答复: How run the specific test case //答复: How to run a simple test case

2022-02-09 Thread Chenxinping via openssl-users
Thanks for the  information.
NCONF_load  will failed with “./test/ssl_test 
./test-runs/test_ssl_new/17-renegotiate.cnf.default”. As strdup will failed in 
case of “${ENV::TEST_CERTS_DIR}/*” .
Maybe the ENV should be setted before run the test case.

Error information:
# ERROR: (int) 'NCONF_load(conf, test_get_argument(0), NULL) > 0' failed @ 
test/ssl_test.c:550
# [0] compared to [0]
# ERROR:  @ test/ssl_test.c:553

发件人: Dr. Matthias St. Pierre [mailto:matthias.st.pie...@ncp-e.com]
发送时间: 2022年2月9日 23:31
收件人: Chenxinping ; openssl-users@openssl.org
主题: RE: How run the specific test case //答复: How to run a simple test case

Ah ok, maybe I slightly misunderstood your question. From your transcript below 
I infer that the testsuite ran the perl script `generate_ssl_tests.pl`, which 
generated some test files an then ran the binary `ssl_test` as follows:

./test/ssl_test ./test-runs/test_ssl_new/17-renegotiate.cnf.default

If the testfile `./test-runs/test_ssl_new/17-renegotiate.cnf.default` still 
exists, you should be able to debug the program in gdb with the aid of the 
`wrap.pl` helper script as follows:

./util/wrap.pl  gdb –args ./test/ssl_test 
./test-runs/test_ssl_new/17-renegotiate.cnf.default


Hope that helps,

Matthias





[NCP engingeering GmbH]

Dr. Matthias St. Pierre

Tech Lead Cryptography
matthias.st.pie...@ncp-e.com<mailto:matthias.st.pie...@ncp-e.com>
Phone: +49 911 9968-0
www.ncp-e.com<http://www.ncp-e.com>


Follow us on:
 Facebook<https://www.facebook.com/NCPengineering> | 
Twitter<https://twitter.com/NCP_engineering> | 
Xing<https://www.xing.com/companies/ncpengineeringgmbh> | 
YouTube<https://www.youtube.com/user/NCPengineeringGmbH> | 
LinkedIn<http://www.linkedin.com/company/ncp-engineering-inc.?trk=cws-cpw-coname-0-0>

Headquarters Germany: NCP engineering GmbH • Dombuehler Str. 2 • 90449 • 
Nuremberg
North American HQ: NCP engineering Inc. • 601 Cleveland Str., Suite 501-25 • 
Clearwater, FL 33755

Authorized representatives: Peter Soell, Patrick Oliver Graf, Beate Dietrich
Registry Court: Lower District Court of Nuremberg
Commercial register No.: HRB 7786 Nuremberg, VAT identification No.: DE 
133557619

This e-mail message including any attachments is for the sole use of the 
intended recipient(s) and may contain privileged or confidential information. 
Any unauthorized review, use, disclosure or distribution is prohibited. If you 
are not the intended recipient, please immediately contact the sender by reply 
e-mail and delete the original message and destroy all copies thereof.



From: Chenxinping mailto:kan.c...@huawei.com>>
Sent: Wednesday, February 9, 2022 4:10 PM
To: Dr. Matthias St. Pierre 
mailto:matthias.st.pie...@ncp-e.com>>; 
openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: How run the specific test case //答复: How to run a simple test case

Thanks for your information,  simple test case means some specific test case.
Some  error reported from some specific test case  in case of “make V=1 
TESTS='test_ssl_new*' test”, the error information could not help to local the 
issue, So I need run and debug the specific test case.

Error information:
../../util/wrap.pl /usr/bin/perl -I ../../util/perl 
../../test/generate_ssl_tests.pl ../../test/ssl-tests/17-renegotiate.cnf.in 
none > 17-renegotiate.cnf.none => 0
ok 1 - Getting output from generate_ssl_tests.pl.
ok 2 - Comparing generated 17-renegotiate.cnf.none with 
../../test/ssl-tests/17-renegotiate.cnf.
# Subtest: ../../test/ssl_test
1..1
# Subtest: test_handshake
1..17
ok 1 - iteration 1
ok 2 - iteration 2
ok 3 - iteration 3
ok 4 - iteration 4
ok 5 - iteration 5
ok 6 - iteration 6
ok 7 - iteration 7
ok 8 - iteration 8
ok 9 - iteration 9
ok 10 - iteration 10
ok 11 - iteration 11
# ERROR: (int) 'peer->status == PEER_RETRY' failed @ 
test/helpers/handshake.c:868
# [2] compared to [1]
# ERROR: (int) 'result->result == test_ctx->expected_result' failed 
@ test/ssl_test.c:36
# [3] compared to [1]
# INFO:  @ test/ssl_test.c:37
# ExpectedResult mismatch: expected ServerFail, got InternalError.
# OPENSSL_TEST_RAND_ORDER=1644408281
not ok 12 - iteration 12
ok 13 - iteration 13
# ERROR: (int) 'peer->status == PEER_RETRY' failed @ 
test/helpers/handshake.c:868
# [2] compared to [1]
# ERROR: (int) 'result->result == test_ctx->expected_result' failed 
@ test/ssl_test.c:36
# [3] compared to [2]
# INFO:  @ test/ssl_test.c:37
# ExpectedResult mismatch: expected ClientFail, got InternalError.
# OPENSSL_TEST_RAND_ORDER=1644408281
not ok 14 - iteration 14

答复: How run the specific test case //答复: How to run a simple test case

2022-02-10 Thread Chenxinping via openssl-users
Thanks for your information.
Issue have raised:
https://github.com/openssl/openssl/issues/17681

-邮件原件-
发件人: Dr. Matthias St. Pierre [mailto:matthias.st.pie...@ncp-e.com] 
发送时间: 2022年2月10日 0:03
收件人: Chenxinping ; openssl-users@openssl.org
主题: RE: How run the specific test case //答复: How to run a simple test case

The problem lies with the Perl script, not the C program.

The perl script generates the file 17-renegotiate.cnf.default from the template 
file  17-renegotiate.cnf.in.
The environment variable “${ENV::TEST_CERTS_DIR}” should have been replaced by 
Perl.

Please open an issue on GitHub, it’s easier to discuss your problem there. You 
might want to tag @levitte, he should be able to help.

https://github.com/openssl/openssl/issues/new/choose


Matthias



Dr. Matthias St. Pierre
Tech Lead Cryptography
matthias.st.pie...@ncp-e.com
Phone: +49 911 9968-0
 www.ncp-e.com

Headquarters Germany: NCP engineering GmbH • Dombuehler Str. 2 • 90449 • 
Nuremberg
North American HQ: NCP engineering Inc. • 601 Cleveland Str., Suite 501-25 • 
Clearwater, FL 33755

Authorized representatives: Peter Soell, Patrick Oliver Graf, Beate Dietrich
Registry Court: Lower District Court of Nuremberg
Commercial register No.: HRB 7786 Nuremberg, VAT identification No.: DE 
133557619

This e-mail message including any attachments is for the sole use of the 
intended recipient(s) and may contain privileged
or confidential information. Any unauthorized review, use, disclosure or 
distribution is prohibited. If you are not the intended recipient,
please immediately contact the sender by reply e-mail and delete the original 
message and destroy all copies thereof.


自动回复: Re: How to distinguish between encrypted/unencrypted key in a PEM file

2022-01-27 Thread 562430030 via openssl-users
您好,您的邮件我已收到,我会尽快阅读,谢谢!

自动回复: Re: TLSv1.2 Distinguished Names Length 0 / how to set it

2022-01-19 Thread 562430030 via openssl-users
您好,您的邮件我已收到,我会尽快阅读,谢谢!

Mac OS X and openssl 3

2022-04-23 Thread The Doctor via openssl-users
Just wondering if Apple OS is compatible with OPenssl 3 .

-- 
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b  
If challenge is our enemy, we won't have friends. -unknown Beware 
https://mindspring.com


Re: CA upgrade in several aspects

2022-05-13 Thread egoitz--- via openssl-users
Hi Mark! 

Thank you so much for answering. 

I think that the process of issuing a new ca cert (for replacing the old
ca cert with a new a certificate with more bits and better signing
algorithms) should be : 

- Generate in the own ca a new ca cert. 

- Replace in openssl.conf which ca cert and ca keys should be used to
issue certificates. 

- Then reissue all certificates. 

Am I wrong?. 

If I apply the following changes in openssl.conf from the openssl.conf I
attached in my previous email, I suppose all should be fine then?. The
commented changes are : 

- Added the line : "signer_digest  = sha256" 

- Modified the line : "digests= md5, sha1" by "digests =
sha1, sha256, sha384, sha512" 

- Added the line : "ess_cert_id_alg= sha1" 

Best regards,

El 2022-05-12 18:21, Mark Hack escribió:

> NIST-800-131a deprecated SHA1 signatures in January of 2013 along with 
> RSA1024 bit keys. You should be issuing certificates with at least RSA2048 
> with SHA2 signatures, and preferably at least RSA3072 with SHA-384 signatures 
> and if you are re-issuing CA certs more bits is better. 
> 
> Nothing was said about CA certificates with SHA1 signatures and some 
> implementations will now reject these as non-compliant even if they were 
> issued before 2013. 
> 
> On Thu, 2022-05-12 at 17:40 +0200, egoitz--- via openssl-users wrote: 
> 
> Please ignore the line below I said regards in my previous mail... it's there 
> by error... 
> 
> cheers!
> 
> El 2022-05-12 17:38, ego...@ramattack.net escribió: 
> 
> Good afternoon, 
> 
> I'm running a CA, for generating the certificates for the backup clients of 
> my network and for the backup servers too. The certificates are used for 
> encrypting the backups stored in the servers and too, for comunicating over 
> TLS between severs and clients. 
> 
> This CA has some years now and the certificates I generate for new clients, 
> are not working (directly) in new machines. The reason for that is that new 
> operating systems, are requiring stronger signing algorithms. When you try to 
> start the service using that certificates (bacula file daemon) in a fresh new 
> Debian for instance, systemd throws the following error : 
> 
> _OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL 
> ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ 
> 
> I know you can fix that with the following change in openssl.conf : 
> 
> _CIPHERSTRING = DEFAULT@SECLEVEL=2_ 
> 
> _CIPHERSTRING = DEFAULT@SECLEVEL=1_ 
> 
> But this last way, does not convince me... so I have started debugging what 
> exactly was causing the the problem. I saw, that sha1 is not allowed as a 
> signing valid algorithm for SECLEVEL 2. So, I tried moving the CA to a more 
> recent testing machine (with a newer OpenSSL 1.1.1l-freebsd), and I modified 
> too in the openssl.conf of the CA (The openssl.conf existing in the CA dir 
> for generating certs and so...) : 
> 
> I have attached the old version. The new using version in the testing 
> machine, is the old one plus the below changes : 
> 
> - Added the line : "signer_digest  = sha256" 
> 
> - Modified the line : "digests= md5, sha1" by "digests = 
> sha1, sha256, sha384, sha512" 
> 
> - Added the line : "ess_cert_id_alg= sha1" 
> 
> Now... I have generated a new certificate by following the normal 
> procedure... generate the key and csr... later sing new cert... etc etc. 
> 
> This new generated certificate (signed with sha256WithRSAEncryption 
> algorithm), has worked with a newer version of the Bacula client and in a 
> almost new Debian system. So it seems, just by generating new certificates, 
> using them in that new machines, with a newer os and keeping the old ca 
> certificate, at least the service has started. We have too, another master 
> public key for encrypting content (which is an oldly generated certificate 
> signed with sha1WithRSAEncryption) that we keep in case a customer looses 
> it's keys for avoiding a possible disaster. 
> 
> I was wondering if some sort of problem could exist, by using those old two 
> certificates (the master public key and the old ca certifcate) with the new 
> generated certificate. 
> 
> Now, that I have that CA, for whose purpose seems to be working, I have 
> started thinking... some more... I have noticed that the CA certificate will 
> expire in 2024. I assume that what I would have to do before that CA cert 
> expires could be : 
> 
> - Generate a second ca cert for the CA. 
> 
> - Change the ca certificate to be used (for signing and issuing new certs) in 
> openssl.conf : 
> 
> _CERTIFICATE= $DIR/CACERT-NEW.PEM  

CA upgrade in several aspects

2022-05-12 Thread egoitz--- via openssl-users
Good afternoon, 

I'm running a CA, for generating the certificates for the backup clients
of my network and for the backup servers too. The certificates are used
for encrypting the backups stored in the servers and too, for
comunicating over TLS between severs and clients. 

This CA has some years now and the certificates I generate for new
clients, are not working (directly) in new machines. The reason for that
is that new operating systems, are requiring stronger signing
algorithms. When you try to start the service using that certificates
(bacula file daemon) in a fresh new Debian for instance, systemd throws
the following error : 

_OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL
ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ 

I know you can fix that with the following change in openssl.conf : 

_CIPHERSTRING = DEFAULT@SECLEVEL=2_ 

_CIPHERSTRING = DEFAULT@SECLEVEL=1_ 

But this last way, does not convince me... so I have started debugging
what exactly was causing the the problem. I saw, that sha1 is not
allowed as a signing valid algorithm for SECLEVEL 2. So, I tried moving
the CA to a more recent testing machine (with a newer OpenSSL
1.1.1l-freebsd), and I modified too in the openssl.conf of the CA (The
openssl.conf existing in the CA dir for generating certs and so...) : 

I have attached the old version. The new using version in the testing
machine, is the old one plus the below changes : 

- Added the line : "signer_digest  = sha256" 

- Modified the line : "digests= md5, sha1" by "digests =
sha1, sha256, sha384, sha512" 

- Added the line : "ess_cert_id_alg= sha1" 

Now... I have generated a new certificate by following the normal
procedure... generate the key and csr... later sing new cert... etc
etc. 

This new generated certificate (signed with sha256WithRSAEncryption
algorithm), has worked with a newer version of the Bacula client and in
a almost new Debian system. So it seems, just by generating new
certificates, using them in that new machines, with a newer os and
keeping the old ca certificate, at least the service has started. We
have too, another master public key for encrypting content (which is an
oldly generated certificate signed with sha1WithRSAEncryption) that we
keep in case a customer looses it's keys for avoiding a possible
disaster. 

I was wondering if some sort of problem could exist, by using those old
two certificates (the master public key and the old ca certifcate) with
the new generated certificate. 

Now, that I have that CA, for whose purpose seems to be working, I have
started thinking... some more... I have noticed that the CA certificate
will expire in 2024. I assume that what I would have to do before that
CA cert expires could be : 

- Generate a second ca cert for the CA. 

- Change the ca certificate to be used (for signing and issuing new
certs) in openssl.conf : 

_CERTIFICATE= $DIR/CACERT-NEW.PEM # THE CA CERTIFICATE_ 

- Sign again all the certificates in the CA... 

- Change, all certificates in the CA (except the own ca cert which is
already changed). 

- Finally replace in each servers and clients certs. 

Is this a correct procedure for upgrading a CA?. I assume it can be
correct. Isn't it?. I think this procedure shouldn't break nothing
related to serials of certificates and so in the own ca. Am I wrong?. 

Best regards, 

+are causing to set a special config in /etc/ssl/openssl.conf saying : "# $FreeBSD: release/10.0.0/crypto/openssl/apps/openssl.cnf 238405 2012-07-12 
19:30:53Z jkim $
#
# OpenSSL example configuration file.
# This is mostly being used for generation of certificate requests.
#

# This definition stops the following lines choking if HOME isn't
# defined.
HOME= .
RANDFILE= $ENV::HOME/.rnd

# Extra OBJECT IDENTIFIER info:
#oid_file   = $ENV::HOME/.oid
oid_section = new_oids

# To use this configuration file with the "-extfile" option of the
# "openssl x509" utility, name here the section containing the
# X.509v3 extensions to use:
# extensions= 
# (Alternatively, use a configuration file that has only
# X.509v3 extensions in its main [= default] section.)

[ new_oids ]

# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
# Add a simple OID like this:
# testoid1=1.2.3.4
# Or use config file substitution like this:
# testoid2=${testoid1}.5.6

# Policies used by the TSA examples.
tsa_policy1 = 1.2.3.4.1
tsa_policy2 = 1.2.3.4.5.6
tsa_policy3 = 1.2.3.4.5.7


[ ca ]
default_ca  = SARENET-CLOUDBACKUP-CA# The default ca section


[ SARENET-CLOUDBACKUP-CA ]

dir = /expert/SARENET-CLOUDBACKUP-CA# Where 
everything is kept
certs   = $dir/certs   

Re: CA upgrade in several aspects

2022-05-12 Thread egoitz--- via openssl-users
Please ignore the line below I said regards in my previous mail... it's
there by error... 

cheers!

El 2022-05-12 17:38, ego...@ramattack.net escribió:

> Good afternoon, 
> 
> I'm running a CA, for generating the certificates for the backup clients of 
> my network and for the backup servers too. The certificates are used for 
> encrypting the backups stored in the servers and too, for comunicating over 
> TLS between severs and clients. 
> 
> This CA has some years now and the certificates I generate for new clients, 
> are not working (directly) in new machines. The reason for that is that new 
> operating systems, are requiring stronger signing algorithms. When you try to 
> start the service using that certificates (bacula file daemon) in a fresh new 
> Debian for instance, systemd throws the following error : 
> 
> _OPENSSL.C:68 ERROR LOADING CERTIFICATE FILE: ERR=ERROR:140AB18E:SSL 
> ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO WEAK_ 
> 
> I know you can fix that with the following change in openssl.conf : 
> 
> _CIPHERSTRING = DEFAULT@SECLEVEL=2_ 
> 
> _CIPHERSTRING = DEFAULT@SECLEVEL=1_ 
> 
> But this last way, does not convince me... so I have started debugging what 
> exactly was causing the the problem. I saw, that sha1 is not allowed as a 
> signing valid algorithm for SECLEVEL 2. So, I tried moving the CA to a more 
> recent testing machine (with a newer OpenSSL 1.1.1l-freebsd), and I modified 
> too in the openssl.conf of the CA (The openssl.conf existing in the CA dir 
> for generating certs and so...) : 
> 
> I have attached the old version. The new using version in the testing 
> machine, is the old one plus the below changes : 
> 
> - Added the line : "signer_digest  = sha256" 
> 
> - Modified the line : "digests= md5, sha1" by "digests = 
> sha1, sha256, sha384, sha512" 
> 
> - Added the line : "ess_cert_id_alg= sha1" 
> 
> Now... I have generated a new certificate by following the normal 
> procedure... generate the key and csr... later sing new cert... etc etc. 
> 
> This new generated certificate (signed with sha256WithRSAEncryption 
> algorithm), has worked with a newer version of the Bacula client and in a 
> almost new Debian system. So it seems, just by generating new certificates, 
> using them in that new machines, with a newer os and keeping the old ca 
> certificate, at least the service has started. We have too, another master 
> public key for encrypting content (which is an oldly generated certificate 
> signed with sha1WithRSAEncryption) that we keep in case a customer looses 
> it's keys for avoiding a possible disaster. 
> 
> I was wondering if some sort of problem could exist, by using those old two 
> certificates (the master public key and the old ca certifcate) with the new 
> generated certificate. 
> 
> Now, that I have that CA, for whose purpose seems to be working, I have 
> started thinking... some more... I have noticed that the CA certificate will 
> expire in 2024. I assume that what I would have to do before that CA cert 
> expires could be : 
> 
> - Generate a second ca cert for the CA. 
> 
> - Change the ca certificate to be used (for signing and issuing new certs) in 
> openssl.conf : 
> 
> _CERTIFICATE= $DIR/CACERT-NEW.PEM # THE CA CERTIFICATE_ 
> 
> - Sign again all the certificates in the CA... 
> 
> - Change, all certificates in the CA (except the own ca cert which is already 
> changed). 
> 
> - Finally replace in each servers and clients certs. 
> 
> Is this a correct procedure for upgrading a CA?. I assume it can be correct. 
> Isn't it?. I think this procedure shouldn't break nothing related to serials 
> of certificates and so in the own ca. Am I wrong?. 
> 
> Best regards, 
> 
> +are causing to set a special config in /etc/ssl/openssl.conf saying : "

Cross-compiling OpenSSL 1.1.1 - specifying toolchain

2022-08-27 Thread lcaperici via openssl-users
Trying to compile OpenSSL using Bootlin tool chains for ARMv5 UCLIBC found at 
https://toolchains.bootlin.com/

Does anyone have recent experience compiling OpenSSL 1.1.1 specifying alternate 
tool-chains?

What commands did you use?

Thanks

RE: Setting a group to an existing EVP_PKEY in OpenSSL 3

2022-10-24 Thread Martin via openssl-users
Kory,

 

Thanks for your response. I want to preserve the rest of the EC public key 
params. I did this. I haven’t test yet.

 

OSSL_PARAM* extracted_params = NULL;

char curve_name[64];

OSSL_PARAM* param_ecgroup = NULL;

 

// sigkey is the EVP_PKEY ECDSA public key

 

 

if (EVP_PKEY_todata(sigkey, EVP_PKEY_PUBLIC_KEY, _params) == 0)

{

   // error 

}

curve_name = OSSL_EC_curve_nid2name(nid));

if (curve_name == NULL)

{

// error

}

if ((param_ecgroup = OSSL_PARAM_locate(params, "group")) != NULL)

{

   OSSL_PARAM_set_utf8_string(param_ecgroup, curve_name);

}

else

{

   // error

}

 

Martin

 

From: Kory Hamzeh  
Sent: Monday, October 24, 2022 7:22 PM
To: amar...@xtec.com
Cc: openssl-users@openssl.org
Subject: Re: Setting a group to an existing EVP_PKEY in OpenSSL 3

 

I haven’t done exactly what you are trying, but something similar.

 

 See EVP_PKEY_set_params:

 

https://www.openssl.org/docs/man3.0/man3/EVP_PKEY_set_params.html

 

The specific parm to set the group could be set like this:

 

 OSSL_PARAM_BLD_push_utf8_string(param_bld, "group",  

curve, 0;

 

 

 

Please note that that I have not tested the above code as my code uses 
key-from-data. But I think it should work.

 





On Oct 24, 2022, at 2:31 PM, Martin via openssl-users 
mailto:openssl-users@openssl.org> > wrote:

 

Hi,

 

How can I set a GROUP to an existing EC type EVP_PKEY in OpenSSL 3?

 

In 1.0.2 I was using this code having the EC_KEY:

 

EC_KEY_set_group(eckey, EC_GROUP_new_by_curve_name(nid));

 

In OpenSSL 3 still EC_GROUP_new_by_curve_name(nid) can be used, but I don’t 
know how to go from that to set it on the existing key.

 

 

Thanks,

 

Martin

 



Setting a group to an existing EVP_PKEY in OpenSSL 3

2022-10-24 Thread Martin via openssl-users
Hi,

 

How can I set a GROUP to an existing EC type EVP_PKEY in OpenSSL 3?

 

In 1.0.2 I was using this code having the EC_KEY:

 

EC_KEY_set_group(eckey, EC_GROUP_new_by_curve_name(nid));

 

In OpenSSL 3 still EC_GROUP_new_by_curve_name(nid) can be used, but I don't
know how to go from that to set it on the existing key.

 

 

Thanks,

 

Martin

 



OpenSSL 3 ECC Key use question

2022-10-23 Thread Martin via openssl-users
Hi,

 

How can I get the nid from the curve name for a EC key in OpenSSL 3? I'm
porting code from OpenSSL 1.0.2.

 

I'm converting this:

 

ecc_curve_type = EC_GROUP_get_curve_name(EC_KEY_get0_group((const EC_KEY
*)eckey));

if(ecc_curve_type == NID_undef)

{

 

to

 

EVP_PKEY_get_utf8_string_param(pkey, OSSL_PKEY_PARAM_GROUP_NAME, curve_name,
sizeof(curve_name), _len);

ecc_curve_type = ossl_ec_curve_name2nid(curve_name);

 

but ossl_ec_curve_name2nid() is internal and it is not defined in
/include/openssl/ec.h but in /include/crypto/ec.h

 

Thanks,

 

Martin



自动回复: Re: OpenSSL 1.1.1 Windows dependencies

2022-10-26 Thread kjjhh7 via openssl-users
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。

自动回复: Re: OpenSSL 1.1.1 Windows dependencies

2022-10-26 Thread kjjhh7 via openssl-users
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。

Snapshots

2022-10-31 Thread The Doctor via openssl-users
No snapshots since 2022-10-19.

-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism https://www.empire.kred/ROOTNK?t=94a1f39b 
How can one be prejudiced and remain objective? -unknown Beware 
https://mindspring.com


自动回复: Re: issues with OpenSSL 1.1.1n

2022-11-01 Thread kjjhh7 via openssl-users
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。

Upgrading OpenSSL on Windows 10

2022-11-21 Thread Steven_M.irc via openssl-users
Hi All,
A few weeks ago I sent this e-mail to the group: 
https://mta.openssl.org/pipermail/openssl-users/2022-November/015613.html I 
received a couple of replies, but sadly I have been too busy to respond to 
them. Regardless, I need a bit more information please.

In one of the replies, Viktor said "Just upgrade any affected systems and 
you'll be fine.". However, I am running Windows 10, and since (unlike Linux) 
every piece of software outside of Windows itself needs to be updated 
individually, I don't know how to track down every single application that 
might be using OpenSSL and make sure that the copy of OpenSSL it uses is 
up-to-date. As many of you would know, under repository-based systems (such as 
most Linux distros), this would not be an issue as I could update every single 
application (system or non-system) at once.

For those of you who may be thinking "but Windows doesn't use OpenSSL"; when 
the latest OpenSSL vulnerabilities were discovered I asked a Windows IRC 
channel whether or not Windows uses OpenSSL, the reply was that Windows itself 
does not use it, but many applications running on Windows do.

Thank you all for your time.


Re: Upgrading OpenSSL on Windows 10

2022-11-24 Thread Steven_M.irc via openssl-users
Hi Michael,
Thanks very much for replying to my e-mail/post. I apologize for the lateness 
of my reply.

> This is not true in the general case. There are applications which are 
> available on Linux which do not use the distribution's package manager. There 
> are applications which use their own OpenSSL build, possibly linked 
> statically or linked into one of their own shared objects or with the OpenSSL 
> shared objects renamed. Linux distributions have not magically solved the 
> problem of keeping all software on the system current.

That's disheartening. My next computer will be running Linux and I was thinking 
that (as long as I stick to installing software from appropriate repositories) 
my update worries would be over soon.
 
>It is possible, with relatively little effort, to find all the copies of the 
>OpenSSL DLLs under their usual names on a system

Could you please provide me with a list of the usual names? I've got a lot of 
libssl DLL's on my system, but I'm not sure if they're part of OpenSSL or some 
other implementation of SSL.

>I'm not sure OpenSSL versions should be particularly high on anyone's priority 
>list.

As I understand it, OpenSSL is responsible for establishing HTTPS connections, 
the primary protocol for ensuring security and authenticity over the Internet, 
and you *don't* think OpenSSL versions should be a high priority? I don't 
understand your lack of alarm here.

>What are you actually trying to accomplish? What's your task? Your threat 
>model?

I want to be able to trust the HTTPS connections between my PC and servers on 
the Internet again; whether I'm using a browser, a software installer (that 
downloads data from the Internet before installing), a peer-to-peer 
application, or any other network application.

Thank you for your time.

Steven


RE: Upgrading OpenSSL on Windows 10

2022-11-24 Thread Steven_M.irc via openssl-users
Hi Job,
Thanks very much for your reply. Apologies for the lateness of mine.

I will ask around and get more information about Powershell and PDQ Inventory.

Thanks again,
Steven




Sent with Proton Mail secure email.

--- Original Message ---
On Wednesday, November 23rd, 2022 at 5:36 AM, Job Cacka  wrote:


> Michael's point should be asked and answered first for your environment.
> 
> To find all of the OpenSSL bits used on a windows system you would use
> Powershell or a tool that flexes its use like PDQ Inventory. There is a
> steep learning curve and it is probably off topic for this group but there
> are several different ways to use powershell to gain this information from
> different viewpoints (Installed files, registry, event log, etc...).
> 
> Thanks,
> Job
> 
> -Original Message-
> From: openssl-users openssl-users-boun...@openssl.org On Behalf Of Michael
> 
> Wojcik via openssl-users
> Sent: Monday, November 21, 2022 4:18 PM
> To: openssl-users@openssl.org
> Subject: Re: Upgrading OpenSSL on Windows 10
> 
> > From: openssl-users openssl-users-boun...@openssl.org on behalf of
> > Steven_M.irc via openssl-users openssl-users@openssl.org
> > Sent: Monday, November 21, 2022 15:56
> 
> > However, I am running Windows 10, and since (unlike Linux) every piece
> > of software outside of Windows itself needs to be updated
> > individually, I don't know how to track down every single application that
> 
> might be using OpenSSL and make sure that the copy of OpenSSL it uses is
> up-to-date.
> 
> You don't. There may be applications that have OpenSSL linked statically, or
> linked into one of its own DLLs, or just with the OpenSSL DLLs renamed.
> 
> > As many of you would know, under repository-based systems (such as
> > most Linux distros), this would not be an issue as I could update every
> 
> single application (system or non-system) at once.
> 
> This is not true in the general case. There are applications which are
> available on Linux which do not use the distribution's package manager.
> There are applications which use their own OpenSSL build, possibly linked
> statically or linked into one of their own shared objects or with the
> OpenSSL shared objects renamed. Linux distributions have not magically
> solved the problem of keeping all software on the system current.
> 
> 
> Back to Windows: It is possible, with relatively little effort, to find all
> the copies of the OpenSSL DLLs under their usual names on a system, and then
> glean from them their version information. With significantly more effort,
> you can search for exported OpenSSL symbols within third-party binaries,
> which will detect some more instances. With quite a lot of additional
> effort, you can winkle out binaries which contain significant portions of
> code matching some OpenSSL release (see various research efforts on
> function-point and code-block matching, and compare with alignment
> strategies in other fields, such as genomics). If your definition of
> "OpenSSL in an application" is not too ambitious, this might even be
> feasible.
> 
> But to what end? Each application will either be well-supported, in which
> case you can find out from the vendor what OpenSSL version it contains and
> whether an update is available; or it is not, in which you'll be out of
> luck.
> 
> This is true of essentially every software component, most of which are not
> as well-maintained or monitored as OpenSSL. Modern software development is
> mostly a haphazard hodgepodge of accumulating software of uncertain
> provenance and little trustworthiness into enormous systems with
> unpredictable behavior and failure modes. I'm not sure OpenSSL versions
> should be particularly high on anyone's priority list.
> 
> What are you actually trying to accomplish? What's your task? Your threat
> model?
> 
> --
> Michael Wojcik


Re: an oldie but a goodie .. ISO C90 does not support 'long long'

2022-11-04 Thread raf via openssl-users
On Wed, Nov 02, 2022 at 06:29:45PM +, Michael Wojcik via openssl-users 
 wrote:

> > From: openssl-users  On Behalf Of Phillip
> > Susi
> > Sent: Wednesday, 2 November, 2022 11:45
> > 
> > The only thing to fix is don't put your compiler in strict C90 mode.
> 
> I'm inclined to agree. While there's an argument for backward compatibility,
> C99 was standardized nearly a quarter of a century ago. OpenSSL 1.x is
> younger than C99. It doesn't seem like an unreasonable requirement.
> 
> But as Tomas wrote, anyone who thinks it is can submit a pull request.
> 
> -- 
> Michael Wojcik

Would this be a choice between backwards-compatibility with C90
compilers and compatibility with 32-bit architectures?

Is there another way to get 64-bit integers on 32-bit systems?

I suspect that that there are more 32-bit systems than there are
C90 compilers.

cheers,
raf



Re: an oldie but a goodie .. ISO C90 does not support 'long long'

2022-11-06 Thread raf via openssl-users
On Sat, Nov 05, 2022 at 02:22:55PM +, Michael Wojcik 
 wrote:

> > From: openssl-users  On Behalf Of raf 
> > via
> > openssl-users
> > Sent: Friday, 4 November, 2022 18:54
> > 
> > On Wed, Nov 02, 2022 at 06:29:45PM +, Michael Wojcik via openssl-users
> >  wrote:
> > 
> > >
> > > I'm inclined to agree. While there's an argument for backward 
> > > compatibility,
> > > C99 was standardized nearly a quarter of a century ago. OpenSSL 1.x is
> > > younger than C99. It doesn't seem like an unreasonable requirement.
> > 
> > Would this be a choice between backwards-compatibility with C90
> > compilers and compatibility with 32-bit architectures?
> 
> I don't see how.
> 
> It's a question of the C implementation, not the underlying
> architecture. A C implementation for a 32-bit system can certainly
> provide a 64-bit integer type. If that C implementation conforms to
> C99 or later, it ought to do so using long long and unsigned long
> long. (I'm excluding C implementations for exotic systems where, for
> example, CHAR_BIT != 8, such as some DSPs; those aren't going to be
> viable targets for OpenSSL anyway.)
> 
> > Is there another way to get 64-bit integers on 32-bit systems?
> 
> Sure. There's a standard one, which is to include  and
> use int64_t and uint64_t. That also requires C99 or later and an
> implementation which provides those types; they're not required.

Sorry. I assumed that it was clear from context that I was only
thinking about C90-compliant 64-bit integers on 32-bit systems.

> And for some implementations there are implementation-specific
> extensions, which by definition are not standard.
> 
> And you can roll your own. In a non-OO language like C, this would
> be intrusive for the parts of the source base that rely on a 64-bit
> integer type.
> 
> > I suspect that that there are more 32-bit systems than there are
> > C90 compilers.
> 
> Perhaps, but I don't think it's relevant here. In any case, OpenSSL is
> not in the business of supporting every platform and C implementation
> in existence. There are the platforms supported by the project, and
> there are contributed platforms which are included in the code base
> and supported by the community (hopefully), and there are unsupported
> platforms.
> 
> If someone wants OpenSSL on an unsupported platform, then it's up to
> them to do the work.

So it sounds like C90 is now officially unsupported.
I got the impression that, before this thread, it was believed
that C90 was supported, and the suggestion of a pull request
indicated a willingness to retain/return support for C90.
Perhaps it just indicated a willingness to accept community
support for it.

I'd be amazed if anyone could actually still be using a
30 year old C90 compiler, rather than a compiler that
just gives warnings about C90. :-)

> -- 
> Michael Wojcik

cheers,
raf



Fw:OpenSSL AES Decryption fails randomly C++

2022-11-12 Thread WuJinze via openssl-users
sorry for my mistake. I found that the gist url can not display well in mail 
and here is the 
url:https://gist.github.com/GoGim1/77c9bebec1cc71cea066515b4623a051




WuJinze
294843...@qq.com








--Original--
From:   
 "WuJinze"  
  <294843...@qq.com;
Date:Sat, Nov 12, 2022 06:17 PM
To:"openssl-users"

OpenSSL AES Decryption fails randomly C++

2022-11-12 Thread WuJinze via openssl-users
Dear OpenSSL Group,
Greetings. I was working on writing simple aes encrypt/decrypt wrapper 
function in c++ and running into a strange problem. The minimal reproducible 
examples in gist seems working fine but when i uncomment lines 90-92, it will 
fail to decrypt randomly. Can someone help me to figure out what's wrong with 
the code?Here is my code: OpenSSL AES Decryption fails randomly C++ 
(github.com). OpenSSL version is OpenSSL 1.1.1f. G++ version is 9.4.0.Regards, 
Jinze

Worried about the vulnerabilities recently found in OpenSSL versions 3.0.0 - 3.0.6.

2022-11-02 Thread Steven_M.irc via openssl-users
Hi All,
I'm really worried about the vulnerabilities recently found in OpenSSL versions 
3.0.0 - 3.0.6. If I understand things correctly (and please do correct me if 
I'm wrong), it doesn't matter which version of OpenSSL clients are running, 
only which version of OpenSSL *servers* are running. Thus it seems like 
end-users can do very little to protect themselves. For example, how can an 
end-user tell if a website they're visiting is using a safe or an unsafe 
version of OpenSSL?

I did try putting my bank's website through an SSL tester (www.ssllabs.com), 
but I couldn't find an easy way to determine which version of OpenSSL they're 
running. I did get a protocol report, which read as follows:
TLS 1.3 Yes
TLS 1.2 Yes
TLS 1.1 No
TLS 1.0 No
SSL 3 No
SSL 2 No

However, I don't know if any of those protocol version numbers give any 
indication as to the OpenSSL version number(s)?

Any advice would be greatly appreciated.

Many thanks,
Steven_M



Sent with Proton Mail secure email.


自动回复: Re: Worried about the vulnerabilities recently found in OpenSSLversions 3.0.0 - 3.0.6.

2022-11-02 Thread kjjhh7 via openssl-users
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。

自动回复: Re: issue with 1.1.1n

2022-11-01 Thread kjjhh7 via openssl-users
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。

Re: goto out not working in tests

2024-05-06 Thread The Doctor via openssl-users
On Mon, May 06, 2024 at 11:34:59PM -0600, The Doctor via openssl-users wrote:
> Using clang versino 18
> 
> and it is spewing at goto out 
> 

Line 417 and 434 of test/threadstest.c

in openssl-3.3 daily

-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ;


goto out not working in tests

2024-05-06 Thread The Doctor via openssl-users
Using clang versino 18

and it is spewing at goto out 

-- 
Member - Liberal International This is doc...@nk.ca Ici doc...@nk.ca
Yahweh, King & country!Never Satan President Republic!Beware AntiChrist rising!
Look at Psalms 14 and 53 on Atheism ;


[openssl-users] Heads up -- RT tickets moving to GH issues

2017-02-02 Thread Salz, Rich via openssl-users
Just to let you know, we found a tool to migrate RT to GitHub issues and will 
be doing that shortly.  This will just about double the number of open issues 
we have and, unfortunately, push the existing (active ones) down a few pages.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to detect AES-NI compatible CPU

2017-02-03 Thread Salz, Rich via openssl-users
> My application links to OpenSSL 1.1.0 dynamically, and I would like to be able
> to determine if the CPU supports the AES-NI instruction set.
> Is there an OpenSSL API that can do this?

Look at man3/OPENSSL_ia32cap.pod ?
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Openssl 1.0.2k compilation issues

2017-02-01 Thread Salz, Rich via openssl-users
>Am trying to upgrade openssl 1.0.1p to 1.0.2k and the compilation breaks with 
>the below error and am using Ubuntu 10.04.1
>In file included from req.c:84:
>comp.h:28: error: redefinition of typedef 'COMP_METHOD'
>../../Build/target/usr/include/openssl/ossl_typ.h:181: error: previous 
>declaration of 'COMP_METHOD' was here

Something is strange.  Scrub your build area and restart.

; sed -n -e25,30p crypto/comp/comp.h
int (*expand) (COMP_CTX *ctx,
   unsigned char *out, unsigned int olen,
   unsigned char *in, unsigned int ilen);
/*
 * The following two do NOTHING, but are kept for backward compatibility
 */
; sed -n -e181p crypto/ossl_typ.h
typedef struct comp_method_st COMP_METHOD;
;


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Does CVE-2016-7055 only impact x86_64 platform ?

2017-01-31 Thread Salz, Rich via openssl-users
The text says Broadwell-specific

So it only affects *some* x86_64 platforms.
--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

From: Sandeep Umesh [mailto:sanum...@in.ibm.com]
Sent: Monday, January 30, 2017 2:14 AM
To: openssl-users@openssl.org
Subject: [openssl-users] Does CVE-2016-7055 only impact x86_64 platform ?


Hi

Can you please clarify if CVE-2016-7055 only impact x86_64 platform ? What 
about other platforms listed in crypto/bn/asm/ folder which has Montgomery 
multiplication procedure, is it impacted ?
Thanks


Regards
Sandeep
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] FW: problem with missing STDINT.H file

2017-02-07 Thread Salz, Rich via openssl-users
> It's cargo-cult programming, most often by people who can't be bothered to
> learn the language they're using.

There are also sometimes portability issues, vendors get things wrong.

But at any rate, for this project, OpenSSL style says parens after sizeof and 
says nothing at all about pre-processor defined operator. It probably should, 
but clearly our existing style uses parens.

Ok?

You guys are both important contributors to the project.  It hurts me to see 
you fight :)

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] BN_MUL_MONT for ARM64 v8

2017-02-07 Thread Salz, Rich via openssl-users
> Have you considered using GMP as a big integer backed for openssl?  It has 
> support for several arm variants using handwritten assembly code and the 
> developers go to great lengths to find optimize runtime on all supported 
> platforms.

