Re: EVP_CipherInit() and similar API changes

2002-02-13 Thread Dr S N Henson
Markus Friedl wrote: There could be more problems with other XXX_Init() or similar functions, so all semantic changes to functions from the 0.9.6 API should be reconsidered. All such changes could be a threat to existing applications and break them in subtle ways -- and this must be

Re: EVP macros for AES

2002-02-13 Thread Dr S N Henson
Stephen Sprunk wrote: Can someone help me implement the EVP macros for AES 128-bit CFB and OFB modes? It's too messy for me to figure out. I've got non-EVP versions written, but it appears the EVP macros do their own implementation of the various modes and only call the base ECB

Re: EVP_CipherInit() and similar API changes

2002-02-13 Thread Dr S N Henson
Markus Friedl wrote: I think this change is needed if you want EVP_CipherInit() to have a similar semantic as in OpenSSL 0.9.6. Index: evp/evp_enc.c === RCS file: /cvs/openssl/crypto/evp/evp_enc.c,v retrieving revision 1.28

Re: cvs commit: openssl/util libeay.num mkdef.pl mkerr.pl

2002-02-14 Thread Dr S N Henson
Any reason for this: /* Override the default new methods */ static int sig_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it) { if(operation == ASN1_OP_NEW_PRE) { ECDSA_SIG *sig; sig = OPENSSL_malloc(sizeof(ECDSA_SIG)); if

Re: 0.9.7 approaching

2002-02-14 Thread Dr S N Henson
Harald Koch wrote: Please test the 0.9.7-dev snapshots and report any problems that you found, even if they have been reported before (it's a good reminder for us), or even better, send us patches! It used to be possible to call X509_STORE_CTX_init() with a NULL X509_STORE pointer, in

Re: cvs commit: openssl/crypto/err err.c

2002-02-15 Thread Dr S N Henson
Bodo Moeller wrote: On Fri, Feb 15, 2002 at 10:55:13AM +, Ben Laurie wrote: This fix for err.c is correct. But evp_test.c should never have called OPENSSL_config() because OPENSSL_config() uses the configuration file found in an OpenSSL *installation*. If we want to use a

Re: cvs commit: openssl/crypto/engine hw_sureware.c

2002-02-15 Thread Dr S N Henson
Ben Laurie wrote: Hmm. You did this with a different name from me (idx instead of index_) - isn't that going to be irritating? I hadn't realised someone else had come across this. It should be consistent I suppose. Personally I always find variable names with appended underscores a little

Re: EVP macros for AES

2002-02-15 Thread Dr S N Henson
Stephen Sprunk wrote: Thus spake Richard Levitte - VMS Whacker: The current state is EAY legacy. His idea was that one should be able to pick out any of the algorithm directories and create a separate library for them (the old libdes is actually exactly the same as crypto/des/).

Re: AES, counter mode, etc.

2002-02-15 Thread Dr S N Henson
John Viega wrote: Additionally, with respect to counter mode, it might be best to implement external to the EVP proper interface, just like HMAC. There are a few issues I see that make counter mode a bit different from other modes: 1) You should be able to insert your own function for

Re: [PATCH] argument passing to app_verify_callback

2002-02-16 Thread Dr S N Henson
D. K. Smetters wrote: This is a patch to actually hand the user-supplied argument into calls to app_verify_callback. It affects the following 5 files: I've no objections to this patch. As long as there's an argument there we might as well use it. There is a way to pass application

Re: cvs commit: openssl/crypto/objects obj_dat.h obj_mac.h obj_mac.num objects.txt

2002-02-16 Thread Dr S N Henson
[EMAIL PROTECTED] wrote: levitte 16-Feb-2002 13:17:14 Modified:crypto/objects Tag: OpenSSL_0_9_7-stable obj_dat.h obj_mac.h obj_mac.num objects.txt Log: Adjust the NID names for the AES modes OFB and CFB to contain the number of feedback bits

Re: 0.9.7 approaching

2002-02-16 Thread Dr S N Henson
Harald Koch wrote: Are you in the US BTW if so can you resend you patch with a CC: to [EMAIL PROTECTED] I'm in Canada... OK, I've checked in a fix which should do what you want. Let me know of any problems. Steve. -- Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/

Re: EVP macros for AES

2002-02-19 Thread Dr S N Henson
Stephen Sprunk wrote: Thus spake Dr S N Henson: Maybe. It would be good to the the CFB and OFB modes working properly in general for other numbers of bits. The code for this is trivial; define me an API and I'll write the code underneath. Well I was thinking of something almost

Re: [PATCH] argument passing to app_verify_callback

2002-02-20 Thread Dr S N Henson
Bodo Moeller wrote: On Sat, Feb 16, 2002 at 11:16:23AM +0100, Richard Levitte - VMS Whacker wrote: I see no problem adding this patch. