH> | LinkedIn<http://www.linkedin.com/company/ncp-engineering-inc.?trk=cws-cpw-coname-0-0> Headquarters Germany: NCP engineering GmbH • Dombuehler Str. 2 • 90449 • Nuremberg North American HQ: NCP engineering Inc. • 601 Cleveland Str., Suite 501-25 • Clearwater, FL 33755 Authorized representatives: Peter Soell, Patrick Oliver Graf, Beate Dietrich Registry Court: Lower District Court of Nuremberg Commercial register No.: HRB 7786 Nuremberg, VAT identification No.: DE 133557619 This e-mail message including any attachments is for the sole use of the intended recipient(s) and may contain privileged or confidential information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please immediately contact the sender by reply e-mail and delete the original message and destroy all copies thereof. From: Chenxinping mailto:kan.c...@huawei.com>> Sent: Wednesday, February 9, 2022 4:10 PM To: Dr. Matthias St. Pierre mailto:matthias.st.pie...@ncp-e.com>>; openssl-users@openssl.org<mailto:openssl-users@openssl.org> Subject: How run the specific test case //答复: How to run a simple test case Thanks for your information, simple test case means some specific test case. Some error reported from some specific test case in case of “make V=1 TESTS='test_ssl_new*' test”, the error information could not help to local the issue, So I need run and debug the specific test case. Error information: ../../util/wrap.pl /usr/bin/perl -I ../../util/perl ../../test/generate_ssl_tests.pl ../../test/ssl-tests/17-renegotiate.cnf.in none > 17-renegotiate.cnf.none => 0 ok 1 - Getting output from generate_ssl_tests.pl. ok 2 - Comparing generated 17-renegotiate.cnf.none with ../../test/ssl-tests/17-renegotiate.cnf. # Subtest: ../../test/ssl_test 1..1 # Subtest: test_handshake 1..17 ok 1 - iteration 1 ok 2 - iteration 2 ok 3 - iteration 3 ok 4 - iteration 4 ok 5 - iteration 5 ok 6 - iteration 6 ok 7 - iteration 7 ok 8 - iteration 8 ok 9 - iteration 9 ok 10 - iteration 10 ok 11 - iteration 11 # ERROR: (int) 'peer->status == PEER_RETRY' failed @ test/helpers/handshake.c:868 # [2] compared to [1] # ERROR: (int) 'result->result == test_ctx->expected_result' failed @ test/ssl_test.c:36 # [3] compared to [1] # INFO: @ test/ssl_test.c:37 # ExpectedResult mismatch: expected ServerFail, got InternalError. # OPENSSL_TEST_RAND_ORDER=1644408281 not ok 12 - iteration 12 ok 13 - iteration 13 # ERROR: (int) 'peer->status == PEER_RETRY' failed @ test/helpers/handshake.c:868 # [2] compared to [1] # ERROR: (int) 'result->result == test_ctx->expected_result' failed @ test/ssl_test.c:36 # [3] compared to [2] # INFO: @ test/ssl_test.c:37 # ExpectedResult mismatch: expected ClientFail, got InternalError. # OPENSSL_TEST_RAND_ORDER=1644408281 not ok 14 - iteration 14
答复: How run the specific test case //答复: How to run a simple test case
Thanks for your information. Issue have raised: https://github.com/openssl/openssl/issues/17681 -邮件原件- 发件人: Dr. Matthias St. Pierre [mailto:matthias.st.pie...@ncp-e.com] 发送时间: 2022年2月10日 0:03 收件人: Chenxinping ; openssl-users@openssl.org 主题: RE: How run the specific test case //答复: How to run a simple test case The problem lies with the Perl script, not the C program. The perl script generates the file 17-renegotiate.cnf.default from the template file 17-renegotiate.cnf.in. The environment variable “${ENV::TEST_CERTS_DIR}” should have been replaced by Perl. Please open an issue on GitHub, it’s easier to discuss your problem there. You might want to tag @levitte, he should be able to help. https://github.com/openssl/openssl/issues/new/choose Matthias Dr. Matthias St. Pierre Tech Lead Cryptography matthias.st.pie...@ncp-e.com Phone: +49 911 9968-0 www.ncp-e.com Headquarters Germany: NCP engineering GmbH • Dombuehler Str. 2 • 90449 • Nuremberg North American HQ: NCP engineering Inc. • 601 Cleveland Str., Suite 501-25 • Clearwater, FL 33755 Authorized representatives: Peter Soell, Patrick Oliver Graf, Beate Dietrich Registry Court: Lower District Court of Nuremberg Commercial register No.: HRB 7786 Nuremberg, VAT identification No.: DE 133557619 This e-mail message including any attachments is for the sole use of the intended recipient(s) and may contain privileged or confidential information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please immediately contact the sender by reply e-mail and delete the original message and destroy all copies thereof.
自动回复: Re: How to distinguish between encrypted/unencrypted key in a PEM file
您好,您的邮件我已收到,我会尽快阅读,谢谢!
自动回复: Re: TLSv1.2 Distinguished Names Length 0 / how to set it
您好,您的邮件我已收到,我会尽快阅读,谢谢!
Mac OS X and openssl 3
Just wondering if Apple OS is compatible with OPenssl 3 . -- Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b If challenge is our enemy, we won't have friends. -unknown Beware https://mindspring.com
Re: CA upgrade in several aspects
Hi Mark! Thank you so much for answering. I think that the process of issuing a new ca cert (for replacing the old ca cert with a new a certificate with more bits and better signing algorithms) should be : - Generate in the own ca a new ca cert. - Replace in openssl.conf which ca cert and ca keys should be used to issue certificates. - Then reissue all certificates. Am I wrong?. If I apply the following changes in openssl.conf from the openssl.conf I attached in my previous email, I suppose all should be fine then?. The commented changes are : - Added the line : "signer_digest = sha256" - Modified the line : "digests= md5, sha1" by "digests = sha1, sha256, sha384, sha512" - Added the line : "ess_cert_id_alg= sha1" Best regards, El 2022-05-12 18:21, Mark Hack escribió: > NIST-800-131a deprecated SHA1 signatures in January of 2013 along with > RSA1024 bit keys. You should be issuing certificates with at least RSA2048 > with SHA2 signatures, and preferably at least RSA3072 with SHA-384 signatures > and if you are re-issuing CA certs more bits is better. > > Nothing was said about CA certificates with SHA1 signatures and some > implementations will now reject these as non-compliant even if they were > issued before 2013. > > On Thu, 2022-05-12 at 17:40 +0200, egoitz--- via openssl-users wrote: > > Please ignore the line below I said regards in my previous mail... it's there > by error... > > cheers! > > El 2022-05-12 17:38, ego...@ramattack.net escribió: > > Good afternoon, > > I'm running a CA, for generating the certificates for the backup clients of > my network and for the backup servers too. The certificates are used for > encrypting the backups stored in the servers and too, for comunicating over > TLS between severs and clients. > > This CA has some years now and the certificates I generate for new clients, > are not working (directly) in new machines. The reason for that is that new > operating systems, are requiring stronger signing algorithms. When you try to > start the service using that certificates (bacula file daemon) in a fresh new > Debian for instance, systemd throws the following error : > > _OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL > ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ > > I know you can fix that with the following change in openssl.conf : > > _CIPHERSTRING = DEFAULT@SECLEVEL=2_ > > _CIPHERSTRING = DEFAULT@SECLEVEL=1_ > > But this last way, does not convince me... so I have started debugging what > exactly was causing the the problem. I saw, that sha1 is not allowed as a > signing valid algorithm for SECLEVEL 2. So, I tried moving the CA to a more > recent testing machine (with a newer OpenSSL 1.1.1l-freebsd), and I modified > too in the openssl.conf of the CA (The openssl.conf existing in the CA dir > for generating certs and so...) : > > I have attached the old version. The new using version in the testing > machine, is the old one plus the below changes : > > - Added the line : "signer_digest = sha256" > > - Modified the line : "digests= md5, sha1" by "digests = > sha1, sha256, sha384, sha512" > > - Added the line : "ess_cert_id_alg= sha1" > > Now... I have generated a new certificate by following the normal > procedure... generate the key and csr... later sing new cert... etc etc. > > This new generated certificate (signed with sha256WithRSAEncryption > algorithm), has worked with a newer version of the Bacula client and in a > almost new Debian system. So it seems, just by generating new certificates, > using them in that new machines, with a newer os and keeping the old ca > certificate, at least the service has started. We have too, another master > public key for encrypting content (which is an oldly generated certificate > signed with sha1WithRSAEncryption) that we keep in case a customer looses > it's keys for avoiding a possible disaster. > > I was wondering if some sort of problem could exist, by using those old two > certificates (the master public key and the old ca certifcate) with the new > generated certificate. > > Now, that I have that CA, for whose purpose seems to be working, I have > started thinking... some more... I have noticed that the CA certificate will > expire in 2024. I assume that what I would have to do before that CA cert > expires could be : > > - Generate a second ca cert for the CA. > > - Change the ca certificate to be used (for signing and issuing new certs) in > openssl.conf : > > _CERTIFICATE= $DIR/CACERT-NEW.PEM
CA upgrade in several aspects
Good afternoon, I'm running a CA, for generating the certificates for the backup clients of my network and for the backup servers too. The certificates are used for encrypting the backups stored in the servers and too, for comunicating over TLS between severs and clients. This CA has some years now and the certificates I generate for new clients, are not working (directly) in new machines. The reason for that is that new operating systems, are requiring stronger signing algorithms. When you try to start the service using that certificates (bacula file daemon) in a fresh new Debian for instance, systemd throws the following error : _OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ I know you can fix that with the following change in openssl.conf : _CIPHERSTRING = DEFAULT@SECLEVEL=2_ _CIPHERSTRING = DEFAULT@SECLEVEL=1_ But this last way, does not convince me... so I have started debugging what exactly was causing the the problem. I saw, that sha1 is not allowed as a signing valid algorithm for SECLEVEL 2. So, I tried moving the CA to a more recent testing machine (with a newer OpenSSL 1.1.1l-freebsd), and I modified too in the openssl.conf of the CA (The openssl.conf existing in the CA dir for generating certs and so...) : I have attached the old version. The new using version in the testing machine, is the old one plus the below changes : - Added the line : "signer_digest = sha256" - Modified the line : "digests= md5, sha1" by "digests = sha1, sha256, sha384, sha512" - Added the line : "ess_cert_id_alg= sha1" Now... I have generated a new certificate by following the normal procedure... generate the key and csr... later sing new cert... etc etc. This new generated certificate (signed with sha256WithRSAEncryption algorithm), has worked with a newer version of the Bacula client and in a almost new Debian system. So it seems, just by generating new certificates, using them in that new machines, with a newer os and keeping the old ca certificate, at least the service has started. We have too, another master public key for encrypting content (which is an oldly generated certificate signed with sha1WithRSAEncryption) that we keep in case a customer looses it's keys for avoiding a possible disaster. I was wondering if some sort of problem could exist, by using those old two certificates (the master public key and the old ca certifcate) with the new generated certificate. Now, that I have that CA, for whose purpose seems to be working, I have started thinking... some more... I have noticed that the CA certificate will expire in 2024. I assume that what I would have to do before that CA cert expires could be : - Generate a second ca cert for the CA. - Change the ca certificate to be used (for signing and issuing new certs) in openssl.conf : _CERTIFICATE= $DIR/CACERT-NEW.PEM # THE CA CERTIFICATE_ - Sign again all the certificates in the CA... - Change, all certificates in the CA (except the own ca cert which is already changed). - Finally replace in each servers and clients certs. Is this a correct procedure for upgrading a CA?. I assume it can be correct. Isn't it?. I think this procedure shouldn't break nothing related to serials of certificates and so in the own ca. Am I wrong?. Best regards, +are causing to set a special config in /etc/ssl/openssl.conf saying : "# $FreeBSD: release/10.0.0/crypto/openssl/apps/openssl.cnf 238405 2012-07-12 19:30:53Z jkim $ # # OpenSSL example configuration file. # This is mostly being used for generation of certificate requests. # # This definition stops the following lines choking if HOME isn't # defined. HOME= . RANDFILE= $ENV::HOME/.rnd # Extra OBJECT IDENTIFIER info: #oid_file = $ENV::HOME/.oid oid_section = new_oids # To use this configuration file with the "-extfile" option of the # "openssl x509" utility, name here the section containing the # X.509v3 extensions to use: # extensions= # (Alternatively, use a configuration file that has only # X.509v3 extensions in its main [= default] section.) [ new_oids ] # We can add new OIDs in here for use by 'ca', 'req' and 'ts'. # Add a simple OID like this: # testoid1=1.2.3.4 # Or use config file substitution like this: # testoid2=${testoid1}.5.6 # Policies used by the TSA examples. tsa_policy1 = 1.2.3.4.1 tsa_policy2 = 1.2.3.4.5.6 tsa_policy3 = 1.2.3.4.5.7 [ ca ] default_ca = SARENET-CLOUDBACKUP-CA# The default ca section [ SARENET-CLOUDBACKUP-CA ] dir = /expert/SARENET-CLOUDBACKUP-CA# Where everything is kept certs = $dir/certs
Re: CA upgrade in several aspects
Please ignore the line below I said regards in my previous mail... it's there by error... cheers! El 2022-05-12 17:38, ego...@ramattack.net escribió: > Good afternoon, > > I'm running a CA, for generating the certificates for the backup clients of > my network and for the backup servers too. The certificates are used for > encrypting the backups stored in the servers and too, for comunicating over > TLS between severs and clients. > > This CA has some years now and the certificates I generate for new clients, > are not working (directly) in new machines. The reason for that is that new > operating systems, are requiring stronger signing algorithms. When you try to > start the service using that certificates (bacula file daemon) in a fresh new > Debian for instance, systemd throws the following error : > > _OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL > ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ > > I know you can fix that with the following change in openssl.conf : > > _CIPHERSTRING = DEFAULT@SECLEVEL=2_ > > _CIPHERSTRING = DEFAULT@SECLEVEL=1_ > > But this last way, does not convince me... so I have started debugging what > exactly was causing the the problem. I saw, that sha1 is not allowed as a > signing valid algorithm for SECLEVEL 2. So, I tried moving the CA to a more > recent testing machine (with a newer OpenSSL 1.1.1l-freebsd), and I modified > too in the openssl.conf of the CA (The openssl.conf existing in the CA dir > for generating certs and so...) : > > I have attached the old version. The new using version in the testing > machine, is the old one plus the below changes : > > - Added the line : "signer_digest = sha256" > > - Modified the line : "digests= md5, sha1" by "digests = > sha1, sha256, sha384, sha512" > > - Added the line : "ess_cert_id_alg= sha1" > > Now... I have generated a new certificate by following the normal > procedure... generate the key and csr... later sing new cert... etc etc. > > This new generated certificate (signed with sha256WithRSAEncryption > algorithm), has worked with a newer version of the Bacula client and in a > almost new Debian system. So it seems, just by generating new certificates, > using them in that new machines, with a newer os and keeping the old ca > certificate, at least the service has started. We have too, another master > public key for encrypting content (which is an oldly generated certificate > signed with sha1WithRSAEncryption) that we keep in case a customer looses > it's keys for avoiding a possible disaster. > > I was wondering if some sort of problem could exist, by using those old two > certificates (the master public key and the old ca certifcate) with the new > generated certificate. > > Now, that I have that CA, for whose purpose seems to be working, I have > started thinking... some more... I have noticed that the CA certificate will > expire in 2024. I assume that what I would have to do before that CA cert > expires could be : > > - Generate a second ca cert for the CA. > > - Change the ca certificate to be used (for signing and issuing new certs) in > openssl.conf : > > _CERTIFICATE= $DIR/CACERT-NEW.PEM # THE CA CERTIFICATE_ > > - Sign again all the certificates in the CA... > > - Change, all certificates in the CA (except the own ca cert which is already > changed). > > - Finally replace in each servers and clients certs. > > Is this a correct procedure for upgrading a CA?. I assume it can be correct. > Isn't it?. I think this procedure shouldn't break nothing related to serials > of certificates and so in the own ca. Am I wrong?. > > Best regards, > > +are causing to set a special config in /etc/ssl/openssl.conf saying : "
Cross-compiling OpenSSL 1.1.1 - specifying toolchain
Trying to compile OpenSSL using Bootlin tool chains for ARMv5 UCLIBC found at https://toolchains.bootlin.com/ Does anyone have recent experience compiling OpenSSL 1.1.1 specifying alternate tool-chains? What commands did you use? Thanks
RE: Setting a group to an existing EVP_PKEY in OpenSSL 3
Kory, Thanks for your response. I want to preserve the rest of the EC public key params. I did this. I haven’t test yet. OSSL_PARAM* extracted_params = NULL; char curve_name[64]; OSSL_PARAM* param_ecgroup = NULL; // sigkey is the EVP_PKEY ECDSA public key if (EVP_PKEY_todata(sigkey, EVP_PKEY_PUBLIC_KEY, _params) == 0) { // error } curve_name = OSSL_EC_curve_nid2name(nid)); if (curve_name == NULL) { // error } if ((param_ecgroup = OSSL_PARAM_locate(params, "group")) != NULL) { OSSL_PARAM_set_utf8_string(param_ecgroup, curve_name); } else { // error } Martin From: Kory Hamzeh Sent: Monday, October 24, 2022 7:22 PM To: amar...@xtec.com Cc: openssl-users@openssl.org Subject: Re: Setting a group to an existing EVP_PKEY in OpenSSL 3 I haven’t done exactly what you are trying, but something similar. See EVP_PKEY_set_params: https://www.openssl.org/docs/man3.0/man3/EVP_PKEY_set_params.html The specific parm to set the group could be set like this: OSSL_PARAM_BLD_push_utf8_string(param_bld, "group", curve, 0; Please note that that I have not tested the above code as my code uses key-from-data. But I think it should work. On Oct 24, 2022, at 2:31 PM, Martin via openssl-users mailto:openssl-users@openssl.org> > wrote: Hi, How can I set a GROUP to an existing EC type EVP_PKEY in OpenSSL 3? In 1.0.2 I was using this code having the EC_KEY: EC_KEY_set_group(eckey, EC_GROUP_new_by_curve_name(nid)); In OpenSSL 3 still EC_GROUP_new_by_curve_name(nid) can be used, but I don’t know how to go from that to set it on the existing key. Thanks, Martin
Setting a group to an existing EVP_PKEY in OpenSSL 3
Hi, How can I set a GROUP to an existing EC type EVP_PKEY in OpenSSL 3? In 1.0.2 I was using this code having the EC_KEY: EC_KEY_set_group(eckey, EC_GROUP_new_by_curve_name(nid)); In OpenSSL 3 still EC_GROUP_new_by_curve_name(nid) can be used, but I don't know how to go from that to set it on the existing key. Thanks, Martin
OpenSSL 3 ECC Key use question
Hi, How can I get the nid from the curve name for a EC key in OpenSSL 3? I'm porting code from OpenSSL 1.0.2. I'm converting this: ecc_curve_type = EC_GROUP_get_curve_name(EC_KEY_get0_group((const EC_KEY *)eckey)); if(ecc_curve_type == NID_undef) { to EVP_PKEY_get_utf8_string_param(pkey, OSSL_PKEY_PARAM_GROUP_NAME, curve_name, sizeof(curve_name), _len); ecc_curve_type = ossl_ec_curve_name2nid(curve_name); but ossl_ec_curve_name2nid() is internal and it is not defined in /include/openssl/ec.h but in /include/crypto/ec.h Thanks, Martin
自动回复: Re: OpenSSL 1.1.1 Windows dependencies
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
自动回复: Re: OpenSSL 1.1.1 Windows dependencies
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
Snapshots
No snapshots since 2022-10-19. -- Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b How can one be prejudiced and remain objective? -unknown Beware https://mindspring.com
自动回复: Re: issues with OpenSSL 1.1.1n
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
Upgrading OpenSSL on Windows 10
Hi All, A few weeks ago I sent this e-mail to the group: https://mta.openssl.org/pipermail/openssl-users/2022-November/015613.html I received a couple of replies, but sadly I have been too busy to respond to them. Regardless, I need a bit more information please. In one of the replies, Viktor said "Just upgrade any affected systems and you'll be fine.". However, I am running Windows 10, and since (unlike Linux) every piece of software outside of Windows itself needs to be updated individually, I don't know how to track down every single application that might be using OpenSSL and make sure that the copy of OpenSSL it uses is up-to-date. As many of you would know, under repository-based systems (such as most Linux distros), this would not be an issue as I could update every single application (system or non-system) at once. For those of you who may be thinking "but Windows doesn't use OpenSSL"; when the latest OpenSSL vulnerabilities were discovered I asked a Windows IRC channel whether or not Windows uses OpenSSL, the reply was that Windows itself does not use it, but many applications running on Windows do. Thank you all for your time.
Re: Upgrading OpenSSL on Windows 10
Hi Michael, Thanks very much for replying to my e-mail/post. I apologize for the lateness of my reply. > This is not true in the general case. There are applications which are > available on Linux which do not use the distribution's package manager. There > are applications which use their own OpenSSL build, possibly linked > statically or linked into one of their own shared objects or with the OpenSSL > shared objects renamed. Linux distributions have not magically solved the > problem of keeping all software on the system current. That's disheartening. My next computer will be running Linux and I was thinking that (as long as I stick to installing software from appropriate repositories) my update worries would be over soon. >It is possible, with relatively little effort, to find all the copies of the >OpenSSL DLLs under their usual names on a system Could you please provide me with a list of the usual names? I've got a lot of libssl DLL's on my system, but I'm not sure if they're part of OpenSSL or some other implementation of SSL. >I'm not sure OpenSSL versions should be particularly high on anyone's priority >list. As I understand it, OpenSSL is responsible for establishing HTTPS connections, the primary protocol for ensuring security and authenticity over the Internet, and you *don't* think OpenSSL versions should be a high priority? I don't understand your lack of alarm here. >What are you actually trying to accomplish? What's your task? Your threat >model? I want to be able to trust the HTTPS connections between my PC and servers on the Internet again; whether I'm using a browser, a software installer (that downloads data from the Internet before installing), a peer-to-peer application, or any other network application. Thank you for your time. Steven
RE: Upgrading OpenSSL on Windows 10
Hi Job, Thanks very much for your reply. Apologies for the lateness of mine. I will ask around and get more information about Powershell and PDQ Inventory. Thanks again, Steven Sent with Proton Mail secure email. --- Original Message --- On Wednesday, November 23rd, 2022 at 5:36 AM, Job Cacka wrote: > Michael's point should be asked and answered first for your environment. > > To find all of the OpenSSL bits used on a windows system you would use > Powershell or a tool that flexes its use like PDQ Inventory. There is a > steep learning curve and it is probably off topic for this group but there > are several different ways to use powershell to gain this information from > different viewpoints (Installed files, registry, event log, etc...). > > Thanks, > Job > > -Original Message- > From: openssl-users openssl-users-boun...@openssl.org On Behalf Of Michael > > Wojcik via openssl-users > Sent: Monday, November 21, 2022 4:18 PM > To: openssl-users@openssl.org > Subject: Re: Upgrading OpenSSL on Windows 10 > > > From: openssl-users openssl-users-boun...@openssl.org on behalf of > > Steven_M.irc via openssl-users openssl-users@openssl.org > > Sent: Monday, November 21, 2022 15:56 > > > However, I am running Windows 10, and since (unlike Linux) every piece > > of software outside of Windows itself needs to be updated > > individually, I don't know how to track down every single application that > > might be using OpenSSL and make sure that the copy of OpenSSL it uses is > up-to-date. > > You don't. There may be applications that have OpenSSL linked statically, or > linked into one of its own DLLs, or just with the OpenSSL DLLs renamed. > > > As many of you would know, under repository-based systems (such as > > most Linux distros), this would not be an issue as I could update every > > single application (system or non-system) at once. > > This is not true in the general case. There are applications which are > available on Linux which do not use the distribution's package manager. > There are applications which use their own OpenSSL build, possibly linked > statically or linked into one of their own shared objects or with the > OpenSSL shared objects renamed. Linux distributions have not magically > solved the problem of keeping all software on the system current. > > > Back to Windows: It is possible, with relatively little effort, to find all > the copies of the OpenSSL DLLs under their usual names on a system, and then > glean from them their version information. With significantly more effort, > you can search for exported OpenSSL symbols within third-party binaries, > which will detect some more instances. With quite a lot of additional > effort, you can winkle out binaries which contain significant portions of > code matching some OpenSSL release (see various research efforts on > function-point and code-block matching, and compare with alignment > strategies in other fields, such as genomics). If your definition of > "OpenSSL in an application" is not too ambitious, this might even be > feasible. > > But to what end? Each application will either be well-supported, in which > case you can find out from the vendor what OpenSSL version it contains and > whether an update is available; or it is not, in which you'll be out of > luck. > > This is true of essentially every software component, most of which are not > as well-maintained or monitored as OpenSSL. Modern software development is > mostly a haphazard hodgepodge of accumulating software of uncertain > provenance and little trustworthiness into enormous systems with > unpredictable behavior and failure modes. I'm not sure OpenSSL versions > should be particularly high on anyone's priority list. > > What are you actually trying to accomplish? What's your task? Your threat > model? > > -- > Michael Wojcik
Re: an oldie but a goodie .. ISO C90 does not support 'long long'
On Wed, Nov 02, 2022 at 06:29:45PM +, Michael Wojcik via openssl-users wrote: > > From: openssl-users On Behalf Of Phillip > > Susi > > Sent: Wednesday, 2 November, 2022 11:45 > > > > The only thing to fix is don't put your compiler in strict C90 mode. > > I'm inclined to agree. While there's an argument for backward compatibility, > C99 was standardized nearly a quarter of a century ago. OpenSSL 1.x is > younger than C99. It doesn't seem like an unreasonable requirement. > > But as Tomas wrote, anyone who thinks it is can submit a pull request. > > -- > Michael Wojcik Would this be a choice between backwards-compatibility with C90 compilers and compatibility with 32-bit architectures? Is there another way to get 64-bit integers on 32-bit systems? I suspect that that there are more 32-bit systems than there are C90 compilers. cheers, raf
Re: an oldie but a goodie .. ISO C90 does not support 'long long'
On Sat, Nov 05, 2022 at 02:22:55PM +, Michael Wojcik wrote: > > From: openssl-users On Behalf Of raf > > via > > openssl-users > > Sent: Friday, 4 November, 2022 18:54 > > > > On Wed, Nov 02, 2022 at 06:29:45PM +, Michael Wojcik via openssl-users > > wrote: > > > > > > > > I'm inclined to agree. While there's an argument for backward > > > compatibility, > > > C99 was standardized nearly a quarter of a century ago. OpenSSL 1.x is > > > younger than C99. It doesn't seem like an unreasonable requirement. > > > > Would this be a choice between backwards-compatibility with C90 > > compilers and compatibility with 32-bit architectures? > > I don't see how. > > It's a question of the C implementation, not the underlying > architecture. A C implementation for a 32-bit system can certainly > provide a 64-bit integer type. If that C implementation conforms to > C99 or later, it ought to do so using long long and unsigned long > long. (I'm excluding C implementations for exotic systems where, for > example, CHAR_BIT != 8, such as some DSPs; those aren't going to be > viable targets for OpenSSL anyway.) > > > Is there another way to get 64-bit integers on 32-bit systems? > > Sure. There's a standard one, which is to include and > use int64_t and uint64_t. That also requires C99 or later and an > implementation which provides those types; they're not required. Sorry. I assumed that it was clear from context that I was only thinking about C90-compliant 64-bit integers on 32-bit systems. > And for some implementations there are implementation-specific > extensions, which by definition are not standard. > > And you can roll your own. In a non-OO language like C, this would > be intrusive for the parts of the source base that rely on a 64-bit > integer type. > > > I suspect that that there are more 32-bit systems than there are > > C90 compilers. > > Perhaps, but I don't think it's relevant here. In any case, OpenSSL is > not in the business of supporting every platform and C implementation > in existence. There are the platforms supported by the project, and > there are contributed platforms which are included in the code base > and supported by the community (hopefully), and there are unsupported > platforms. > > If someone wants OpenSSL on an unsupported platform, then it's up to > them to do the work. So it sounds like C90 is now officially unsupported. I got the impression that, before this thread, it was believed that C90 was supported, and the suggestion of a pull request indicated a willingness to retain/return support for C90. Perhaps it just indicated a willingness to accept community support for it. I'd be amazed if anyone could actually still be using a 30 year old C90 compiler, rather than a compiler that just gives warnings about C90. :-) > -- > Michael Wojcik cheers, raf
Fw:OpenSSL AES Decryption fails randomly C++
sorry for my mistake. I found that the gist url can not display well in mail and here is the url:https://gist.github.com/GoGim1/77c9bebec1cc71cea066515b4623a051 WuJinze 294843...@qq.com --Original-- From: "WuJinze" <294843...@qq.com; Date:Sat, Nov 12, 2022 06:17 PM To:"openssl-users"
OpenSSL AES Decryption fails randomly C++
Dear OpenSSL Group, Greetings. I was working on writing simple aes encrypt/decrypt wrapper function in c++ and running into a strange problem. The minimal reproducible examples in gist seems working fine but when i uncomment lines 90-92, it will fail to decrypt randomly. Can someone help me to figure out what's wrong with the code?Here is my code: OpenSSL AES Decryption fails randomly C++ (github.com). OpenSSL version is OpenSSL 1.1.1f. G++ version is 9.4.0.Regards, Jinze
Worried about the vulnerabilities recently found in OpenSSL versions 3.0.0 - 3.0.6.
Hi All, I'm really worried about the vulnerabilities recently found in OpenSSL versions 3.0.0 - 3.0.6. If I understand things correctly (and please do correct me if I'm wrong), it doesn't matter which version of OpenSSL clients are running, only which version of OpenSSL *servers* are running. Thus it seems like end-users can do very little to protect themselves. For example, how can an end-user tell if a website they're visiting is using a safe or an unsafe version of OpenSSL? I did try putting my bank's website through an SSL tester (www.ssllabs.com), but I couldn't find an easy way to determine which version of OpenSSL they're running. I did get a protocol report, which read as follows: TLS 1.3 Yes TLS 1.2 Yes TLS 1.1 No TLS 1.0 No SSL 3 No SSL 2 No However, I don't know if any of those protocol version numbers give any indication as to the OpenSSL version number(s)? Any advice would be greatly appreciated. Many thanks, Steven_M Sent with Proton Mail secure email.
自动回复: Re: Worried about the vulnerabilities recently found in OpenSSLversions 3.0.0 - 3.0.6.
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
自动回复: Re: issue with 1.1.1n
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
Re: goto out not working in tests
On Mon, May 06, 2024 at 11:34:59PM -0600, The Doctor via openssl-users wrote: > Using clang versino 18 > > and it is spewing at goto out > Line 417 and 434 of test/threadstest.c in openssl-3.3 daily -- Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism ;
goto out not working in tests
Using clang versino 18 and it is spewing at goto out -- Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising! Look at Psalms 14 and 53 on Atheism ;
[openssl-users] Heads up -- RT tickets moving to GH issues
Just to let you know, we found a tool to migrate RT to GitHub issues and will be doing that shortly. This will just about double the number of open issues we have and, unfortunately, push the existing (active ones) down a few pages. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] How to detect AES-NI compatible CPU
> My application links to OpenSSL 1.1.0 dynamically, and I would like to be able > to determine if the CPU supports the AES-NI instruction set. > Is there an OpenSSL API that can do this? Look at man3/OPENSSL_ia32cap.pod ? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Openssl 1.0.2k compilation issues
>Am trying to upgrade openssl 1.0.1p to 1.0.2k and the compilation breaks with >the below error and am using Ubuntu 10.04.1 >In file included from req.c:84: >comp.h:28: error: redefinition of typedef 'COMP_METHOD' >../../Build/target/usr/include/openssl/ossl_typ.h:181: error: previous >declaration of 'COMP_METHOD' was here Something is strange. Scrub your build area and restart. ; sed -n -e25,30p crypto/comp/comp.h int (*expand) (COMP_CTX *ctx, unsigned char *out, unsigned int olen, unsigned char *in, unsigned int ilen); /* * The following two do NOTHING, but are kept for backward compatibility */ ; sed -n -e181p crypto/ossl_typ.h typedef struct comp_method_st COMP_METHOD; ; -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Does CVE-2016-7055 only impact x86_64 platform ?
The text says Broadwell-specific So it only affects *some* x86_64 platforms. -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz From: Sandeep Umesh [mailto:sanum...@in.ibm.com] Sent: Monday, January 30, 2017 2:14 AM To: openssl-users@openssl.org Subject: [openssl-users] Does CVE-2016-7055 only impact x86_64 platform ? Hi Can you please clarify if CVE-2016-7055 only impact x86_64 platform ? What about other platforms listed in crypto/bn/asm/ folder which has Montgomery multiplication procedure, is it impacted ? Thanks Regards Sandeep -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] FW: problem with missing STDINT.H file
> It's cargo-cult programming, most often by people who can't be bothered to > learn the language they're using. There are also sometimes portability issues, vendors get things wrong. But at any rate, for this project, OpenSSL style says parens after sizeof and says nothing at all about pre-processor defined operator. It probably should, but clearly our existing style uses parens. Ok? You guys are both important contributors to the project. It hurts me to see you fight :) -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] BN_MUL_MONT for ARM64 v8
> Have you considered using GMP as a big integer backed for openssl? It has > support for several arm variants using handwritten assembly code and the > developers go to great lengths to find optimize runtime on all supported > platforms. It might be interesting if we could figure out how to handle it as a dynamic library. License issues prevent anything else. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?
Michael was kind to post some replies. I think a better forum to discuss this is one of the following, which has more focus on cryptographic science and less on “how do I use the CLI” http://www.metzdowd.com/mailman/listinfo/cryptography https://www.irtf.org/mailman/listinfo/cfrg -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] openssl s_client
Hello, openssl s_client -connect mailhost:25 -starttls smtp displays this: CONNECTED(0003) depth=0 OU = Domain Control Validated, CN = ... verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 OU = Domain Control Validated, CN = ... verify error:num=27:certificate not trusted verify return:1 depth=0 OU = Domain Control Validated, CN = ... verify error:num=21:unable to verify the first certificate verify return:1 the question: is this caused by a config problem on the serverside or on the client side (host running openssl)? Thanks, Walter smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Inserting cipher into speed.c
On 02/04/2017 04:00 PM, Schmicker, Robert wrote: > > Hello, > > > Thanks to everyones help here I was able to insert a new cipher into > OpenSSL. > > However, for performance reasons I'd like to begin testing the speed > of my cipher and > > compare to other already implemented ciphers. > > > I went ahead and started editing the ./apps/speed.c file to insert the > new cipher but ran into some strange output (See below). > > IIRC you are supposed to implement the EVP interface for your cipher and use the -evp flag to speed. -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] BN_MUL_MONT for ARM64 v8
> Licensing issues are indeed thorny. Why can't openssl perform a dynamic link? > The soversion should handle any ABI issues introduced in later versions of > GMP. Anything is possible; it is just code. I don't think this is a priority for the team. A pull request ... -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] 'No client certificate CA names sent'
On 01/30/2017 10:44 AM, russellb...@gmail.com wrote: > Quoth Mr Viktor Dukhovni, 'it is often wise to send an empty > list when requesting client certificates.' > How does one send an empty list? > That's generally the default server behavior when no CAs are configured for that purpose. But, (1) I thought you were looking at the client side, and (2) how to configure the server depends on what software is used on the server, so there's not much more to say right now. -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Question RE certificate chain verification
On Tue, February 21, 2017 12:16, Jakob Curdes wrote: > Hi, I am new to the list and have a question where it seems I cannot find > the answer in archives here or in other sources. > > We want to verify the certificate chain of an "official" certificate, but > including the revocation status of the intermediate certs, via CRL or > OCSP. > (The chain verification itself is easy and solved, our problems lie just > with getting the revocation status of an arbitrary certificate). > > It seems to turn out that a) this is seldom done completely (otherwise I > think there would be more "working recipes") and it is not easy to do it > in a generic way as we keep getting various errors at different steps. > > Wtihout making it too long, we want to do the following: > a) retrieve and save certificate from server via URL > b)retrieve and save certificate chain from server > c) determine OCSP URL or CRL list URL > d1) verify cert against OCSP source OR > d2) download CRL; then verify cert against CRL > > Up to c), everything is straightforward. We use openssl 1.0.1e-60.el7 from > current CentOS 7. try this: CAFILE=/etc/pki/certs/ca-bundle.trust.crt CERT=/tmp/cert.crt <-- cert to validate ISSUER=/tmp/issuer.crt <-- issuing ca cert OCSPURL=$(openssl x509 -in $CERT -noout -ocsp_uri) OCSPHOST=$(echo "$OCSPURL" |gawk --field-separator=\/ '{ print $3 }' -) OCSPRESULT=$(openssl ocsp -CAfile $CAFILE -no_nonce -noverify -issuer $ISSUER -cert $CERT -url "$OCSPURL" -header Host $OCSPHOST |grep "$CERT") -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] error making Private RSA
What version of openssl? I'm guessing 1.0.2. Put this line inyour code ERR_load_ERR_strings(); And youll get a more informative message. My main guess is that your allocation for the PEM buffer is too small -- is key/key_len pointing to a static buffer? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Msys doesn't handle forward slashes in makefile
Hi! I use Configure under Msys with crosscompiler arm-none-symbianelf. I edit accordingly Configure script of course. When I run make it prints "_some string_ path not found". I found this string and replace forward slashes to backslashes. I got same error for another string. I try "ls path2 file" from error message and got error "not found error". I change slashes and vise versa. How can tell configure to generate makefile with backslashes? May be another solutions exists? Fiodar Stryzhniou -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Msys doesn't handle forward slashes in makefile
I need in autogenerated files headers, asm, others. Project will migrate to Symbian build system then. Fiodar Stryzhniou исходное сбщ Тема: Re: [openssl-users] Msys doesn't handle forward slashes in makefile От: Jakob Bohm <jb-open...@wisemo.com> Дата: 28.11.2016 23.29 On 28/11/2016 11:44, Fiodar Stryzhniou via openssl-users wrote: > Hi! I use Configure under Msys with crosscompiler arm-none-symbianelf. I edit > accordingly Configure script of course. When I run make it prints "_some > string_ path not found". I found this string and replace forward slashes to > backslashes. I got same error for another string. > I try "ls path2 file" from error message and got error "not found error". I > change slashes and vise versa. > How can tell configure to generate makefile with backslashes? May be > another solutions exists? > Fiodar Stryzhniou > Hmm, maybe run perl -pe "s/\//\\/sg" on the Makefile as part of your higher level build script? I found recipe on stack overflow "sed -i s/\//\\/g Makefile". Paths can have back and forward slashes at one time in makefile, lol. I don't use build script except Configure. But how do you run the code after the signing service was shut down at the Microsoft takeover? I hack my phone and forget about it. Also I saw in internet how make own devcert. Enjoy Jakob -- Jakob Bohm, CIO, Partner, WiseMo A/S. https://www.wisemo.com Transformervej 29, 2860 Søborg, Denmark. Direct +45 31 13 16 10 This public discussion message is non-binding and may contain errors. WiseMo - Remote Service Management for PCs, Phones and Embedded -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] purpose dir crypto/dso
Hi! This directory should build when each dir in crypto/ builded as separate dll, isn't it? This directory contain module loader, right? I googled with "crypto/dso purpose" without luck. Fiodar Stryzhniou -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] big endian vs little endian
On 18.12.2016 17:21, sahorwitz wrote: I am obviosly a newbie and missing something. How then do I encrypt the file on one machine (little endian), transmit it to another machine (big endian) and decrypt it there? similar to this: encrypt openssl enc -e -in file -out encryptfile -aes-256-gcm decrypt openssl enc -d -in encryptfile -out file -aes-256-gcm can someone explain why I get the following output enter aes-256-gcm decryption password: bad decrypt but the file is correctly decrypted I'm using latest openssl rpm package from CentOS 6 smime.p7s Description: S/MIME Cryptographic Signature -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'
See below. Jeremy Farrell>> What output do you get when you run the same commands as Richard? That is:Jeremy Farrell>> Jeremy Farrell>> type perl $ type perl perl is hashed (/mingw64/bin/perl) Jeremy Farrell>> Jeremy Farrell>> perl -v $ perl -v This is perl 5, version 22, subversion 0 (v5.22.0) built for MSWin32-x64-multi-thread Copyright 1987-2015, Larry Wall Perl may be copied only under the terms of either the Artistic License or the GNU General Public License, which may be found in the Perl 5 source kit. Complete documentation for Perl, including FAQ lists, should be found on this system using "man perl" or "perldoc perl". If you have access to the Internet, point your browser at http://www.perl.org/, the Perl Home Page. Jeremy Farrell>> Jeremy Farrell>> perl -e 'print $^X,"\n";' C:\msys64\mingw64\bin\perl.exe -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'
I am using a MinGW64 / MSYS2 environment to compile OpenSSL1.1.0c, but failing consistently after multiple attempts with a few variations each attempt (including deleting entire source directory and re-untar/ungzipping). I believe there's something wrong either with my environment settings or ./Configure options. This is the output of ./Configure after setting only the CFLAGS env var: $ export "CFLAGS=-03"$ ./Configure mingw64 --prefix=/usr/local zlib shared Configuring OpenSSL version 1.1.0c (0x1010003fL) no-asan [default] OPENSSL_NO_ASAN no-crypto-mdebug [default] OPENSSL_NO_CRYPTO_MDEBUG no-crypto-mdebug-backtrace [default] OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE no-ec_nistp_64_gcc_128 [default] OPENSSL_NO_EC_NISTP_64_GCC_128 no-egd [default] OPENSSL_NO_EGD no-fuzz-afl [default] OPENSSL_NO_FUZZ_AFL no-fuzz-libfuzzer [default] OPENSSL_NO_FUZZ_LIBFUZZER no-heartbeats [default] OPENSSL_NO_HEARTBEATS no-md2 [default] OPENSSL_NO_MD2 (skip dir) no-msan [default] OPENSSL_NO_MSAN no-rc5 [default] OPENSSL_NO_RC5 (skip dir) no-sctp [default] OPENSSL_NO_SCTP no-ssl-trace [default] OPENSSL_NO_SSL_TRACE no-ssl3 [default] OPENSSL_NO_SSL3 no-ssl3-method [default] OPENSSL_NO_SSL3_METHOD no-ubsan [default] OPENSSL_NO_UBSAN no-unit-test [default] OPENSSL_NO_UNIT_TEST no-weak-ssl-ciphers [default] OPENSSL_NO_WEAK_SSL_CIPHERS no-zlib-dynamic [default] Configuring for mingw64 CC =gcc CFLAG =-DL_ENDIAN -DWIN32_LEAN_AND_MEAN -DUNICODE -D_UNICODE -m64 -Wall -O3 -D_MT SHARED_CFLAG =-D_WINDLL DEFINES =ZLIB DSO_WIN32 NDEBUG OPENSSL_THREADS OPENSSL_NO_STATIC_ENGINE OPENSSL_PIC OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_MONT5 OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM SHA512_ASM RC4_ASM MD5_ASM AES_ASM VPAES_ASM BSAES_ASM GHASH_ASM ECP_NISTZ256_ASM POLY1305_ASM LFLAG = PLIB_LFLAG = EX_LIBS =-lz -lws2_32 -lgdi32 -lcrypt32 APPS_OBJ =win32_init.o CPUID_OBJ =x86_64cpuid.o UPLINK_OBJ = BN_ASM =asm/x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o rsaz_exp.o rsaz-x86_64.o rsaz-avx2.o EC_ASM =ecp_nistz256.o ecp_nistz256-x86_64.o DES_ENC =des_enc.o fcrypt_b.o AES_ENC =aes-x86_64.o vpaes-x86_64.o bsaes-x86_64.o aesni-x86_64.o aesni-sha1-x86_64.o aesni-sha256-x86_64.o aesni-mb-x86_64.o BF_ENC =bf_enc.o CAST_ENC =c_enc.o RC4_ENC =rc4-x86_64.o rc4-md5-x86_64.o RC5_ENC =rc5_enc.o MD5_OBJ_ASM =md5-x86_64.o SHA1_OBJ_ASM =sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o sha1-mb-x86_64.o sha256-mb-x86_64.o RMD160_OBJ_ASM= CMLL_ENC =cmll-x86_64.o cmll_misc.o MODES_OBJ =ghash-x86_64.o aesni-gcm-x86_64.o PADLOCK_OBJ =e_padlock-x86_64.o CHACHA_ENC =chacha-x86_64.o POLY1305_OBJ =poly1305-x86_64.o BLAKE2_OBJ = PROCESSOR = RANLIB =ranlib ARFLAGS = PERL =C:\msys64\mingw64\bin\perl.exe SIXTY_FOUR_BIT mode Configured for mingw64. $ make C:\msys64\mingw64\bin\perl.exe "-I." -Mconfigdata "util\dofile.pl" \ "-oMakefile" crypto\include\internal\bn_conf.h.in > crypto\include\internal\bn_conf.h /bin/sh: C:msys64mingw64binperl.exe: command not found make: *** [Makefile:701: crypto\include\internal\bn_conf.h] Error 127 It seems the "\" is the culprit here, since the execution of the make command appears to strip those out and then (as expected) the /bin/sh cannot recognize that large hash of what should have been the path to Perl. I did edit the first Makefile above to : Change the base PERL to "C:/msys64/mingw64/bin/perl.exe", *and* crypto/include/internal/bin_conf.h.in > crypto/include/internal/bin_conf.h The above worked, but *only* for that line of the make file (as I expected). It then fails at the very next line because I didn't edit every "\" to become "/" instead. I'm not sure I'm willing to do that much editing... seems there's got to be a better way to make this work. I realize this has something to do with specifying ./Configure mingw64 and how it's populating the Makefiles using Windows-style paths, but I'm not sure it's safe / okay to fake having a Unix build target instead, since this will likely create new / other problems with libraries, etc. Am I missing a ./Configure option, an environment variable I should preset, or something else altogether? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'