It might be interesting if we could figure out how to handle it as a dynamic 
library.  License issues prevent anything else.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Why do we try out all possible combinations of top bits in OpenSSL timing attack?

2017-02-06 Thread Salz, Rich via openssl-users
Michael was kind to post some replies.

I think a better forum to discuss this is one of the following, which has more 
focus on cryptographic science and less on “how do I use the CLI”
  http://www.metzdowd.com/mailman/listinfo/cryptography
https://www.irtf.org/mailman/listinfo/cfrg
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] openssl s_client

2017-02-05 Thread Walter H. via openssl-users

Hello,

openssl s_client -connect mailhost:25 -starttls smtp

displays this:

CONNECTED(0003)
depth=0 OU = Domain Control Validated, CN = ...
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 OU = Domain Control Validated, CN = ...
verify error:num=27:certificate not trusted
verify return:1
depth=0 OU = Domain Control Validated, CN = ...
verify error:num=21:unable to verify the first certificate
verify return:1

the question: is this caused by a config problem on the serverside or on 
the client side (host running openssl)?


Thanks,
Walter




smime.p7s
Description: S/MIME Cryptographic Signature
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Inserting cipher into speed.c

2017-02-06 Thread Benjamin Kaduk via openssl-users
On 02/04/2017 04:00 PM, Schmicker, Robert wrote:
>
> Hello,
>
>
> Thanks to everyones help here I was able to insert a new cipher into
> OpenSSL.
>
> However, for performance reasons I'd like to begin testing the speed
> of my cipher and
>
> compare to other already implemented ciphers.
>
>
> I went ahead and started editing the ./apps/speed.c file to insert the
> new cipher but ran into some strange output (See below).
>
>

IIRC you are supposed to implement the EVP interface for your cipher and
use the -evp flag to speed.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] BN_MUL_MONT for ARM64 v8

2017-02-08 Thread Salz, Rich via openssl-users
> Licensing issues are indeed thorny. Why can't openssl perform a dynamic link? 
> The soversion should handle any ABI issues introduced in later versions of 
> GMP.

Anything is possible; it is just  code.

I don't think this is a priority for the team.  A pull request ...
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] 'No client certificate CA names sent'

2017-01-30 Thread Benjamin Kaduk via openssl-users
On 01/30/2017 10:44 AM, russellb...@gmail.com wrote:
>   Quoth Mr Viktor Dukhovni, 'it is often wise to send an empty
> list when requesting client certificates.'
>   How does one send an empty list?
>

That's generally the default server behavior when no CAs are configured
for that purpose.  But, (1) I thought you were looking at the client
side, and (2) how to configure the server depends on what software is
used on the server, so there's not much more to say right now.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Question RE certificate chain verification

2017-02-22 Thread Walter H. via openssl-users
On Tue, February 21, 2017 12:16, Jakob Curdes wrote:
> Hi, I am new to the list and have a question where it seems I cannot find
> the answer in archives here or in other sources.
>
> We want to verify the certificate chain of an "official" certificate, but
> including the revocation status of the intermediate certs, via CRL or
> OCSP.
> (The chain verification itself is easy and solved, our problems lie just
> with getting the revocation status of an arbitrary certificate).
>
> It seems to turn out that a) this is seldom done completely (otherwise I
> think there would be more "working recipes") and it is not easy to do it
> in a generic way as we keep getting various errors at different steps.
>
> Wtihout making it too long, we want to do the following:
> a) retrieve and save certificate from server via URL
> b)retrieve and save certificate chain from server
> c) determine OCSP URL or CRL list URL
> d1) verify cert against OCSP source OR
> d2) download CRL; then verify cert against CRL
>
> Up to c), everything is straightforward. We use openssl 1.0.1e-60.el7 from
> current CentOS 7.

try this:

CAFILE=/etc/pki/certs/ca-bundle.trust.crt

CERT=/tmp/cert.crt  <-- cert to validate
ISSUER=/tmp/issuer.crt   <-- issuing ca cert

OCSPURL=$(openssl x509 -in $CERT -noout -ocsp_uri)
OCSPHOST=$(echo "$OCSPURL" |gawk --field-separator=\/ '{ print $3 }' -)

OCSPRESULT=$(openssl ocsp -CAfile $CAFILE -no_nonce -noverify -issuer
$ISSUER -cert $CERT -url "$OCSPURL" -header Host $OCSPHOST |grep "$CERT")



-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] error making Private RSA

2017-03-02 Thread Salz, Rich via openssl-users
What version of openssl?  I'm guessing 1.0.2.

Put this line inyour code
ERR_load_ERR_strings();
And youll get a more informative message.   

My main guess is that your allocation for the PEM buffer is too small -- is 
key/key_len pointing to a static buffer? 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Msys doesn't handle forward slashes in makefile

2016-11-28 Thread Fiodar Stryzhniou via openssl-users
Hi! I use Configure under Msys with crosscompiler arm-none-symbianelf. I edit 
accordingly Configure script of course. When I run make it prints "_some 
string_ path not found". I found this string and replace forward slashes to 
backslashes. I got same error for another string.
I try "ls path2 file" from error message and got error "not found error". I 
change slashes and vise versa.
 How can tell configure to generate makefile with backslashes? May be another 
solutions exists?
Fiodar Stryzhniou

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Msys doesn't handle forward slashes in makefile

2016-11-28 Thread Fiodar Stryzhniou via openssl-users
I need in autogenerated files headers, asm, others. Project will migrate to 
Symbian build system then.
Fiodar Stryzhniou

исходное сбщ
Тема: Re: [openssl-users] Msys doesn't handle forward slashes in makefile
От: Jakob Bohm <jb-open...@wisemo.com>
Дата: 28.11.2016 23.29

On 28/11/2016 11:44, Fiodar Stryzhniou via openssl-users wrote:
> Hi! I use Configure under Msys with crosscompiler arm-none-symbianelf. I edit 
> accordingly Configure script of course. When I run make it prints "_some 
> string_ path not found". I found this string and replace forward slashes to 
> backslashes. I got same error for another string.
> I try "ls path2 file" from error message and got error "not found error". I 
> change slashes and vise versa.
>   How can tell configure to generate makefile with backslashes? May be 
> another solutions exists?
> Fiodar Stryzhniou
>
Hmm, maybe run perl -pe "s/\//\\/sg" on the Makefile as part of
your higher level build script?
I found recipe on stack overflow "sed -i s/\//\\/g Makefile". Paths can have 
back and forward slashes at one time in makefile, lol. I don't use build script 
except Configure.

But how do you run the code after the signing service was shut
down at the Microsoft takeover?
I hack my phone and forget about it. Also I saw in internet how make own 
devcert.
Enjoy

Jakob
-- 
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] purpose dir crypto/dso

2016-12-02 Thread Fiodar Stryzhniou via openssl-users
Hi! This directory should build when each dir in crypto/ builded as separate 
dll, isn't it? This directory contain module loader, right?
I googled with "crypto/dso purpose" without luck.
Fiodar Stryzhniou

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] big endian vs little endian

2016-12-18 Thread Walter H. via openssl-users

On 18.12.2016 17:21, sahorwitz wrote:

I am obviosly a newbie and missing something. How then do I encrypt the file
on one machine (little endian), transmit it to another machine (big endian)
and decrypt it there?




similar to this:

encrypt
openssl enc -e -in file -out encryptfile -aes-256-gcm

decrypt
openssl enc -d -in encryptfile -out file -aes-256-gcm

can someone explain why I get the following output

enter aes-256-gcm decryption password:
bad decrypt

but the file is correctly decrypted

I'm using latest openssl rpm package from CentOS 6





smime.p7s
Description: S/MIME Cryptographic Signature
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'

2016-12-27 Thread Ron Gaw via openssl-users
See below.


 Jeremy Farrell>> What output do you get when you run the same commands as 
Richard? That is:Jeremy Farrell>> Jeremy Farrell>> type perl
$ type perl
perl is hashed (/mingw64/bin/perl)

 Jeremy Farrell>> Jeremy Farrell>> perl -v
$ perl -v

This is perl 5, version 22, subversion 0 (v5.22.0) built for 
MSWin32-x64-multi-thread

Copyright 1987-2015, Larry Wall

Perl may be copied only under the terms of either the Artistic License or the
GNU General Public License, which may be found in the Perl 5 source kit.

Complete documentation for Perl, including FAQ lists, should be found on
this system using "man perl" or "perldoc perl".  If you have access to the
Internet, point your browser at http://www.perl.org/, the Perl Home Page.

 Jeremy Farrell>> Jeremy Farrell>> perl -e 'print $^X,"\n";'
C:\msys64\mingw64\bin\perl.exe

   -- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'

2016-12-26 Thread Ron Gaw via openssl-users
I am using a MinGW64 / MSYS2 environment to compile OpenSSL1.1.0c, but failing 
consistently after multiple attempts with a few variations each attempt 
(including deleting entire source directory and re-untar/ungzipping).   I 
believe there's something wrong either with my environment settings or 
./Configure options.  This is the output of ./Configure after setting only the 
CFLAGS env var:
$ export "CFLAGS=-03"$ ./Configure mingw64 --prefix=/usr/local zlib shared
Configuring OpenSSL version 1.1.0c (0x1010003fL)
    no-asan [default]  OPENSSL_NO_ASAN
    no-crypto-mdebug [default]  OPENSSL_NO_CRYPTO_MDEBUG
    no-crypto-mdebug-backtrace [default]  OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
    no-ec_nistp_64_gcc_128 [default]  OPENSSL_NO_EC_NISTP_64_GCC_128
    no-egd  [default]  OPENSSL_NO_EGD
    no-fuzz-afl [default]  OPENSSL_NO_FUZZ_AFL
    no-fuzz-libfuzzer [default]  OPENSSL_NO_FUZZ_LIBFUZZER
    no-heartbeats   [default]  OPENSSL_NO_HEARTBEATS
    no-md2  [default]  OPENSSL_NO_MD2 (skip dir)
    no-msan [default]  OPENSSL_NO_MSAN
    no-rc5  [default]  OPENSSL_NO_RC5 (skip dir)
    no-sctp [default]  OPENSSL_NO_SCTP
    no-ssl-trace    [default]  OPENSSL_NO_SSL_TRACE
    no-ssl3 [default]  OPENSSL_NO_SSL3
    no-ssl3-method  [default]  OPENSSL_NO_SSL3_METHOD
    no-ubsan    [default]  OPENSSL_NO_UBSAN
    no-unit-test    [default]  OPENSSL_NO_UNIT_TEST
    no-weak-ssl-ciphers [default]  OPENSSL_NO_WEAK_SSL_CIPHERS
    no-zlib-dynamic [default]
Configuring for mingw64
CC    =gcc
CFLAG =-DL_ENDIAN -DWIN32_LEAN_AND_MEAN -DUNICODE -D_UNICODE -m64 -Wall 
-O3 -D_MT
SHARED_CFLAG  =-D_WINDLL
DEFINES   =ZLIB DSO_WIN32 NDEBUG OPENSSL_THREADS OPENSSL_NO_STATIC_ENGINE 
OPENSSL_PIC OPENSSL_IA32_SSE2 OPENSSL_BN_ASM_MONT OPENSSL_BN_ASM_MONT5 
OPENSSL_BN_ASM_GF2m SHA1_ASM SHA256_ASM SHA512_ASM RC4_ASM MD5_ASM AES_ASM 
VPAES_ASM BSAES_ASM GHASH_ASM ECP_NISTZ256_ASM POLY1305_ASM
LFLAG =
PLIB_LFLAG    =
EX_LIBS   =-lz -lws2_32 -lgdi32 -lcrypt32
APPS_OBJ  =win32_init.o
CPUID_OBJ =x86_64cpuid.o
UPLINK_OBJ    =
BN_ASM    =asm/x86_64-gcc.o x86_64-mont.o x86_64-mont5.o x86_64-gf2m.o 
rsaz_exp.o rsaz-x86_64.o rsaz-avx2.o
EC_ASM    =ecp_nistz256.o ecp_nistz256-x86_64.o
DES_ENC   =des_enc.o fcrypt_b.o
AES_ENC   =aes-x86_64.o vpaes-x86_64.o bsaes-x86_64.o aesni-x86_64.o 
aesni-sha1-x86_64.o aesni-sha256-x86_64.o aesni-mb-x86_64.o
BF_ENC    =bf_enc.o
CAST_ENC  =c_enc.o
RC4_ENC   =rc4-x86_64.o rc4-md5-x86_64.o
RC5_ENC   =rc5_enc.o
MD5_OBJ_ASM   =md5-x86_64.o
SHA1_OBJ_ASM  =sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o sha1-mb-x86_64.o 
sha256-mb-x86_64.o
RMD160_OBJ_ASM=
CMLL_ENC  =cmll-x86_64.o cmll_misc.o
MODES_OBJ =ghash-x86_64.o aesni-gcm-x86_64.o
PADLOCK_OBJ   =e_padlock-x86_64.o
CHACHA_ENC    =chacha-x86_64.o
POLY1305_OBJ  =poly1305-x86_64.o
BLAKE2_OBJ    =
PROCESSOR =
RANLIB    =ranlib
ARFLAGS   =
PERL  =C:\msys64\mingw64\bin\perl.exe

SIXTY_FOUR_BIT mode

Configured for mingw64.

