RE: AES counter mode

2003-06-27 Thread Thierry Boivin
At 12:21 24/06/03 -0400, you wrote: -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of David Maurus Sent: Tuesday, June 24, 2003 7:29 AM To: [EMAIL PROTECTED] Subject: Re: AES counter mode The easiest way to go about it would be to increment the user

RE : pkcs#12 creation with secret bags

2003-06-27 Thread Claude CONVERT
Thanks for your answer. I allready tried with the ASN1_ANY, but it's failed too. Actually, i inspected the implentation of the PKCS12_item_pack_safebag function and found that it can't support any secret bag. The solution which works is the following code: PKCS12_BAGS *bag; PKCS12_SAFEBAG

Re: AES counter mode

2003-06-27 Thread David Maurus
Michael Sierchio wrote: Completely. If we have confidence in the cipher and the secrecy of the key, make the nonce all zeroes. There's good reason for not doing this in the case of IPsec, but not for SSL/TLS. In theory, you may be right ;-). But: For one, I think that it can't hurt NOT to

Re: AES counter mode

2003-06-27 Thread Gtz Babin-Ebell
Hello David, David Maurus wrote: Goetz Babin-Ebell wrote: The application specifies 4 datas: 1. a step size 2. a bit mask. 3. a (optional) pointer to a function that is called if the step bits that are not in the bit mask: 4. a (optional) pointer to a function doing the counting; if

[openssl.org #649]

2003-06-27 Thread via RT
__ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]

[openssl.org #502] TXT_DB error number 2

2003-06-27 Thread via RT
This thing happens when certificates share common data. You cannot have two certificates that look otherwise the same. Either remove them by hand from the database, or properly revoke them using 'openssl ca -revoke xyz.crt' Why it fails with MySQL example, though, escapes me. Cheers, Kuba

RE: AES counter mode

2003-06-27 Thread Lee Dilkie
CTR mode offers very little advantage over CBC or CFB or OFB -- the motivation for IPsec was very high speed, parallel encryption with precomputation of the keystream (according to the Rt. Hon. Rev. Bellovin, IETF Security Area co-chair). A very important consideration for ultra high

Re: AES counter mode

2003-06-27 Thread Stephen Sprunk
Thus spake Thierry Boivin [EMAIL PROTECTED] I agree with this approach which leaves the crypto library very open and not to complex to manipulate, whatever the upper program to develop is. Generalized approach : as differencies for the various applications are the way to build the IV, ie:

Re: AES counter mode

2003-06-27 Thread Stephen Sprunk
Thus spake Richard Levitte - VMS Whacker [EMAIL PROTECTED] lee_dilkie (the other thing to remember is that CTR can be used with lee_dilkie any block cipher, it's not limited to AES) Absolutely. However, since it's currently very obviously an experimental field, and it was originally