From: Jeffrey Walton <noloa...@gmail.com> via openssl-users <openssl-users@openssl.org> wrote: > http://stackoverflow.com/q/40948353/608639 In my original note, I explained that I'd done something similar to what the above stackoverflow.com entry suggested: >> I did edit the first Makefile above to : >> 1. Change the base PERL to "C:/msys64/mingw64/bin/perl.exe", *and* >> 2. crypto/include/internal/bin_conf.h.in > >>crypto/include/internal/bin_conf.h >> >> The above worked, but *only* for that line of the make file (as I expected). >>ADDENDUM<< Changing PERL to "C:/mysys64/mingw64/bin/perl.exe" in the top >>level Makefile was sufficient, even the second action correctly called >>perl.exe. The real issue is with the "\" in the paths for all the *.h files (there are many of these in each Makefile, too numerous to hand edit). I can't just find / replace all "\", this will create new issues where the Makefile needs the "\" as it is. I can't imagine the Makefiles use the "\" in the paths when Configure'd for a Unix (Linux) system, there should be a way to modify the Configure Perl script to use Unix paths when compiling for "mingw64" systems, but I've yet to find it in the Configure code -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'
I wondered about that as well. First, regarding my msys64: The root '/' is mapped to "C:\msys64", and "/mingw64" is the directory where I keep all things MinGW64 w64. Second: I do have multiple Perl's installed, though only one in the /mingw64 tree. In essence, I *think* all the non-mingw64 per stuff I list below is irrelevant, but I'm not ruling those out as possible culprits in this issue... So here's what I see (spoiler alert : nothing is jumping out at me as the culprit): $ type /mingw64/bin/perl /mingw64/bin/perl is /mingw64/bin/perl $ /mingw64/bin/perl -v This is perl 5, version 22, subversion 0 (v5.22.0) built for MSWin32-x64-multi-thread Copyright 1987-2015, Larry Wall Perl may be copied only under the terms of either the Artistic License or the GNU General Public License, which may be found in the Perl 5 source kit. Complete documentation for Perl, including FAQ lists, should be found on this system using "man perl" or "perldoc perl". If you have access to the Internet, point your browser at http://www.perl.org/, the Perl Home Page. $ pacman -Ss perl /*--- NOTE: I cut out all the extraneous stuff and narrowed it to only what's [installed] mingw64/mingw-w64-x86_64-perl 5.22.0-1 [installed] A highly capable, feature-rich programming language (mingw-w64) msys/libpcre 8.38-1 (libraries) [installed] A library that implements Perl 5-style regular expressions msys/libpcre16 8.38-1 (libraries) [installed] A library that implements Perl 5-style regular expressions msys/libpcre32 8.38-1 (libraries) [installed] A library that implements Perl 5-style regular expressions msys/libpcrecpp 8.38-1 (libraries) [installed] A library that implements Perl 5-style regular expressions msys/libpcreposix 8.38-1 (libraries) [installed] A library that implements Perl 5-style regular expressions msys/pcre 8.38-1 [installed] A library that implements Perl 5-style regular expressions msys/perl 5.22.1-1 (base-devel) [installed] A highly capable, feature-rich programming language msys/perl-Authen-SASL 2.16-2 (perl-modules) [installed] Perl/CPAN Module Authen::SASL : SASL authentication framework msys/perl-Convert-BinHex 1.123-2 [installed] Perl module to extract data from Macintosh BinHex files msys/perl-Encode-Locale 1.04-1 (perl-modules) [installed] Determine the locale encoding msys/perl-File-Listing 6.04-2 (perl-modules) [installed] parse directory listing msys/perl-HTML-Parser 3.71-3 (perl-modules) [installed] Perl HTML parser class msys/perl-HTML-Tagset 3.20-2 (perl-modules) [installed] Data tables useful in parsing HTML msys/perl-HTTP-Cookies 6.01-2 (perl-modules) [installed] HTTP cookie jars msys/perl-HTTP-Daemon 6.01-2 (perl-modules) [installed] A simple http server class msys/perl-HTTP-Date 6.02-2 (perl-modules) [installed] Date conversion routines msys/perl-HTTP-Message 6.06-2 (perl-modules) [installed] HTTP style messages msys/perl-HTTP-Negotiate 6.01-2 (perl-modules) [installed] choose a variant to serve msys/perl-IO-Socket-SSL 2.016-1 (perl-modules) [installed] Nearly transparent SSL encapsulation for IO::Socket::INET msys/perl-IO-stringy 2.111-1 (perl-modules) [installed] I/O on in-core objects like strings/arrays msys/perl-LWP-MediaTypes 6.02-2 (perl-modules) [installed] Guess the media type of a file or a URL msys/perl-MIME-tools 5.506-1 [installed] Parses streams to create MIME entities msys/perl-MailTools 2.14-1 [installed] Various e-mail related modules msys/perl-Module-Build 0.4212-1 [installed] Build, test, and install Perl modules msys/perl-Net-HTTP 6.09-1 (perl-modules) [installed] Low-level HTTP connection (client) msys/perl-Net-SMTP-SSL 1.02-1 (perl-modules) [installed] SSL support for Net::SMTP msys/perl-Net-SSLeay 1.72-1 (perl-modules) [installed] Perl extension for using OpenSSL msys/perl-TermReadKey 2.33-1 (perl-modules) [installed] Provides simple control over terminal driver modes msys/perl-Test-Pod 1.50-1 (perl-modules) [installed] Check for POD errors in files msys/perl-TimeDate 2.30-2 [installed] Date formating subroutines msys/perl-URI 1.68-1 (perl-modules) [installed] Uniform Resource Identifiers (absolute and relative) msys/perl-WWW-RobotRules 6.02-2 (perl-modules) [installed] Database of robots.txt-derived permissions msys/perl-YAML-Syck 1.29-1 (perl-modules) [installed] Fast, lightweight YAML loader and dumper msys/perl-libwww 6.13-1 (perl-modules) [installed] The World-Wide Web library for Perl From: Richard Levitte <levi...@openssl.org> levitte>> The PERL definition is a bit odd for a mingw perl. That path comes levitte>> mingw64/mingw-w64-x86_64-perl 5.22.0-1 [installed]levitte>> A highly capable, feature-rich programming language (mingw-w64)levitte>> from the perl variable $^X.levitte>> levitte>> In my MSYS2/Mingw64 shell, I get this:
Re: [openssl-users] One question about RSA decrypt with private key
> After commented out the line "EVP_PKEY_CTX_set_rsa_padding(ctx, > RSA_NO_PADDING)",? it worked well. You need to do some reading about basic RSA cryptography. Signatures are padded out to the keysize. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Functions for retrive public key from x509 cert
Dear friends, Someone can tell me what function is called for retrieve public key from x509 cert? in the case of EC public key? Best regards. Il Lunedì 27 Marzo 2017 10:26, "openssl-users-requ...@openssl.org" <openssl-users-requ...@openssl.org> ha scritto: Send openssl-users mailing list submissions to openssl-users@openssl.org To subscribe or unsubscribe via the World Wide Web, visit https://mta.openssl.org/mailman/listinfo/openssl-users or, via email, send a message with subject or body 'help' to openssl-users-requ...@openssl.org You can reach the person managing the list at openssl-users-ow...@openssl.org When replying, please edit your Subject line so it is more specific than "Re: Contents of openssl-users digest..." Today's Topics: 1. SSL cipher list to disable TLS 1.0 & TLS 1.1 (Hema Murthy) 2. In ssl3_write_bytes, some checks related to hanlding write failure are missing (Raja ashok) -- Message: 1 Date: Mon, 27 Mar 2017 11:59:16 +0530 From: Hema Murthy <chintuh...@gmail.com> To: openssl-users@openssl.org Subject: [openssl-users] SSL cipher list to disable TLS 1.0 & TLS 1.1 Message-ID: <cacwqscaoqt0zx9jm8ydtptq9joym3uturhyrfd9gglds2ud...@mail.gmail.com> Content-Type: text/plain; charset="utf-8" Hi, My system is FreeBSD 10.2 OpenSSL 1.0.2h lighttpd :lighttpd-1.4.23 Am trying to disable TLS1.0 and TLS1.1 through lighttpd.conf but am not sure of what is the equivalent cipher list to be used. I followed the below link and it didnt work for me. In case of Appweb Server,I was able to successfully disable TLS1.0 & Above and TLS1.1 & Above using SSLProtocol = "ALL -SSLV2 -SSLV3 -TLSV1" SSLProtocol = "ALL -SSLV2 -SSLV3 -TLSV1.1" But the same cipher is not working for lighttpd. Am very new to this and do not know how to proceed further. Would be great and appreciate if anyone can give me pointers on this. Please help. Thanks & Regards, Hema -- next part ------ An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20170327/02b8fb3b/attachment-0001.html> -- Message: 2 Date: Mon, 27 Mar 2017 08:25:16 + From: Raja ashok <raja.as...@huawei.com> To: "openssl-users@openssl.org" <openssl-users@openssl.org>, "openssl-...@openssl.org" <openssl-...@openssl.org> Subject: [openssl-users] In ssl3_write_bytes, some checks related to hanlding write failure are missing Message-ID: <FDFEA8C9B9B6BD4685DCC959079C81F5E19315C4@blreml509-mbx> Content-Type: text/plain; charset="gb2312" Hi, I feel there is a check missing in ssl3_write_bytes, in case of handling write failure. Consider SSL_write is called with 2 bytes buffer, then internally in ssl3_write_bytes we try to send it as two record (16384 and 3616). If TCP send failed for the second record then we store the states internally (wnum, wpend_tot and wpend_buf) and return back the result. Later application has to call SSL_write with same buffer, if it calls with different buffer of length 100 byte then we fail that in ssl3_write_bytes using the check (len < tot). But consider application calls with buffer of size 18000 bytes and SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is enabled. Then (len < tot) will not succeed as tot is 16384. Then it will call ssl3_write_pending to send the remaining 3616 record. If it succeeds we are incrementing tot, (tot += i). Now tot will have 2. Later there is a check (tot == len), this will not succeed. Then directly we are doing n = (len - tot), this will overflow and store a value close to 2^32 in n. Then it will cause out of bound access to the application buffer "buf". I hope we should have one more check (len < (tot + s->s3->wpend_tot)) before calling ssl3_write_pending. if ((len < tot) || (len < (tot + s->s3->wpend_tot))){ SSLerr(SSL_F_SSL3_WRITE_BYTES, SSL_R_BAD_LENGTH); return (-1); } Note : I am referring 1.0.2k version of OpenSSL. Regards, Ashok [Company_logo] Raja Ashok V K Huawei Technologies Bangalore, India http://www.huawei.com ??? This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email i
Re: [openssl-users] TLS leak for openssl 1.1.0b with libcurl 7.50.3
Those are curl functions, not openssl -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz From: ghanashyam satpathy [mailto:ghanashyam.satpa...@gmail.com] Sent: Saturday, March 25, 2017 10:05 AM To: openssl-users@openssl.org Subject: [openssl-users] TLS leak for openssl 1.1.0b with libcurl 7.50.3 I use libcurl 7.50.3 as statically linked in my application dll , along with openssl 1.1.0b also statically linked. The dll is dynamically loaded using LoadLibrary() and unloaded using FreeLibrary() inside application exe. I observed a TLS index is not getting freed which was allocated inside openssl. To narrow down the issue I have following exported function, which I call from my application exe. After FreeLibrary() I see the TLS leak through APplication verifier. extern "C" __declspec(dllexport) void CurlSetup() { curl_global_init(CURL_GLOBAL_DEFAULT); curl_global_cleanup(); return; } An early reply in this context is appreciated. Thanks -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21
Ok, thanks but the key is not in DER but COER, there are ways to transform it in DER. Thanks Best regards Christian Adja Il Mercoledì 22 Marzo 2017 20:08, Richard Levitte <levi...@openssl.org> ha scritto: In message <787239451.2530096.1490206287...@mail.yahoo.com> on Wed, 22 Mar 2017 18:11:27 + (UTC), Christian Adja <christian_a...@yahoo.it> said: christian_adja> Thanks for the response, but haven't the evp_pkey struct of the public christian_adja> key. I' ve only the an bytes string that i retrieved from IEEE cert christian_adja> with "PEM_bytes_read_bio()". Now in want to form the ec_key struct and christian_adja> then the evp_pkey struct. I'm not sure how IEEE certs differ from X.509 certs... if they don't, you're better off reading the cert with PEM_read_bio_X509() and extracting the public key with X509_get0_pubkey() or X509_get0_pubkey(). If IEEE certs differ in format, you must first know the exact byte content, where the public key is in there, make sure it's encoded in DER, and use d2i_EC_PUBKEY() to make a EC_KEY from those bytes. Cheers, Richard -- Richard Levitte levi...@openssl.org OpenSSL Project http://www.openssl.org/~levitte/ -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] unsigned char * public key to evp_pkey o ec_key