$ make
C:\msys64\mingw64\bin\perl.exe "-I." -Mconfigdata "util\dofile.pl" \
    "-oMakefile" crypto\include\internal\bn_conf.h.in > 
crypto\include\internal\bn_conf.h
/bin/sh: C:msys64mingw64binperl.exe: command not found
make: *** [Makefile:701: crypto\include\internal\bn_conf.h] Error 127


It seems the "\" is the culprit here, since the execution of the make command 
appears to strip those out and then (as expected) the /bin/sh cannot recognize 
that large hash of what should have been the path to Perl.  I did edit the 
first Makefile above to :    Change the base PERL to 
"C:/msys64/mingw64/bin/perl.exe", *and*
    crypto/include/internal/bin_conf.h.in > crypto/include/internal/bin_conf.h
The above worked, but *only* for that line of the make file (as I expected).  
It then fails at the very next line because I didn't edit every "\" to become 
"/" instead.  I'm not sure I'm willing to do that much editing... seems there's 
got to be a better way to make this work.

I realize this has something to do with specifying ./Configure mingw64  and 
how it's populating the Makefiles using Windows-style paths, but I'm not sure 
it's safe / okay to fake having a Unix build target instead, since this will 
likely create new / other problems with libraries, etc.
Am I missing a ./Configure option, an environment variable I should preset, or 
something else altogether?


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'

2016-12-27 Thread Ron Gaw via openssl-users
From: Jeffrey Walton <noloa...@gmail.com>
via openssl-users <openssl-users@openssl.org> wrote:



> http://stackoverflow.com/q/40948353/608639
In my original note, I explained that I'd done something similar to what the 
above stackoverflow.com entry suggested:
>> I did edit the first Makefile above to :
>>    1. Change the base PERL to "C:/msys64/mingw64/bin/perl.exe", *and*
>>    2. crypto/include/internal/bin_conf.h.in > 
>>crypto/include/internal/bin_conf.h
>>
>> The above worked, but *only* for that line of the make file (as I expected).
>>ADDENDUM<< Changing PERL to "C:/mysys64/mingw64/bin/perl.exe" in the top 
>>level Makefile was sufficient, even the second action correctly called 
>>perl.exe.

The real issue is with the "\" in the paths for all the *.h files (there are 
many of these in each Makefile, too numerous to hand edit).  I can't just find 
/ replace all "\", this will create new issues where the Makefile needs the "\" 
as it is.
I can't imagine the Makefiles use the "\" in the paths when Configure'd for a 
Unix (Linux) system, there should be a way to modify the Configure Perl script 
to use Unix paths when compiling for "mingw64" systems, but I've yet to find it 
in the Configure code 

   -- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] MinGW64 / MSYS2 and ./Configure : use of Windows style path causing failures to 'make'

2016-12-27 Thread Ron Gaw via openssl-users
I wondered about that as well.  

First, regarding my msys64: The root '/' is mapped to "C:\msys64", and 
"/mingw64" is the directory where I keep all things MinGW64 w64.
Second: I do have multiple Perl's installed, though only one in the /mingw64 
tree.  In essence, I *think* all the non-mingw64 per stuff I list below is 
irrelevant, but I'm not ruling those out as possible culprits in this issue...


So here's what I see (spoiler alert : nothing is jumping out at me as the 
culprit):
$ type /mingw64/bin/perl
/mingw64/bin/perl is /mingw64/bin/perl

$ /mingw64/bin/perl -v

This is perl 5, version 22, subversion 0 (v5.22.0) built for 
MSWin32-x64-multi-thread

Copyright 1987-2015, Larry Wall

Perl may be copied only under the terms of either the Artistic License or the
GNU General Public License, which may be found in the Perl 5 source kit.

Complete documentation for Perl, including FAQ lists, should be found on
this system using "man perl" or "perldoc perl".  If you have access to the
Internet, point your browser at http://www.perl.org/, the Perl Home Page.

$ pacman -Ss perl  /*--- NOTE: I cut out all the extraneous stuff and narrowed 
it to only what's [installed]
mingw64/mingw-w64-x86_64-perl 5.22.0-1 [installed]
    A highly capable, feature-rich programming language (mingw-w64)
msys/libpcre 8.38-1 (libraries) [installed]
    A library that implements Perl 5-style regular expressions
msys/libpcre16 8.38-1 (libraries) [installed]
    A library that implements Perl 5-style regular expressions
msys/libpcre32 8.38-1 (libraries) [installed]
    A library that implements Perl 5-style regular expressions
msys/libpcrecpp 8.38-1 (libraries) [installed]
    A library that implements Perl 5-style regular expressions
msys/libpcreposix 8.38-1 (libraries) [installed]
    A library that implements Perl 5-style regular expressions
msys/pcre 8.38-1 [installed]
    A library that implements Perl 5-style regular expressions
msys/perl 5.22.1-1 (base-devel) [installed]
    A highly capable, feature-rich programming language
msys/perl-Authen-SASL 2.16-2 (perl-modules) [installed]
    Perl/CPAN Module Authen::SASL : SASL authentication framework
msys/perl-Convert-BinHex 1.123-2 [installed]
    Perl module to extract data from Macintosh BinHex files
msys/perl-Encode-Locale 1.04-1 (perl-modules) [installed]
    Determine the locale encoding
msys/perl-File-Listing 6.04-2 (perl-modules) [installed]
    parse directory listing
msys/perl-HTML-Parser 3.71-3 (perl-modules) [installed]
    Perl HTML parser class
msys/perl-HTML-Tagset 3.20-2 (perl-modules) [installed]
    Data tables useful in parsing HTML
msys/perl-HTTP-Cookies 6.01-2 (perl-modules) [installed]
    HTTP cookie jars
msys/perl-HTTP-Daemon 6.01-2 (perl-modules) [installed]
    A simple http server class
msys/perl-HTTP-Date 6.02-2 (perl-modules) [installed]
    Date conversion routines
msys/perl-HTTP-Message 6.06-2 (perl-modules) [installed]
    HTTP style messages
msys/perl-HTTP-Negotiate 6.01-2 (perl-modules) [installed]
    choose a variant to serve
msys/perl-IO-Socket-SSL 2.016-1 (perl-modules) [installed]
    Nearly transparent SSL encapsulation for IO::Socket::INET
msys/perl-IO-stringy 2.111-1 (perl-modules) [installed]
    I/O on in-core objects like strings/arrays
msys/perl-LWP-MediaTypes 6.02-2 (perl-modules) [installed]
    Guess the media type of a file or a URL
msys/perl-MIME-tools 5.506-1 [installed]
    Parses streams to create MIME entities
msys/perl-MailTools 2.14-1 [installed]
    Various e-mail related modules
msys/perl-Module-Build 0.4212-1 [installed]
    Build, test, and install Perl modules
msys/perl-Net-HTTP 6.09-1 (perl-modules) [installed]
    Low-level HTTP connection (client)
msys/perl-Net-SMTP-SSL 1.02-1 (perl-modules) [installed]
    SSL support for Net::SMTP
msys/perl-Net-SSLeay 1.72-1 (perl-modules) [installed]
    Perl extension for using OpenSSL
msys/perl-TermReadKey 2.33-1 (perl-modules) [installed]
    Provides simple control over terminal driver modes
msys/perl-Test-Pod 1.50-1 (perl-modules) [installed]
    Check for POD errors in files
msys/perl-TimeDate 2.30-2 [installed]
    Date formating subroutines
msys/perl-URI 1.68-1 (perl-modules) [installed]
    Uniform Resource Identifiers (absolute and relative)
msys/perl-WWW-RobotRules 6.02-2 (perl-modules) [installed]
    Database of robots.txt-derived permissions
msys/perl-YAML-Syck 1.29-1 (perl-modules) [installed]
    Fast, lightweight YAML loader and dumper
msys/perl-libwww 6.13-1 (perl-modules) [installed]
    The World-Wide Web library for Perl



From: Richard Levitte <levi...@openssl.org>


levitte>> The PERL definition is a bit odd for a mingw perl.  That path comes
levitte>> mingw64/mingw-w64-x86_64-perl 5.22.0-1 [installed]levitte>>     A 
highly capable, feature-rich programming language (mingw-w64)levitte>> from the 
perl variable $^X.levitte>> levitte>> In my MSYS2/Mingw64 shell, I get 
this:

Re: [openssl-users] One question about RSA decrypt with private key

2017-03-23 Thread Salz, Rich via openssl-users
> After commented out the line "EVP_PKEY_CTX_set_rsa_padding(ctx, 
> RSA_NO_PADDING)",? it worked well.

You need to do some reading about basic RSA cryptography.  Signatures are 
padded out to the keysize.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Functions for retrive public key from x509 cert

2017-03-28 Thread Christian Adja via openssl-users
Dear friends,
Someone can tell me what function is called for retrieve public key from x509 
cert? in the case of EC public key? 

Best regards. 

Il Lunedì 27 Marzo 2017 10:26, "openssl-users-requ...@openssl.org" 
<openssl-users-requ...@openssl.org> ha scritto:
 

 Send openssl-users mailing list submissions to
    openssl-users@openssl.org

To subscribe or unsubscribe via the World Wide Web, visit
    https://mta.openssl.org/mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
    openssl-users-requ...@openssl.org

You can reach the person managing the list at
    openssl-users-ow...@openssl.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

  1. SSL cipher list to disable TLS 1.0 & TLS 1.1 (Hema Murthy)
  2. In ssl3_write_bytes, some checks related to hanlding write
      failure are missing (Raja ashok)


--

Message: 1
Date: Mon, 27 Mar 2017 11:59:16 +0530
From: Hema Murthy <chintuh...@gmail.com>
To: openssl-users@openssl.org
Subject: [openssl-users] SSL cipher list to disable TLS 1.0 & TLS 1.1
Message-ID:
    <cacwqscaoqt0zx9jm8ydtptq9joym3uturhyrfd9gglds2ud...@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Hi,

My system is

FreeBSD 10.2

OpenSSL 1.0.2h

lighttpd :lighttpd-1.4.23

Am trying to disable TLS1.0 and TLS1.1 through lighttpd.conf

but am not sure of what is the equivalent cipher list to be used.

I followed the below link and it didnt work for me.

In case of Appweb Server,I was able to successfully disable TLS1.0 & Above
and TLS1.1 & Above using

SSLProtocol = "ALL -SSLV2 -SSLV3 -TLSV1"

SSLProtocol = "ALL -SSLV2 -SSLV3 -TLSV1.1"



But the same cipher is not working for lighttpd.

Am very new to this and do not know how to proceed further.

Would be great and appreciate if anyone can give me pointers on this.

Please help.



Thanks & Regards,

Hema
-- next part ------
An HTML attachment was scrubbed...
URL: 
<http://mta.openssl.org/pipermail/openssl-users/attachments/20170327/02b8fb3b/attachment-0001.html>

--

Message: 2
Date: Mon, 27 Mar 2017 08:25:16 +
From: Raja ashok <raja.as...@huawei.com>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>,
    "openssl-...@openssl.org" <openssl-...@openssl.org>
Subject: [openssl-users] In ssl3_write_bytes, some checks related to
    hanlding write failure are missing
Message-ID: <FDFEA8C9B9B6BD4685DCC959079C81F5E19315C4@blreml509-mbx>
Content-Type: text/plain; charset="gb2312"

Hi,

I feel there is a check missing in ssl3_write_bytes, in case of handling write 
failure.

Consider SSL_write is called with 2 bytes buffer, then internally in 
ssl3_write_bytes we try to send it as two record (16384 and 3616). If TCP send 
failed for the second record then we store the states internally (wnum, 
wpend_tot and wpend_buf) and return back the result.

Later application has to call SSL_write with same buffer, if it calls with 
different buffer of length 100 byte then we fail that in ssl3_write_bytes using 
the check (len < tot).

But consider application calls with buffer of size 18000 bytes and 
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is enabled. Then (len < tot) will not 
succeed as tot is 16384. Then it will call ssl3_write_pending to send the 
remaining 3616 record. If it succeeds we are incrementing tot, (tot += i). Now 
tot will have 2.

Later there is a check (tot == len), this will not succeed. Then directly we 
are doing n = (len - tot), this will overflow and store a value close to 2^32 
in n. Then it will cause out of bound access to the application buffer "buf".

I hope we should have one more check (len < (tot + s->s3->wpend_tot)) before 
calling ssl3_write_pending.

    if ((len < tot) || (len < (tot + s->s3->wpend_tot))){
        SSLerr(SSL_F_SSL3_WRITE_BYTES, SSL_R_BAD_LENGTH);
        return (-1);
}

Note : I am referring 1.0.2k version of OpenSSL.

Regards,
Ashok


[Company_logo]

Raja Ashok V K
Huawei Technologies
Bangalore, India
http://www.huawei.com



???
This e-mail and its attachments contain confidential information from HUAWEI, 
which
is intended only for the person or entity whose address is listed above. Any 
use of the
information contained herein in any way (including, but not limited to, total 
or partial
disclosure, reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please notify 
the sender by
phone or email i

Re: [openssl-users] TLS leak for openssl 1.1.0b with libcurl 7.50.3

2017-03-25 Thread Salz, Rich via openssl-users
Those are curl functions, not openssl

--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

From: ghanashyam satpathy [mailto:ghanashyam.satpa...@gmail.com]
Sent: Saturday, March 25, 2017 10:05 AM
To: openssl-users@openssl.org
Subject: [openssl-users] TLS leak for openssl 1.1.0b with libcurl 7.50.3

I use libcurl 7.50.3 as statically linked in my application dll , along
with openssl 1.1.0b also statically linked. The dll is dynamically loaded
using LoadLibrary() and unloaded using FreeLibrary() inside application
exe. I observed a TLS index is not getting freed which was allocated inside
openssl. To narrow down the issue I have following exported function, which
I call from my application exe. After FreeLibrary() I see the TLS leak
through APplication verifier.

extern "C" __declspec(dllexport)
void CurlSetup()
{

curl_global_init(CURL_GLOBAL_DEFAULT);
 curl_global_cleanup();
return;

}

An early reply in this context is appreciated.

Thanks
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21

2017-03-22 Thread Christian Adja via openssl-users
Ok, thanks but the key is not in DER but COER, there are ways to transform it 
in DER.
Thanks
Best regards
Christian Adja
 

Il Mercoledì 22 Marzo 2017 20:08, Richard Levitte <levi...@openssl.org> ha 
scritto:
 

 In message <787239451.2530096.1490206287...@mail.yahoo.com> on Wed, 22 Mar 
2017 18:11:27 + (UTC), Christian Adja <christian_a...@yahoo.it> said:

christian_adja> Thanks for the response, but haven't the evp_pkey struct of the 
public
christian_adja> key. I' ve only the an bytes string that i retrieved from IEEE 
cert
christian_adja> with "PEM_bytes_read_bio()". Now in want to form the ec_key 
struct and
christian_adja> then the evp_pkey struct.

I'm not sure how IEEE certs differ from X.509 certs...  if they don't,
you're better off reading the cert with PEM_read_bio_X509() and
extracting the public key with X509_get0_pubkey() or X509_get0_pubkey().

If IEEE certs differ in format, you must first know the exact byte
content, where the public key is in there, make sure it's encoded in
DER, and use d2i_EC_PUBKEY() to make a EC_KEY from those bytes.

Cheers,
Richard

-- 
Richard Levitte        levi...@openssl.org
OpenSSL Project        http://www.openssl.org/~levitte/


   -- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] unsigned char * public key to evp_pkey o ec_key

2017-03-22 Thread Christian Adja via openssl-users
Good evening everybody,I need help about to transform public key (unsigned char 
*) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an 
ecdsaNistP256 in compressed form (compressedy1). 
The public key form in hex = 
|00|80|83|x point (32 bytes)|
Thanks,
Best Regards 

Il Mercoledì 22 Marzo 2017 18:48, "openssl-users-requ...@openssl.org" 
<openssl-users-requ...@openssl.org> ha scritto:
 

 Send openssl-users mailing list submissions to
    openssl-users@openssl.org

To subscribe or unsubscribe via the World Wide Web, visit
    https://mta.openssl.org/mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
    openssl-users-requ...@openssl.org

You can reach the person managing the list at
    openssl-users-ow...@openssl.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

  1. Re: openssl-users Digest, Vol 28, Issue 21 (Christian Adja)


--

Message: 1
Date: Wed, 22 Mar 2017 17:48:08 + (UTC)
From: Christian Adja <christian_a...@yahoo.it>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>
Subject: Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21
Message-ID: <776809560.1321367.1490204889...@mail.yahoo.com>
Content-Type: text/plain; charset="utf-8"

Good evening everybody,I need help about to transform public key (unsigned char 
*) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an 
ecdsaNistP256 in compressed form (compressedy1). 
The public key form in hex = 
|00|80|83|x point (32 bytes)|
Thanks,
Best Regards
 

    Il Mercoled? 15 Marzo 2017 22:23, "openssl-users-requ...@openssl.org" 
<openssl-users-requ...@openssl.org> ha scritto:
 

 Send openssl-users mailing list submissions to
??? openssl-users@openssl.org

To subscribe or unsubscribe via the World Wide Web, visit
??? https://mta.openssl.org/mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
??? openssl-users-requ...@openssl.org

You can reach the person managing the list at
??? openssl-users-ow...@openssl.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

? 1. Request for adding new ciphers (Christian Adja)
? 2. Re: Request for adding new ciphers (Matt Caswell)
? 3. Generating dh parameters multithreaded? (Joseph Southwell)
? 4. Re: Generating dh parameters multithreaded? (Salz, Rich)
? 5. OpenSSL Certificate Cross Signing (Moritz Wirth)
? 6. Re: PKCS#7 (val?ry)
? 7. Re: Generating dh parameters multithreaded? (Joseph Southwell)
? 8. Re: Generating dh parameters multithreaded? (Salz, Rich)


--

Message: 1
Date: Wed, 15 Mar 2017 18:03:44 +0000 (UTC)
From: Christian Adja <christian_a...@yahoo.it>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>
Subject: [openssl-users] Request for adding new ciphers
Message-ID: <1576557894.1332584.1489601024...@mail.yahoo.com>
Content-Type: text/plain; charset="utf-8"

Hi everyone,
Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " 
and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? 
I tried adding in the file tls1.h??? # define 
TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM??? 0x0300C0AC
??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM??? 0x0300C0AD
And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And 
modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c.
There are no way to make it works. It continue to give me? error: 
ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420
thanks.


-- next part --
An HTML attachment was scrubbed...
URL: 
<http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/5ea926a1/attachment-0001.html>

------

Message: 2
Date: Wed, 15 Mar 2017 18:18:52 +
From: Matt Caswell <m...@openssl.org>
To: openssl-users@openssl.org
Subject: Re: [openssl-users] Request for adding new ciphers
Message-ID: <e507eba7-b0c6-d85a-78aa-2af36c2e4...@openssl.org>
Content-Type: text/plain; charset=windows-1252



On 15/03/17 18:03, Christian Adja via openssl-users wrote:
> Hi everyone,
> 
> Someone can help for adding the ciphersuite "
> ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in
> openssl?
> I tried adding in the file tls1.h
>? ? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM? ? ? ? ? ? 0x0300C0AC
>? ? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM? ? ? ? ? ? 0x0300C0AD
> 
> And modifing the file? ssl_ciph.c the functions
>? ? ssl_load_ciphers() ...
> And modifing the file evp_cipher

Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21

2017-03-22 Thread Christian Adja via openssl-users
Good evening everybody,I need help about to transform public key (unsigned char 
*) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an 
ecdsaNistP256 in compressed form (compressedy1). 
The public key form in hex = 
|00|80|83|x point (32 bytes)|
Thanks,
Best Regards
 

Il Mercoledì 15 Marzo 2017 22:23, "openssl-users-requ...@openssl.org" 
<openssl-users-requ...@openssl.org> ha scritto:
 

 Send openssl-users mailing list submissions to
    openssl-users@openssl.org

To subscribe or unsubscribe via the World Wide Web, visit
    https://mta.openssl.org/mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
    openssl-users-requ...@openssl.org

You can reach the person managing the list at
    openssl-users-ow...@openssl.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

  1. Request for adding new ciphers (Christian Adja)
  2. Re: Request for adding new ciphers (Matt Caswell)
  3. Generating dh parameters multithreaded? (Joseph Southwell)
  4. Re: Generating dh parameters multithreaded? (Salz, Rich)
  5. OpenSSL Certificate Cross Signing (Moritz Wirth)
  6. Re: PKCS#7 (val?ry)
  7. Re: Generating dh parameters multithreaded? (Joseph Southwell)
  8. Re: Generating dh parameters multithreaded? (Salz, Rich)


--

Message: 1
Date: Wed, 15 Mar 2017 18:03:44 + (UTC)
From: Christian Adja <christian_a...@yahoo.it>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>
Subject: [openssl-users] Request for adding new ciphers
Message-ID: <1576557894.1332584.1489601024...@mail.yahoo.com>
Content-Type: text/plain; charset="utf-8"

Hi everyone,
Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " 
and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? 
I tried adding in the file tls1.h??? # define 
TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM??? 0x0300C0AC
??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM??? 0x0300C0AD
And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And 
modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c.
There are no way to make it works. It continue to give me? error: 
ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420
thanks.


-- next part ------
An HTML attachment was scrubbed...
URL: 
<http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/5ea926a1/attachment-0001.html>

--

Message: 2
Date: Wed, 15 Mar 2017 18:18:52 +
From: Matt Caswell <m...@openssl.org>
To: openssl-users@openssl.org
Subject: Re: [openssl-users] Request for adding new ciphers
Message-ID: <e507eba7-b0c6-d85a-78aa-2af36c2e4...@openssl.org>
Content-Type: text/plain; charset=windows-1252



On 15/03/17 18:03, Christian Adja via openssl-users wrote:
> Hi everyone,
> 
> Someone can help for adding the ciphersuite "
> ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in
> openssl?
> I tried adding in the file tls1.h
>    # define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM            0x0300C0AC
>    # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM            0x0300C0AD
> 
> And modifing the file  ssl_ciph.c the functions
>    ssl_load_ciphers() ...
> And modifing the file evp_cipher.c and sssl_locl.c
> and finaly ssl_algs.c.
> 
> There are no way to make it works. It continue to give me  error:
> ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420


These ciphersuites already exist in OpenSSL (from version 1.1.0).

Matt



------

Message: 3
Date: Wed, 15 Mar 2017 14:18:38 -0400
From: Joseph Southwell <jsouthw...@serengeti.com>
To: openssl-users@openssl.org
Subject: [openssl-users] Generating dh parameters multithreaded?
Message-ID: <56015584-6edc-4bd6-aa21-f27835281...@serengeti.com>
Content-Type: text/plain; charset="utf-8"

On any new install of our software we generate new dh parameters as follows?

DH *dh = DH_new();
!DH_generate_parameters_ex(dh, 2048, 2, NULL);
int codes = 0;
DH_check(dh, );
DH_generate_key(dh);

It takes a long time. Is there some way to have it use all available cores 
instead of just the one?
-- next part --
An HTML attachment was scrubbed...
URL: 
<http://mta.openssl.org/pipermail/openssl-users/attachments/20170315/abdcfd11/attachment-0001.html>

--

Message: 4
Date: Wed, 15 Mar 2017 18:21:05 +
From: "Salz, Rich" <rs...@akamai.com>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>
Subject: Re: [openssl-users] Generating dh parameters multithreaded?
Message-ID:
    <9ff829cd17f74e4a910ca067196f7...@usma1ex-dag1mb

Re: [openssl-users] openssl-users Digest, Vol 28, Issue 21

2017-03-22 Thread Christian Adja via openssl-users
cheers,
Thanks for the response, but haven't the evp_pkey struct of the public key. I' 
ve only the an bytes string that i retrieved from IEEE cert with 
"PEM_bytes_read_bio()". Now in want to form the ec_key struct and then the  
evp_pkey struct.
Thanks
Best regards
Christian Adja
 

Il Mercoledì 22 Marzo 2017 19:01, Ethan Rahn <ethan.r...@gmail.com> ha 
scritto:
 

 Couldn't you just use EVP_PKEY_get1_EC_KEY?
https://www.openssl.org/docs/man1.0.2/crypto/EVP_PKEY_get1_EC_KEY.html

Cheers,
Ethan
On Wed, Mar 22, 2017 at 10:48 AM, Christian Adja via openssl-users 
<openssl-users@openssl.org> wrote:

Good evening everybody,I need help about to transform public key (unsigned char 
*) retrieved from IEEE cert in EVP_PKEY o EC_KEY. The public key is an 
ecdsaNistP256 in compressed form (compressedy1). 
The public key form in hex = 
|00|80|83|x point (32 bytes)|
Thanks,
Best Regards
 

Il Mercoledì 15 Marzo 2017 22:23, "openssl-users-request@ openssl.org" 
<openssl-users-request@ openssl.org> ha scritto:
 

 Send openssl-users mailing list submissions to
    openssl-users@openssl.org

To subscribe or unsubscribe via the World Wide Web, visit
    https://mta.openssl.org/ mailman/listinfo/openssl-users
or, via email, send a message with subject or body 'help' to
    openssl-users-request@openssl. org

You can reach the person managing the list at
    openssl-users-owner@openssl. org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of openssl-users digest..."


Today's Topics:

  1. Request for adding new ciphers (Christian Adja)
  2. Re: Request for adding new ciphers (Matt Caswell)
  3. Generating dh parameters multithreaded? (Joseph Southwell)
  4. Re: Generating dh parameters multithreaded? (Salz, Rich)
  5. OpenSSL Certificate Cross Signing (Moritz Wirth)
  6. Re: PKCS#7 (val?ry)
  7. Re: Generating dh parameters multithreaded? (Joseph Southwell)
  8. Re: Generating dh parameters multithreaded? (Salz, Rich)


-- -- --

Message: 1
Date: Wed, 15 Mar 2017 18:03:44 + (UTC)
From: Christian Adja <christian_a...@yahoo.it>
To: "openssl-users@openssl.org" <openssl-users@openssl.org>
Subject: [openssl-users] Request for adding new ciphers
Message-ID: <1576557894.1332584. 1489601024...@mail.yahoo.com>
Content-Type: text/plain; charset="utf-8"

Hi everyone,
Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " 
and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? 
I tried adding in the file tls1.h??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 
128_CCM??? 0x0300C0AC
??? # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 256_CCM??? 0x0300C0AD
And modifing the file? ssl_ciph.c the functions??? ssl_load_ciphers() ... And 
modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c.
There are no way to make it works. It continue to give me? error: 
ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420
thanks.


-- next part --
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/ pipermail/openssl-users/ 
attachments/20170315/5ea926a1/ attachment-0001.html>

------

Message: 2
Date: Wed, 15 Mar 2017 18:18:52 +
From: Matt Caswell <m...@openssl.org>
To: openssl-users@openssl.org
Subject: Re: [openssl-users] Request for adding new ciphers
Message-ID: 
Content-Type: text/plain; charset=windows-1252



On 15/03/17 18:03, Christian Adja via openssl-users wrote:
> Hi everyone,
> 
> Someone can help for adding the ciphersuite "
> ECDHE_ECDSA_WITH_AES_128_CCM " and "ECDHE_ECDSA_WITH_AES_256_CCM " in
> openssl?
> I tried adding in the file tls1.h
>    # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 128_CCM            0x0300C0AC
>    # define TLS1_CK_ECDHE_ECDSA_WITH_AES_ 256_CCM            0x0300C0AD
> 
> And modifing the file  ssl_ciph.c the functions
>    ssl_load_ciphers() ...
> And modifing the file evp_cipher.c and sssl_locl.c
> and finaly ssl_algs.c.
> 
> There are no way to make it works. It continue to give me  error:
> ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420


These ciphersuites already exist in OpenSSL (from version 1.1.0).