Good evening everybody,I need help about to transform public key (unsigned char *) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an ecdsaNistP256 in compressed form (compressedy1). The public key form in hex = |00|80|83|x point (32 bytes)| Thanks, Best Regards Il Mercoledì 22 Marzo 2017 18:48, "openssl-users-requ...@openssl.org" <openssl-users-requ...@openssl.org> ha scritto: Send openssl-users mailing list submissions to openssl-users@openssl.org To subscribe or unsubscribe via the World Wide Web, visit https://mta.openssl.org/mailman/listinfo/openssl-users or, via email, send a message with subject or body 'help' to openssl-users-requ...@openssl.org You can reach the person managing the list at openssl-users-ow...@openssl.org When replying, please edit your Subject line so it is more specific than "Re: Contents of openssl-users digest..." Today's Topics: 1. Re: openssl-users Digest, Vol 28, Issue 21 (Christian Adja) -- Message: 1 Date: Wed, 22 Mar 2017 17:48:08 + (UTC) From: Christian Adja <christian_a...@yahoo.it> To: "openssl-users@openssl.org" <openssl-users@openssl.org> Subject: Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21 Message-ID: <776809560.1321367.1490204889...@mail.yahoo.com> Content-Type: text/plain; charset="utf-8" Good evening everybody,I need help about to transform public key (unsigned char *) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an ecdsaNistP256 in compressed form (compressedy1). The public key form in hex = |00|80|83|x point (32 bytes)| Thanks, Best Regards Il Mercoled? 15 Marzo 2017 22:23, "openssl-users-requ...@openssl.org" <openssl-users-requ...@openssl.org> ha scritto: Send openssl-users mailing list submissions to ??? openssl-users@openssl.org To subscribe or unsubscribe via the World Wide Web, visit ??? https://mta.openssl.org/mailman/listinfo/openssl-users or, via email, send a message with subject or body 'help' to ??? openssl-users-requ...@openssl.org You can reach the person managing the list at ??? openssl-users-ow...@openssl.org When replying, please edit your Subject line so it is more specific than "Re: Contents of openssl-users digest..." Today's Topics: ? 1. Request for adding new ciphers (Christian Adja) ? 2. Re: Request for adding new ciphers (Matt Caswell) ? 3. Generating dh parameters multithreaded? (Joseph Southwell) ? 4. Re: Generating dh parameters multithreaded? (Salz, Rich) ? 5. OpenSSL Certificate Cross Signing (Moritz Wirth) ? 6. Re: PKCS#7 (val?ry) ? 7. Re: Generating dh parameters multithreaded? (Joseph Southwell) ? 8. Re: Generating dh parameters multithreaded? (Salz, Rich) -- Message: 1 Date: Wed, 15 Mar 2017 18:03:44 +0000 (UTC) From: Christian Adja <christian_a...@yahoo.it> To: "openssl-users@openssl.org" <openssl-users@openssl.org> Subject: [openssl-users] Request for adding new ciphers Message-ID: <1576557894.1332584.1489601024...@mail.yahoo.com> Content-Type: text/plain; charset="utf-8" Hi everyone, Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? I tried adding in the file tls1.h??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM??? 0x0300C0AC ??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM??? 0x0300C0AD And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c. There are no way to make it works. It continue to give me? error: ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 thanks. -- next part -- An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/5ea926a1/attachment-0001.html> ------ Message: 2 Date: Wed, 15 Mar 2017 18:18:52 + From: Matt Caswell <m...@openssl.org> To: openssl-users@openssl.org Subject: Re: [openssl-users] Request for adding new ciphers Message-ID: <e507eba7-b0c6-d85a-78aa-2af36c2e4...@openssl.org> Content-Type: text/plain; charset=windows-1252 On 15/03/17 18:03, Christian Adja via openssl-users wrote: > Hi everyone, > > Someone can help for adding the ciphersuite " > ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in > openssl? > I tried adding in the file tls1.h >? ? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM? ? ? ? ? ? 0x0300C0AC >? ? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM? ? ? ? ? ? 0x0300C0AD > > And modifing the file? ssl_ciph.c the functions >? ? ssl_load_ciphers() ... > And modifing the file evp_cipher
Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21
Good evening everybody,I need help about to transform public key (unsigned char *) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an ecdsaNistP256 in compressed form (compressedy1). The public key form in hex = |00|80|83|x point (32 bytes)| Thanks, Best Regards Il Mercoledì 15 Marzo 2017 22:23, "openssl-users-requ...@openssl.org" <openssl-users-requ...@openssl.org> ha scritto: Send openssl-users mailing list submissions to openssl-users@openssl.org To subscribe or unsubscribe via the World Wide Web, visit https://mta.openssl.org/mailman/listinfo/openssl-users or, via email, send a message with subject or body 'help' to openssl-users-requ...@openssl.org You can reach the person managing the list at openssl-users-ow...@openssl.org When replying, please edit your Subject line so it is more specific than "Re: Contents of openssl-users digest..." Today's Topics: 1. Request for adding new ciphers (Christian Adja) 2. Re: Request for adding new ciphers (Matt Caswell) 3. Generating dh parameters multithreaded? (Joseph Southwell) 4. Re: Generating dh parameters multithreaded? (Salz, Rich) 5. OpenSSL Certificate Cross Signing (Moritz Wirth) 6. Re: PKCS#7 (val?ry) 7. Re: Generating dh parameters multithreaded? (Joseph Southwell) 8. Re: Generating dh parameters multithreaded? (Salz, Rich) -- Message: 1 Date: Wed, 15 Mar 2017 18:03:44 + (UTC) From: Christian Adja <christian_a...@yahoo.it> To: "openssl-users@openssl.org" <openssl-users@openssl.org> Subject: [openssl-users] Request for adding new ciphers Message-ID: <1576557894.1332584.1489601024...@mail.yahoo.com> Content-Type: text/plain; charset="utf-8" Hi everyone, Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? I tried adding in the file tls1.h??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM??? 0x0300C0AC ??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM??? 0x0300C0AD And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c. There are no way to make it works. It continue to give me? error: ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 thanks. -- next part ------ An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/5ea926a1/attachment-0001.html> -- Message: 2 Date: Wed, 15 Mar 2017 18:18:52 + From: Matt Caswell <m...@openssl.org> To: openssl-users@openssl.org Subject: Re: [openssl-users] Request for adding new ciphers Message-ID: <e507eba7-b0c6-d85a-78aa-2af36c2e4...@openssl.org> Content-Type: text/plain; charset=windows-1252 On 15/03/17 18:03, Christian Adja via openssl-users wrote: > Hi everyone, > > Someone can help for adding the ciphersuite " > ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in > openssl? > I tried adding in the file tls1.h > # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM 0x0300C0AC > # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM 0x0300C0AD > > And modifing the file ssl_ciph.c the functions > ssl_load_ciphers() ... > And modifing the file evp_cipher.c and sssl_locl.c > and finaly ssl_algs.c. > > There are no way to make it works. It continue to give me error: > ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 These ciphersuites already exist in OpenSSL (from version 1.1.0). Matt ------ Message: 3 Date: Wed, 15 Mar 2017 14:18:38 -0400 From: Joseph Southwell <jsouthw...@serengeti.com> To: openssl-users@openssl.org Subject: [openssl-users] Generating dh parameters multithreaded? Message-ID: <56015584-6edc-4bd6-aa21-f27835281...@serengeti.com> Content-Type: text/plain; charset="utf-8" On any new install of our software we generate new dh parameters as follows? DH *dh = DH_new(); !DH_generate_parameters_ex(dh, 2048, 2, NULL); int codes = 0; DH_check(dh, ); DH_generate_key(dh); It takes a long time. Is there some way to have it use all available cores instead of just the one? -- next part -- An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/abdcfd11/attachment-0001.html> -- Message: 4 Date: Wed, 15 Mar 2017 18:21:05 + From: "Salz, Rich" <rs...@akamai.com> To: "openssl-users@openssl.org" <openssl-users@openssl.org> Subject: Re: [openssl-users] Generating dh parameters multithreaded? Message-ID: <9ff829cd17f74e4a910ca067196f7...@usma1ex-dag1mb
Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21
cheers, Thanks for the response, but haven't the evp_pkey struct of the public key. I' ve only the an bytes string that i retrieved from IEEE cert with "PEM_bytes_read_bio()". Now in want to form the ec_key struct and then the evp_pkey struct. Thanks Best regards Christian Adja Il Mercoledì 22 Marzo 2017 19:01, Ethan Rahn <ethan.r...@gmail.com> ha scritto: Couldn't you just use EVP_PKEY_get1_EC_KEY? https://www.openssl.org/docs/man1.0.2/crypto/EVP_PKEY_get1_EC_KEY.html Cheers, Ethan On Wed, Mar 22, 2017 at 10:48 AM, Christian Adja via openssl-users <openssl-users@openssl.org> wrote: Good evening everybody,I need help about to transform public key (unsigned char *) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an ecdsaNistP256 in compressed form (compressedy1). The public key form in hex = |00|80|83|x point (32 bytes)| Thanks, Best Regards Il Mercoledì 15 Marzo 2017 22:23, "openssl-users-request@ openssl.org" <openssl-users-request@ openssl.org> ha scritto: Send openssl-users mailing list submissions to openssl-users@openssl.org To subscribe or unsubscribe via the World Wide Web, visit https://mta.openssl.org/ mailman/listinfo/openssl-users or, via email, send a message with subject or body 'help' to openssl-users-request@openssl. org You can reach the person managing the list at openssl-users-owner@openssl. org When replying, please edit your Subject line so it is more specific than "Re: Contents of openssl-users digest..." Today's Topics: 1. Request for adding new ciphers (Christian Adja) 2. Re: Request for adding new ciphers (Matt Caswell) 3. Generating dh parameters multithreaded? (Joseph Southwell) 4. Re: Generating dh parameters multithreaded? (Salz, Rich) 5. OpenSSL Certificate Cross Signing (Moritz Wirth) 6. Re: PKCS#7 (val?ry) 7. Re: Generating dh parameters multithreaded? (Joseph Southwell) 8. Re: Generating dh parameters multithreaded? (Salz, Rich) -- -- -- Message: 1 Date: Wed, 15 Mar 2017 18:03:44 + (UTC) From: Christian Adja <christian_a...@yahoo.it> To: "openssl-users@openssl.org" <openssl-users@openssl.org> Subject: [openssl-users] Request for adding new ciphers Message-ID: <1576557894.1332584. 1489601024...@mail.yahoo.com> Content-Type: text/plain; charset="utf-8" Hi everyone, Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? I tried adding in the file tls1.h??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 128_CCM??? 0x0300C0AC ??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 256_CCM??? 0x0300C0AD And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c. There are no way to make it works. It continue to give me? error: ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 thanks. -- next part -- An HTML attachment was scrubbed... URL: <http://mta.openssl.org/ pipermail/openssl-users/ attachments/20170315/5ea926a1/ attachment-0001.html> ------ Message: 2 Date: Wed, 15 Mar 2017 18:18:52 + From: Matt Caswell <m...@openssl.org> To: openssl-users@openssl.org Subject: Re: [openssl-users] Request for adding new ciphers Message-ID: Content-Type: text/plain; charset=windows-1252 On 15/03/17 18:03, Christian Adja via openssl-users wrote: > Hi everyone, > > Someone can help for adding the ciphersuite " > ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in > openssl? > I tried adding in the file tls1.h > # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 128_CCM 0x0300C0AC > # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 256_CCM 0x0300C0AD > > And modifing the file ssl_ciph.c the functions > ssl_load_ciphers() ... > And modifing the file evp_cipher.c and sssl_locl.c > and finaly ssl_algs.c. > > There are no way to make it works. It continue to give me error: > ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 These ciphersuites already exist in OpenSSL (from version 1.1.0). Matt -- Message: 3 Date: Wed, 15 Mar 2017 14:18:38 -0400 From: Joseph Southwell <jsouthw...@serengeti.com> To: openssl-users@openssl.org Subject: [openssl-users] Generating dh parameters multithreaded? Message-ID: <56015584-6EDC-4BD6-AA21- f27835281...@serengeti.com> Content-Type: text/plain; charset="utf-8" On any new install of our software we generate new dh parameters as follows? DH *dh = DH_new(); !DH_generate_parameters_ex(dh, 2048, 2, NULL); int codes = 0; DH_check(dh, ); DH_generate_key(dh); It takes a long time. Is there some way to have it us
Re: [openssl-users] One question about RSA decrypt with private key
> For encrypting user data such as user's password, could I use PKCS#1 or OAEP > padding mode? If you do not know what you are doing, use the defaults. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] PKCS#7
> Say someone would be able to gather several clear text AES keys and their > respective asymmetrically encrypted RSA blocks. Would it weakens the security > of the RSA key pair ? I mean could it be easier for someone using that > information to brute force an RSA key pair ? No -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Is crypto library thread-safe?