Matt



--

Message: 3
Date: Wed, 15 Mar 2017 14:18:38 -0400
From: Joseph Southwell <jsouthw...@serengeti.com>
To: openssl-users@openssl.org
Subject: [openssl-users] Generating dh parameters multithreaded?
Message-ID: <56015584-6EDC-4BD6-AA21- f27835281...@serengeti.com>
Content-Type: text/plain; charset="utf-8"

On any new install of our software we generate new dh parameters as follows?

DH *dh = DH_new();
!DH_generate_parameters_ex(dh, 2048, 2, NULL);
int codes = 0;
DH_check(dh, );
DH_generate_key(dh);

It takes a long time. Is there some way to have it us

Re: [openssl-users] One question about RSA decrypt with private key

2017-03-23 Thread Salz, Rich via openssl-users
> For encrypting user data such as user's password, could I use PKCS#1 or OAEP 
> padding mode?

If you do not know what you are doing, use the defaults.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] PKCS#7

2017-03-15 Thread Salz, Rich via openssl-users
> Say someone would be able to gather several clear text AES keys and their 
> respective asymmetrically encrypted RSA blocks. Would it weakens the security 
> of the RSA key pair ? I mean could it be easier for someone using that 
> information to brute force an RSA key pair ?

No
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Is crypto library thread-safe?

2017-03-21 Thread Salz, Rich via openssl-users
> However, is crypto library thread-safe? 

Check out this blog entry:  
https://www.openssl.org/blog/blog/2017/02/21/threads/

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Request for adding new ciphers

2017-03-15 Thread Christian Adja via openssl-users
Hi everyone,
Someone can help for adding the ciphersuite " ECDHE_ECDSA_WITH_AES_128_CCM " 
and "ECDHE_ECDSA_WITH_AES_256_CCM " in openssl? 
I tried adding in the file tls1.h    # define 
TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM    0x0300C0AC
    # define TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM    0x0300C0AD
And modifing the file  ssl_ciph.c the functions    ssl_load_ciphers() ... And 
modifing the file evp_cipher.c and sssl_locl.cand finaly ssl_algs.c.
There are no way to make it works. It continue to give me  error: 
ssl3_get_client_hello:no shared cipher:s3_srvr.c:1420
thanks.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Generating dh parameters multithreaded?

2017-03-15 Thread Salz, Rich via openssl-users
> It takes a long time. Is there some way to have it use all available cores 
> instead of just the one?

You'll have to write the code to do that parallelism yourself.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Generating dh parameters multithreaded?

2017-03-15 Thread Salz, Rich via openssl-users
> Are you suggesting that I should modify openssl myself to expose that
> functionality or are suggesting that there is a way to do that given the 
> already
> exposed functionality? If it is the latter could you point me in the right
> direction?

OpenSSL code does not do what you want.  You'll have to write it
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] [openssl-dev] verify depth behavior change from 1.0.2 to 1.1.0?

2017-04-04 Thread Short, Todd via openssl-users
Ben Kaduk:

Do we know the values that are being passed to SSL_CTX_set_Verify_depth() match 
the -verify_depth argument, or do they differ?
If they differ, do identical arguments to the function behave the same in 1.1.0 
and 1.0.2?

Viktor:

What we’re getting at here, is that this appears to be a potentially 
significant behavioral change. We want to understand it better.
--
-Todd Short
// tsh...@akamai.com<mailto:tsh...@akamai.com>
// "One if by land, two if by sea, three if by the Internet."

On Apr 3, 2017, at 4:43 PM, Viktor Dukhovni 
<openssl-us...@dukhovni.org<mailto:openssl-us...@dukhovni.org>> wrote:


On Apr 3, 2017, at 4:26 PM, Benjamin Kaduk 
<bka...@akamai.com<mailto:bka...@akamai.com>> wrote:

There was a fair amount of churn in x509_vfy.c with the inclusion
of the DANE stuff and whatnot, so it's not immediately clear to me
when this change actually happened.  I think there are good
arguments for the current 1.1.0 behavior and it doesn't really make
sense to try to change back to the historical behavior, but it would
be good to know when the change actually happened and that it is/was
a known change.  Ideally we could also document the different
behavior between 1.0.x and 1.1.0 better; any thoughts about where to
do so?

https://www.openssl.org/docs/man1.1.0/apps/verify.html

  -verify_depth num

Limit the certificate chain to num intermediate CA certificates.
A maximal depth chain can have up to num+2 certificates, since
neither the end-entity certificate nor the trust-anchor
certificate count against the -verify_depth limit.

https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_verify_depth.html

SSL_CTX_set_verify_depth() sets the maximum depth for the
certificate chain verification that shall be allowed for ctx.
(See the BUGS section.)
...
BUGS

The certificate verification depth set with SSL[_CTX]_verify_depth()
stops the verification at a certain depth. The error message
produced will be that of an incomplete certificate chain and
not X509_V_ERR_CERT_CHAIN_TOO_LONG as may be expected.

The 1.0.2 behaviour was under-documented and somewhat broken.  This
was fixed in 1.1.0.


Unfortunately, the SSL_CTX_set_verify_depth(3) was not brought up to date,
contributes welcome:

  https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_set_verify_depth.html

--
Viktor.

--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] [openssl-dev] verify depth behavior change from 1.0.2 to 1.1.0?

2017-04-04 Thread Benjamin Kaduk via openssl-users
On 04/04/2017 10:39 AM, Viktor Dukhovni wrote:
>> On Apr 4, 2017, at 10:41 AM, Short, Todd via openssl-users 
>> <openssl-users@openssl.org> wrote:
>>
>> Ben Kaduk:
>>
>> Do we know the values that are being passed to SSL_CTX_set_verify_depth()
>> match the -verify_depth argument, or do they differ?  If they differ, do
>> identical arguments to the function behave the same in 1.1.0 and 1.0.2?
> The "-verify_depth" argument to verify(1) just calls 
> SSL_CTX_set_verify_depth(3)
> with the given depth value.  In OpenSSL 1.1.0, this sets a limit on the
> intermediate CA count and returns sensible errors when the depth limit is
> exceeded.

(Pedantic note: the apps call X509_VERIFY_PARAM_set_depth() directly,
and s_client goes on to use SSL_CTX_set1_param().)  But the answer to
the actual question asked is the same, the depth argument used for
verification is just the one passed on the command line.  Behavior
differences stem in the library.

>> Viktor:
>>
>> What we’re getting at here, is that this appears to be a potentially
>> significant behavioral change. We want to understand it better.
> The code no longer returns misleading errors, and is better documented
> in verify(3), but it seems I missed additional requisite documentation
> updates in SSL_CTX_set_verify_depth(3).  It would be great if someone
> volunteered to complete the documentation update.
>

I have it on my list of things to look at if there is free time
available (which is hardly guaranteed).

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] ssl_method_st not defined

2017-04-10 Thread Salz, Rich via openssl-users
No, the functions you want aren’t provided right now.  What are you trying to 
do?  Why are you modifying the session, outside of the TLS protocol?
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] ssl_method_st not defined

2017-04-11 Thread Salz, Rich via openssl-users
  >>in my case, i need to initialize the SSL , and set parameters as same 
as client  and server (depending on direction ) and call OpenSSL to decrypt the 
data.
  >>before openSSL 1.1.0 as all member variables could be set, it was easy 
task, 
 >> now i do face issues with ssl_session and  ssl_session->s3

Those functions aren’t present.  A pull request to add them, and document them, 
would be useful and would go into 1.1.0 an d master.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Escaped Issuer/Subject

2017-04-12 Thread Salz, Rich via openssl-users
> I thought about escaping regarding DN itself (LDAP DN).

Look up the -nameopt flag in, say, x509.pod  Then if you need C code, trace 
through what apps/x509.c does.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] EVP Functions

2017-04-12 Thread Salz, Rich via openssl-users
You need to learn what CBC mode is.  Block ‘n’ feeds into block ‘n+1’  The 
behavior you describe is not wrong.

Blocks are padded, so only read outlen bytes.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Multithreading: Global locks causing bottleneck in parallel SSL_write calls

2017-04-12 Thread Benjamin Kaduk via openssl-users
On 04/12/2017 05:54 AM, dipakgaigole wrote:
> Hi,
>  
> I have a windows multi-threaded SSL server application which handles
> each client request in a new thread. The Server handles different
> types of requests. One of the request type is like “send file” where
> server thread has to read a file from local filesystem and send the
> content to the client.
> Server configurations:
> FIPS: Enabled
> SSL Protocol: TLSv1.2
>     Cipher: AES256-SHA

The OpenSSL PRNG story is currently not so great, yes.
But maybe you should try without FIPS, and also with a different
cipher?  AES256-SHA is both CBC and SHA1, neither of which is really a
current best practice.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Certificate chain validation

2017-04-21 Thread Salz, Rich via openssl-users
No, you must have a chain up to a local trust anchor.

You can install the intermediate in your trust store.

--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

From: Lei Kong [mailto:leik...@msn.com]
Sent: Thursday, April 20, 2017 9:38 PM
To: openssl-users@openssl.org
Subject: [openssl-users] Certificate chain validation

When validating a certificate issued by an intermediate certificate authority, 
I noticed that I need to install both the root and the intermediate CA 
certificate locally (with update-ca-certificates on ubuntu 16.04). Verification 
fails if only root CA cert is installed (intermediate is not installed), is 
this expected behavior? Why do I need to install intermediate CA cert locally? 
Locally installed root CA cert is not enough to validate intermediate CA cert?

Is it possible to make chain validation work with only root CA cert installed 
locally?

Thanks.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] SSL_shutdown return error when close in init

2017-04-19 Thread Salz, Rich via openssl-users

> The OpenSSL documentation makes it clear
> that you must keep calling the same asynchronous function with the same
> parameters until the async job has completed.

Is there a way we can (relatively cheaply) check for that type of programming 
error and return an "in progress on another op" error?
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] EVP_CIPHER_CTX array not compiling

2017-04-23 Thread Salz, Rich via openssl-users
>#define OTEXT_AES_KEY_INIT(ctx, buf) { \
>        EVP_CIPHER_CTX_init(ctx); \
>        EVP_EncryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, buf, ZERO_IV); \
>        }

Most of the datatypes are now opaque.  This means you can't have an 
EVP_CIPHER_CTX object, but instead a pointer to it.  Don't call the init 
function, call the new function.  And then that has rippling changes in your 
code.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Code heatlh delayed a week

2017-04-22 Thread Salz, Rich via openssl-users
We are still reviewing several PR's from the previous code health, which was 
about converting tests to use the new test framework.  With this extended time 
period, we'll have ended up converting almost all the tests, which is great.

We'll announce the next project toward the end of the week.  Thanks for all 
your participation, folks!


--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] scripting creating a cert

2017-03-09 Thread Salz, Rich via openssl-users
Yes there are easier ways to do this.  Set up a conf file and use it (via the 
-conf flag).  You can use env vars, set default values, and so on.  Look at the 
config manpages, https://www.openssl.org/docs/manmaster/man5/

For a fuller example, see https://www.openssl.org/~rsalz/pki.tgz
 

PS -- find me in Chicago and I can answer questions, Robert :)
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] [openssl-dev] Openssl 1.0.2 stable SNAP 20170309 issue

2017-03-09 Thread Salz, Rich via openssl-users
Already fixed.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] [AES-GCM] TLS packet nounce_explicit overflow

2017-03-09 Thread Salz, Rich via openssl-users
No, it does not do this automatically.

if the nounce _explicit overflows or overlaps , then does openssl code 
handles it (atleast by initiating renegotiation )?

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] PKCS#7

2017-03-14 Thread Salz, Rich via openssl-users
> If so, would it be possible in principle to decrypt an encrypted PKCS#7 
> envelope only knowing which AES key was used ?

Yes.  But maybe not with the openssl api's :)
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Extracting Handshake Information

2017-03-13 Thread Salz, Rich via openssl-users
> Is there a way in openssl we can extract the protocol(TLS/DTLS ) handshake 
> information, like in clienthello,  the protocol version, ciphersuites 
> offered, Random,  session id etc.

Look at the code in apps/s_client and apps/s_server and see what it prints in 
various debug modes.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] error making Private RSA

2017-03-07 Thread Salz, Rich via openssl-users
> > My source can be viewed at: mt-umunhum-wireless.net/Sources/rsa/rsa.c

Gives a 403.

> > My main guess is that your allocation for the PEM buffer is too small
> > -- is key/key_len pointing to a static buffer?
> 
>  It points to a char string

Not sure what that means.  Please post your code here.  It should be something 
like
char key[2048];
int keylen = sizeof key;
 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] openssl-compat patch for OpenSSL 1.0.2 and below?

2017-04-03 Thread Benjamin Kaduk via openssl-users
On 04/02/2017 07:42 PM, Jeffrey Walton wrote:
> I was looking at Kurt Roeckx 's patches for OpenSSH at
> https://github.com/openssh/openssh-portable/pull/48/files. See
> libcrypto-compat.h and libcrypto-compat.c.
>
> Are the source files distributed by OpenSSL? If so, where is the download?
>
> If not, can the OpenSSL project consider adding them. They are very
> useful for managing projects that depend on older and newer OpenSSL
> libraries. OpenSSL taking on the responsibility would help ensure
> consistency and quality.
>

The topic of backwards-compat headers has come up a few times previously
on the list; with the resolution being a call for some external
contributor to host and maintain them.

So, no, OpenSSL does not distribute such things.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Query regarding upgrading TLS compatibility

2017-04-03 Thread Benjamin Kaduk via openssl-users
On 04/03/2017 04:42 AM, Hegde, Harsha wrote:
>
> Hi,
>
> I have an query regarding TLS compatibility used in my application.
> Currently we are using TLS1.2 to connect to a third party sever. Is
> there any way to always use the highest TLS available version without
> modifying or recompiling the application code whenever there is any
> new version of TLS released.
>
>

The closest you can come is to use TLS_method() (or the client- or
server-specific version of it), which will prefer the highest version
supported by the library, but also be able to use older versions if
needed in order to interoperate with the peer.  It's not entirely clear
whether your question was about restricting to specifically the highest
version, to the exclusion of older versions.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] openvpn 2.4.1 with gost

2017-04-18 Thread R . S via openssl-users
Hello.
I have just build openvpn with openvpn-build with these versions:
OPENSSL_VERSION="${OPENSSL_VERSION:-1.0.2k}"
PKCS11_HELPER_VERSION="${PKCS11_HELPER_VERSION:-1.11}"
LZO_VERSION="${LZO_VERSION:-2.10}"
TAP_WINDOWS_VERSION="${TAP_WINDOWS_VERSION:-9.21.2}"
OPENVPN_VERSION="${OPENVPN_VERSION:-2.4.1}"
OPENVPN_GUI_VERSION="${OPENVPN_GUI_VERSION:-11}"

Compilation success, no problem. 
i modified openssl.cnf to include engine gost.
openssl_conf = openssl_def 
[ openssl_def ]                
engines = engine_section
[ engine_section ]
gost = gost_section
[gost_section]
default_algorithms=ALL
engine_id=gost 

openssl ciphers | tr ":" "\n" | grep GOST
GOST2001-GOST89-GOST89
GOST94-GOST89-GOST89

openssl list-message-digest-algorithms | grep gost
gost-mac
md_gost94
gost-mac
md_gost94

openssl shows me GOST.

--
gost-server.ovpn
-
dev tap
engine gost
auth gost-mac
cipher gost89
tls-cipher GOST2001-GOST89-GOST89
#comp-lzo yes
ca ca.crt
cert server.crt
key server.key
dh    dhparam.pem
server 10.0.0.0 255.255.255.0
keepalive 10 120
proto tcp
socket-flags TCP_NODELAY
persist-key
persist-tun

openvpn gost-server.ovpn says me
-- Initializing OpenSSL support for engine 'gost'
-- Deprecated TLS cipher name 'GOST2001-GOST89-GOST89', please use IANA name 
'TLS_GOSTR341001_WITH_28147_CNT_IMIT'
-- OpenSSL: error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher match
-- Failed to set restricted TLS cipher list: GOST2001-GOST89-GOST89
-- Exiting due to fatal error

Please help with this problem
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Code health tuesday is back!

2017-08-02 Thread Salz, Rich via openssl-users
After a short summer vacation, our biweekly code health Tuesday is back!

Our topic this time is ... documentation.

There have been many updates to the manpages in the past few weeks, typo fixes, 
additional clarifications, and so on.  We hope that folks will be emboldened to 
help fill in the gaps, but any PR to make things better will help.

Please submit your fixes by Tuesday; if you can't add a label, put 'code 
health' somewhere in the commit message.  Please have a CLA onfile; if your 
commit is trivial and not copyrightable, put "CLA: trivial" in the commit 
message.  If you have a whole bunch of trivial fixes, put them in one PR 
(separate commits if you want).  Make sure any changes pass find-doc-nits (a 
script in util).  You can also use that script to list places where 
documentation is missing:

; ./util/find-doc-nits -u | fgrep '#'
# Found 4373 in util/libcrypto.num
# Found 1724 missing from util/libcrypto.num
# Found 464 in util/libssl.num
# Found 64 missing from util/libssl.num
# Checking macros (approximate)
# Found 246 macros missing (not all should be documnted)

Thanks for all your help in improving OpenSSL!

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to get a bye or word from BIGNUM in OpenSSL 1.1?

2017-08-02 Thread Salz, Rich via openssl-users
> It would be nice if the OpenSSL devs ate their own dogfood and suffered
> that inefficient crap. I would wager that crap would change.

There is a price to be paid with opaque structures.  In most cases the benefits 
are worth it.

I'm curious why you want that.  A small PR with doc and function should be easy 
enough.  Are you using BN as an extensible byte array?
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Personal CA: are cert serial numbers critical?

2017-08-16 Thread Salz, Rich via openssl-users
➢ So, in summary, do I need to ensure cert serial numbers are unique for my CA?

Why would you not?  The specifications require it, but those specifications are 
for interoperability. If nobody is ever going to see your certs, then who cares 
what’s in them?  

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Core dump on DSA_free -- libssl.so.1.0.0

2017-08-11 Thread Jason Qian via openssl-users
Thanks for the help,


DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize);
bool bRet = false;
if (pDSA)
{
bRet = DSA_verify(0, signature, 20, (BYTE *) pFile, dwSize, (DSA *) pDSA)
== 1 ? true : false;
DSA_free(pDSA);
}

Jason
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0

2017-08-11 Thread Salz, Rich via openssl-users
> DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize);

Where and how is pKey set?  Not that the manpage says it's incremented to point 
*past* the object, so you need something like
unsigned char data = .whatever your data source is .
unsigned char *pKey = data
and then use  in your call

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Displaying subjectAtlName othername content

2017-08-14 Thread Salz, Rich via openssl-users
➢ Is there anyway to display the basic ASN.1 structure here so I can see 
what was stored in the cert?

openssl asn1parse


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] SSL_CTX_set_msg_callback does not invoke for received change_cipher_spec

2017-08-15 Thread Benjamin Kaduk via openssl-users
On 08/14/2017 11:30 PM, Vakul Garg wrote:
>
> Hi
>
>  
>
> I am using openssl s_server and s_client with ‘-msg’ option to track
> tls1.2 records being exchanged.
>
> I notice that while transmitted change_cipher_spec record gets printed.
>
> But the reception of change_cipher_spec record is not reported.
>
>  
>
> For the received change_cipher_spec record, the callback (registered
> using SSL_set_msg_callback_arg) gets invoked only for record header,
> but not for the record content.
>
> So there is no callback for received SSL3_RT_CHANGE_CIPHER_SPEC. For
> the transmitted change_cipher_spec record, things are fine.
>

There is no variable content in a ChangeCipherSpec message -- a single
byte of value 1.  Are you trying to argue that the callback still ought
to be invoked out of some philosophical sense of consistency? 

In any case, if I remember correctly, ChangeCipherSpec is processed at a
very low layer and isn't propagated up to the layer that invokes the
message callback, and if one looks at the tradeoff between extra
complexity to propagate it up versus not having a message callback event
for it, there are some reasonable reasons to prefer the status quo.

>  
>
> Further, message callback invocation is correct for DTLS1.2 case as well.
>
>

(Just with respect to ChangeCipherSpec?)

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Does openssl pick low level interface or high level interface to do encrypt?

2017-08-10 Thread Salz, Rich via openssl-users
What OpenSSL does is not necessarily obvious.  The INSTALL document talks about 
the no-asm configuration option.  Details about what the assembler code does in 
terms of optimization are only available by reading the source code comments in 
the various Perl files that generate the assembler, mostly.

On x86, the assembly code uses the CPUID instruction (see the 
OPENSSL_ia32cap.pod manpage) to determine if various instructions (AES, SSE, 
MMX, etc) are available and will use them if so.  For other processors, similar 
tests are performed if at all possible.

I have added this to the FAQ

--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

From: - JinsongJi [mailto:jjsb...@hotmail.com]
Sent: Wednesday, August 09, 2017 9:09 AM
To: openssl-users@openssl.org
Subject: [openssl-users] Does openssl pick low level interface or high level 
interface to do encrypt?

Hi,


For one simple operation: openssl enc -aes-256-cbc -salt -in foo.txt -out 
foo.enc
Does openssl pick classic implementation or AES-NI implementation to do this 
encrypt?

Does any user/application always pick classic implementation for AES operation 
regardless of AES-NI improves speed much?

Is there any document about this interface selection?

Thanks,
Jinsong
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Fwd: Does TLSv1.2 support 3DES

2017-08-09 Thread Salz, Rich via openssl-users
> May be my email subject is a little confusing. I'll put my question directly.
> 
> If I configure my server with the string "HIGH+TLSv1.2:!MD5:!SHA1", will it
> support 3DES?

No, as I showed.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0

2017-08-11 Thread Jason Qian via openssl-users
Thanks for look into this,

void * pKey = LockResource(hHandle);

The code works most of the time, only occasionally generates exception and
Not sure why on DSA_free(pDSA);




On Fri, Aug 11, 2017 at 2:57 PM, Salz, Rich <rs...@akamai.com> wrote:

> > DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) ,
> dwKeySize);
>
> Where and how is pKey set?  Not that the manpage says it's incremented to
> point *past* the object, so you need something like
> unsigned char data = .whatever your data source is .
> unsigned char *pKey = data
> and then use  in your call
>
>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0

2017-08-11 Thread Salz, Rich via openssl-users
Please read what I wrote.

The d2i functions *modify the pointer they are given.*  You have to give them a 
temporary copy.

--
Senior Architect, Akamai Technologies
Member, OpenSSL Dev Team
IM: richs...@jabber.at Twitter: RichSalz

From: Jason Qian [mailto:jq...@tibco.com]
Sent: Friday, August 11, 2017 3:14 PM
To: Salz, Rich <rs...@akamai.com>
Cc: openssl-users@openssl.org
Subject: Re: [openssl-users] Core dump on DSA_free -- libssl.so.1.0.0

Thanks for look into this,

void * pKey = LockResource(hHandle);

The code works most of the time, only occasionally generates exception and Not 
sure why on DSA_free(pDSA);




On Fri, Aug 11, 2017 at 2:57 PM, Salz, Rich 
<rs...@akamai.com<mailto:rs...@akamai.com>> wrote:
> DSA *pDSA = d2i_DSA_PUBKEY(NULL, (const unsigned char **) , dwKeySize);

Where and how is pKey set?  Not that the manpage says it's incremented to point 
*past* the object, so you need something like
unsigned char data = .whatever your data source is .
unsigned char *pKey = data
and then use  in your call

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] 802.1AR certificate generation and the config file

2017-08-11 Thread Salz, Rich via openssl-users
> Given these supported names, what goes into the config file to create a SAN
> without having to specify it on the command line?

In the certificate extensions section you do something like:
subjectAltName = dns:www.example.com, IP:127.0.0.1
and so on.  The "pki.tgz"

> And further it seems you are saying there is no support for HMN at all.

Right.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] 802.1AR certificate generation and the config file

2017-08-11 Thread Salz, Rich via openssl-users
> What is the procedure to get it added.  RFC 4108 has been around for a while,
> as has 802.1AR-2009.

Simplest way is to (get someone to) write the code and make a github pull 
requests.

Next way is to post a patch.

Next way is to open an issue and hope someone gets around to it.
 
> Though I am assuming from a prior comment that even if it were added
> today, it would not be available until the 1.1.1 release?

Right.  But someone could always backport the changes to their own 1.1.0 
release.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] 802.1AR certificate generation and the config file

2017-08-11 Thread Salz, Rich via openssl-users
> My challenge comes to subjectAltName and its subfield
> hardwareModuleName
> per RFC 4108.   I guess I am not 'getting' the subjectAltName section of
> 'man x509v3_config'.

Not all forms of SAN names are supported.  If you look in 
include/openssl/x509v3.h you see the following:
# define GEN_OTHERNAME   0
# define GEN_EMAIL   1
# define GEN_DNS 2
# define GEN_X4003
# define GEN_DIRNAME 4
# define GEN_EDIPARTY5
# define GEN_URI 6
# define GEN_IPADD   7
# define GEN_RID 8

crypto/x509v3/v3_alt.c you can find details and corner-case information.

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL used in our network engine (SLikeNet)

2017-08-14 Thread Salz, Rich via openssl-users
➢ I'd just like to quickly reach out to let you know that we released a new 
(open source) network engine in which we also utilize the OpenSSL library and 
want to thank you for the work you put into OpenSSL.


Congratulations.  Please post a link, especially since it is open source!

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Default Diffie Hellman Parameters

2017-07-10 Thread Salz, Rich via openssl-users
X25519 does not use DH parameters.

If you don’t set the parameters with a callback, or generate them and tell 
openssl to use them, then EDH will not be used.  Not that EDH is *not* the same 
as ECDHE.

Don’t use DH, use X25519, for a number of reasons.  Search “25519” to find more.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Openssl 1.1.0f support for building Openssh7.2p2 and above

2017-07-10 Thread Sravani Maddukuri via openssl-users
I will check with OpenSSH team on this. Thanks for the info.

Regards,
Sravani

On Mon, Jul 10, 2017 at 12:05 PM, Jeffrey Walton <noloa...@gmail.com> wrote:

> On Mon, Jul 10, 2017 at 2:01 AM, Sravani Maddukuri via openssl-users
> <openssl-users@openssl.org> wrote:
> >
> > Is there any plans in the future to get the support of OpenSSL 1.1.0 for
> > OpenSSH?
>
> You should ask the OpenSSH folks.
>
> Jeff
>
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Issue with TLS1.3 and s_time

2017-07-12 Thread Salz, Rich via openssl-users
In TLS 1.3 the “time” field went away.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


<    1   2   3   4   5   6   7   8   9   10   >