> However, is crypto library thread-safe? Check out this blog entry: https://www.openssl.org/blog/blog/2017/02/21/threads/ -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Request for adding new ciphers
Hi everyone, Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? I tried adding in the file tls1.h # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM 0x0300C0AC # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM 0x0300C0AD And modifing the file ssl_ciph.c the functions ssl_load_ciphers() ... And modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c. There are no way to make it works. It continue to give me error: ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420 thanks. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Generating dh parameters multithreaded?
> It takes a long time. Is there some way to have it use all available cores > instead of just the one? You'll have to write the code to do that parallelism yourself. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Generating dh parameters multithreaded?
> Are you suggesting that I should modify openssl myself to expose that > functionality or are suggesting that there is a way to do that given the > already > exposed functionality? If it is the latter could you point me in the right > direction? OpenSSL code does not do what you want. You'll have to write it -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] [openssl-dev] verify depth behavior change from 1.0.2 to 1.1.0?
Ben Kaduk: Do we know the values that are being passed to SSL_CTX_set_Verify_depth() match the -verify_depth argument, or do they differ? If they differ, do identical arguments to the function behave the same in 1.1.0 and 1.0.2? Viktor: What we’re getting at here, is that this appears to be a potentially significant behavioral change. We want to understand it better. -- -Todd Short // tsh...@akamai.com<mailto:tsh...@akamai.com> // "One if by land, two if by sea, three if by the Internet." On Apr 3, 2017, at 4:43 PM, Viktor Dukhovni <openssl-us...@dukhovni.org<mailto:openssl-us...@dukhovni.org>> wrote: On Apr 3, 2017, at 4:26 PM, Benjamin Kaduk <bka...@akamai.com<mailto:bka...@akamai.com>> wrote: There was a fair amount of churn in x509_vfy.c with the inclusion of the DANE stuff and whatnot, so it's not immediately clear to me when this change actually happened. I think there are good arguments for the current 1.1.0 behavior and it doesn't really make sense to try to change back to the historical behavior, but it would be good to know when the change actually happened and that it is/was a known change. Ideally we could also document the different behavior between 1.0.x and 1.1.0 better; any thoughts about where to do so? https://www.openssl.org/docs/man1.1.0/apps/verify.html -verify_depth num Limit the certificate chain to num intermediate CA certificates. A maximal depth chain can have up to num+2 certificates, since neither the end-entity certificate nor the trust-anchor certificate count against the -verify_depth limit. https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_verify_depth.html SSL_CTX_set_verify_depth() sets the maximum depth for the certificate chain verification that shall be allowed for ctx. (See the BUGS section.) ... BUGS The certificate verification depth set with SSL[_CTX]_verify_depth() stops the verification at a certain depth. The error message produced will be that of an incomplete certificate chain and not X509_V_ERR_CERT_CHAIN_TOO_LONG as may be expected. The 1.0.2 behaviour was under-documented and somewhat broken. This was fixed in 1.1.0. Unfortunately, the SSL_CTX_set_verify_depth(3) was not brought up to date, contributes welcome: https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_set_verify_depth.html -- Viktor. -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] [openssl-dev] verify depth behavior change from 1.0.2 to 1.1.0?
On 04/04/2017 10:39 AM, Viktor Dukhovni wrote: >> On Apr 4, 2017, at 10:41 AM, Short, Todd via openssl-users >> <openssl-users@openssl.org> wrote: >> >> Ben Kaduk: >> >> Do we know the values that are being passed to SSL_CTX_set_verify_depth() >> match the -verify_depth argument, or do they differ? If they differ, do >> identical arguments to the function behave the same in 1.1.0 and 1.0.2? > The "-verify_depth" argument to verify(1) just calls > SSL_CTX_set_verify_depth(3) > with the given depth value. In OpenSSL 1.1.0, this sets a limit on the > intermediate CA count and returns sensible errors when the depth limit is > exceeded. (Pedantic note: the apps call X509_VERIFY_PARAM_set_depth() directly, and s_client goes on to use SSL_CTX_set1_param().) But the answer to the actual question asked is the same, the depth argument used for verification is just the one passed on the command line. Behavior differences stem in the library. >> Viktor: >> >> What we’re getting at here, is that this appears to be a potentially >> significant behavioral change. We want to understand it better. > The code no longer returns misleading errors, and is better documented > in verify(3), but it seems I missed additional requisite documentation > updates in SSL_CTX_set_verify_depth(3). It would be great if someone > volunteered to complete the documentation update. > I have it on my list of things to look at if there is free time available (which is hardly guaranteed). -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] ssl_method_st not defined
No, the functions you want aren’t provided right now. What are you trying to do? Why are you modifying the session, outside of the TLS protocol? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] ssl_method_st not defined
>>in my case, i need to initialize the SSL , and set parameters as same as client and server (depending on direction ) and call OpenSSL to decrypt the data. >>before openSSL 1.1.0 as all member variables could be set, it was easy task, >> now i do face issues with ssl_session and ssl_session->s3 Those functions aren’t present. A pull request to add them, and document them, would be useful and would go into 1.1.0 an d master. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Escaped Issuer/Subject
> I thought about escaping regarding DN itself (LDAP DN). Look up the -nameopt flag in, say, x509.pod Then if you need C code, trace through what apps/x509.c does. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] EVP Functions
You need to learn what CBC mode is. Block ‘n’ feeds into block ‘n+1’ The behavior you describe is not wrong. Blocks are padded, so only read outlen bytes. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Multithreading: Global locks causing bottleneck in parallel SSL_write calls
On 04/12/2017 05:54 AM, dipakgaigole wrote: > Hi, > > I have a windows multi-threaded SSL server application which handles > each client request in a new thread. The Server handles different > types of requests. One of the request type is like “send file” where > server thread has to read a file from local filesystem and send the > content to the client. > Server configurations: > FIPS: Enabled > SSL Protocol: TLSv1.2 > Cipher: AES256-SHA The OpenSSL PRNG story is currently not so great, yes. But maybe you should try without FIPS, and also with a different cipher? AES256-SHA is both CBC and SHA1, neither of which is really a current best practice. -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Certificate chain validation
No, you must have a chain up to a local trust anchor. You can install the intermediate in your trust store. -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz From: Lei Kong [mailto:leik...@msn.com] Sent: Thursday, April 20, 2017 9:38 PM To: openssl-users@openssl.org Subject: [openssl-users] Certificate chain validation When validating a certificate issued by an intermediate certificate authority, I noticed that I need to install both the root and the intermediate CA certificate locally (with update-ca-certificates on ubuntu 16.04). Verification fails if only root CA cert is installed (intermediate is not installed), is this expected behavior? Why do I need to install intermediate CA cert locally? Locally installed root CA cert is not enough to validate intermediate CA cert? Is it possible to make chain validation work with only root CA cert installed locally? Thanks. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] SSL_shutdown return error when close in init
> The OpenSSL documentation makes it clear > that you must keep calling the same asynchronous function with the same > parameters until the async job has completed. Is there a way we can (relatively cheaply) check for that type of programming error and return an "in progress on another op" error? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] EVP_CIPHER_CTX array not compiling
>#define OTEXT_AES_KEY_INIT(ctx, buf) { \ > EVP_CIPHER_CTX_init(ctx); \ > EVP_EncryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, buf, ZERO_IV); \ > } Most of the datatypes are now opaque. This means you can't have an EVP_CIPHER_CTX object, but instead a pointer to it. Don't call the init function, call the new function. And then that has rippling changes in your code. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Code heatlh delayed a week
We are still reviewing several PR's from the previous code health, which was about converting tests to use the new test framework. With this extended time period, we'll have ended up converting almost all the tests, which is great. We'll announce the next project toward the end of the week. Thanks for all your participation, folks! -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] scripting creating a cert
Yes there are easier ways to do this. Set up a conf file and use it (via the -conf flag). You can use env vars, set default values, and so on. Look at the config manpages, https://www.openssl.org/docs/manmaster/man5/ For a fuller example, see https://www.openssl.org/~rsalz/pki.tgz PS -- find me in Chicago and I can answer questions, Robert :) -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] [openssl-dev] Openssl 1.0.2 stable SNAP 20170309 issue
Already fixed. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] [AES-GCM] TLS packet nounce_explicit overflow
No, it does not do this automatically. if the nounce _explicit overflows or overlaps , then does openssl code handles it (atleast by initiating renegotiation )? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] PKCS#7
> If so, would it be possible in principle to decrypt an encrypted PKCS#7 > envelope only knowing which AES key was used ? Yes. But maybe not with the openssl api's :) -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Extracting Handshake Information
> Is there a way in openssl we can extract the protocol(TLS/DTLS ) handshake > information, like in clienthello, the protocol version, ciphersuites > offered, Random, session id etc. Look at the code in apps/s_client and apps/s_server and see what it prints in various debug modes. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] error making Private RSA
> > My source can be viewed at: mt-umunhum-wireless.net/Sources/rsa/rsa.c Gives a 403. > > My main guess is that your allocation for the PEM buffer is too small > > -- is key/key_len pointing to a static buffer? > > It points to a char string Not sure what that means. Please post your code here. It should be something like char key[2048]; int keylen = sizeof key; -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] openssl-compat patch for OpenSSL 1.0.2 and below?
On 04/02/2017 07:42 PM, Jeffrey Walton wrote: > I was looking at Kurt Roeckx 's patches for OpenSSH at > https://github.com/openssh/openssh-portable/pull/48/files. See > libcrypto-compat.h and libcrypto-compat.c. > > Are the source files distributed by OpenSSL? If so, where is the download? > > If not, can the OpenSSL project consider adding them. They are very > useful for managing projects that depend on older and newer OpenSSL > libraries. OpenSSL taking on the responsibility would help ensure > consistency and quality. > The topic of backwards-compat headers has come up a few times previously on the list; with the resolution being a call for some external contributor to host and maintain them. So, no, OpenSSL does not distribute such things. -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Query regarding upgrading TLS compatibility
On 04/03/2017 04:42 AM, Hegde, Harsha wrote: > > Hi, > > I have an query regarding TLS compatibility used in my application. > Currently we are using TLS1.2 to connect to a third party sever. Is > there any way to always use the highest TLS available version without > modifying or recompiling the application code whenever there is any > new version of TLS released. > > The closest you can come is to use TLS_method() (or the client- or server-specific version of it), which will prefer the highest version supported by the library, but also be able to use older versions if needed in order to interoperate with the peer. It's not entirely clear whether your question was about restricting to specifically the highest version, to the exclusion of older versions. -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] openvpn 2.4.1 with gost
Hello. I have just build openvpn with openvpn-build with these versions: OPENSSL_VERSION="${OPENSSL_VERSION:-1.0.2k}" PKCS11_HELPER_VERSION="${PKCS11_HELPER_VERSION:-1.11}" LZO_VERSION="${LZO_VERSION:-2.10}" TAP_WINDOWS_VERSION="${TAP_WINDOWS_VERSION:-9.21.2}" OPENVPN_VERSION="${OPENVPN_VERSION:-2.4.1}" OPENVPN_GUI_VERSION="${OPENVPN_GUI_VERSION:-11}" Compilation success, no problem. i modified openssl.cnf to include engine gost. openssl_conf = openssl_def [ openssl_def ] engines = engine_section [ engine_section ] gost = gost_section [gost_section] default_algorithms=ALL engine_id=gost openssl ciphers | tr ":" "\n" | grep GOST GOST2001-GOST89-GOST89 GOST94-GOST89-GOST89 openssl list-message-digest-algorithms | grep gost gost-mac md_gost94 gost-mac md_gost94 openssl shows me GOST. -- gost-server.ovpn - dev tap engine gost auth gost-mac cipher gost89 tls-cipher GOST2001-GOST89-GOST89 #comp-lzo yes ca ca.crt cert server.crt key server.key dh dhparam.pem server 10.0.0.0 255.255.255.0 keepalive 10 120 proto tcp socket-flags TCP_NODELAY persist-key persist-tun openvpn gost-server.ovpn says me -- Initializing OpenSSL support for engine 'gost' -- Deprecated TLS cipher name 'GOST2001-GOST89-GOST89', please use IANA name 'TLS_GOSTR341001_WITH_28147_CNT_IMIT' -- OpenSSL: error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match -- Failed to set restricted TLS cipher list: GOST2001-GOST89-GOST89 -- Exiting due to fatal error Please help with this problem -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Code health tuesday is back!
After a short summer vacation, our biweekly code health Tuesday is back! Our topic this time is ... documentation. There have been many updates to the manpages in the past few weeks, typo fixes, additional clarifications, and so on. We hope that folks will be emboldened to help fill in the gaps, but any PR to make things better will help. Please submit your fixes by Tuesday; if you can't add a label, put 'code health' somewhere in the commit message. Please have a CLA onfile; if your commit is trivial and not copyrightable, put "CLA: trivial" in the commit message. If you have a whole bunch of trivial fixes, put them in one PR (separate commits if you want). Make sure any changes pass find-doc-nits (a script in util). You can also use that script to list places where documentation is missing: ; ./util/find-doc-nits -u | fgrep '#' # Found 4373 in util/libcrypto.num # Found 1724 missing from util/libcrypto.num # Found 464 in util/libssl.num # Found 64 missing from util/libssl.num # Checking macros (approximate) # Found 246 macros missing (not all should be documnted) Thanks for all your help in improving OpenSSL! -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] How to get a bye or word from BIGNUM in OpenSSL 1.1?
> It would be nice if the OpenSSL devs ate their own dogfood and suffered > that inefficient crap. I would wager that crap would change. There is a price to be paid with opaque structures. In most cases the benefits are worth it. I'm curious why you want that. A small PR with doc and function should be easy enough. Are you using BN as an extensible byte array? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Personal CA: are cert serial numbers critical?
➢ So, in summary, do I need to ensure cert serial numbers are unique for my CA? Why would you not? The specifications require it, but those specifications are for interoperability. If nobody is ever going to see your certs, then who cares what’s in them? -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Core dump on DSA_free -- libssl.so.1.0.0
Thanks for the help, DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize); bool bRet = false; if (pDSA) { bRet = DSA_verify(0, signature, 20, (BYTE *) pFile, dwSize, (DSA *) pDSA) == 1 ? true : false; DSA_free(pDSA); } Jason -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0
> DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize); Where and how is pKey set? Not that the manpage says it's incremented to point *past* the object, so you need something like unsigned char data = .whatever your data source is . unsigned char *pKey = data and then use in your call -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Displaying subjectAtlName othername content
➢ Is there anyway to display the basic ASN.1 structure here so I can see what was stored in the cert? openssl asn1parse -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] SSL_CTX_set_msg_callback does not invoke for received change_cipher_spec
On 08/14/2017 11:30 PM, Vakul Garg wrote: > > Hi > > > > I am using openssl s_server and s_client with ‘-msg’ option to track > tls1.2 records being exchanged. > > I notice that while transmitted change_cipher_spec record gets printed. > > But the reception of change_cipher_spec record is not reported. > > > > For the received change_cipher_spec record, the callback (registered > using SSL_set_msg_callback_arg) gets invoked only for record header, > but not for the record content. > > So there is no callback for received SSL3_RT_CHANGE_CIPHER_SPEC. For > the transmitted change_cipher_spec record, things are fine. > There is no variable content in a ChangeCipherSpec message -- a single byte of value 1. Are you trying to argue that the callback still ought to be invoked out of some philosophical sense of consistency? In any case, if I remember correctly, ChangeCipherSpec is processed at a very low layer and isn't propagated up to the layer that invokes the message callback, and if one looks at the tradeoff between extra complexity to propagate it up versus not having a message callback event for it, there are some reasonable reasons to prefer the status quo. > > > Further, message callback invocation is correct for DTLS1.2 case as well. > > (Just with respect to ChangeCipherSpec?) -Ben -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Does openssl pick low level interface or high level interface to do encrypt?
What OpenSSL does is not necessarily obvious. The INSTALL document talks about the no-asm configuration option. Details about what the assembler code does in terms of optimization are only available by reading the source code comments in the various Perl files that generate the assembler, mostly. On x86, the assembly code uses the CPUID instruction (see the OPENSSL_ia32cap.pod manpage) to determine if various instructions (AES, SSE, MMX, etc) are available and will use them if so. For other processors, similar tests are performed if at all possible. I have added this to the FAQ -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz From: - JinsongJi [mailto:jjsb...@hotmail.com] Sent: Wednesday, August 09, 2017 9:09 AM To: openssl-users@openssl.org Subject: [openssl-users] Does openssl pick low level interface or high level interface to do encrypt? Hi, For one simple operation: openssl enc -aes-256-cbc -salt -in foo.txt -out foo.enc Does openssl pick classic implementation or AES-NI implementation to do this encrypt? Does any user/application always pick classic implementation for AES operation regardless of AES-NI improves speed much? Is there any document about this interface selection? Thanks, Jinsong -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Fwd: Does TLSv1.2 support 3DES
> May be my email subject is a little confusing. I'll put my question directly. > > If I configure my server with the string "HIGH+TLSv1.2:!MD5:!SHA1", will it > support 3DES? No, as I showed. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0
Thanks for look into this, void * pKey = LockResource(hHandle); The code works most of the time, only occasionally generates exception and Not sure why on DSA_free(pDSA); On Fri, Aug 11, 2017 at 2:57 PM, Salz, Rich <rs...@akamai.com> wrote: > > DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , > dwKeySize); > > Where and how is pKey set? Not that the manpage says it's incremented to > point *past* the object, so you need something like > unsigned char data = .whatever your data source is . > unsigned char *pKey = data > and then use in your call > > -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0
Please read what I wrote. The d2i functions *modify the pointer they are given.* You have to give them a temporary copy. -- Senior Architect, Akamai Technologies Member, OpenSSL Dev Team IM: richs...@jabber.at Twitter: RichSalz From: Jason Qian [mailto:jq...@tibco.com] Sent: Friday, August 11, 2017 3:14 PM To: Salz, Rich <rs...@akamai.com> Cc: openssl-users@openssl.org Subject: Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0 Thanks for look into this, void * pKey = LockResource(hHandle); The code works most of the time, only occasionally generates exception and Not sure why on DSA_free(pDSA); On Fri, Aug 11, 2017 at 2:57 PM, Salz, Rich <rs...@akamai.com<mailto:rs...@akamai.com>> wrote: > DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize); Where and how is pKey set? Not that the manpage says it's incremented to point *past* the object, so you need something like unsigned char data = .whatever your data source is . unsigned char *pKey = data and then use in your call -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] 802.1AR certificate generation and the config file
> Given these supported names, what goes into the config file to create a SAN > without having to specify it on the command line? In the certificate extensions section you do something like: subjectAltName = dns:www.example.com, IP:127.0.0.1 and so on. The "pki.tgz" > And further it seems you are saying there is no support for HMN at all. Right. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] 802.1AR certificate generation and the config file
> What is the procedure to get it added. RFC 4108 has been around for a while, > as has 802.1AR-2009. Simplest way is to (get someone to) write the code and make a github pull requests. Next way is to post a patch. Next way is to open an issue and hope someone gets around to it. > Though I am assuming from a prior comment that even if it were added > today, it would not be available until the 1.1.1 release? Right. But someone could always backport the changes to their own 1.1.0 release. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] 802.1AR certificate generation and the config file
> My challenge comes to subjectAltName and its subfield > hardwareModuleName > per RFC 4108. I guess I am not 'getting' the subjectAltName section of > 'man x509v3_config'. Not all forms of SAN names are supported. If you look in include/openssl/x509v3.h you see the following: # define GEN_OTHERNAME 0 # define GEN_EMAIL 1 # define GEN_DNS 2 # define GEN_X4003 # define GEN_DIRNAME 4 # define GEN_EDIPARTY5 # define GEN_URI 6 # define GEN_IPADD 7 # define GEN_RID 8 crypto/x509v3/v3_alt.c you can find details and corner-case information. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] OpenSSL used in our network engine (SLikeNet)
➢ I'd just like to quickly reach out to let you know that we released a new (open source) network engine in which we also utilize the OpenSSL library and want to thank you for the work you put into OpenSSL. Congratulations. Please post a link, especially since it is open source! -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Default Diffie Hellman Parameters
X25519 does not use DH parameters. If you don’t set the parameters with a callback, or generate them and tell openssl to use them, then EDH will not be used. Not that EDH is *not* the same as ECDHE. Don’t use DH, use X25519, for a number of reasons. Search “25519” to find more. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Openssl 1.1.0f support for building Openssh7.2p2 and above
I will check with OpenSSH team on this. Thanks for the info. Regards, Sravani On Mon, Jul 10, 2017 at 12:05 PM, Jeffrey Walton <noloa...@gmail.com> wrote: > On Mon, Jul 10, 2017 at 2:01 AM, Sravani Maddukuri via openssl-users > <openssl-users@openssl.org> wrote: > > > > Is there any plans in the future to get the support of OpenSSL 1.1.0 for > > OpenSSH? > > You should ask the OpenSSH folks. > > Jeff > -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Issue with TLS1.3 and s_time
In TLS 1.3 the “time” field went away. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users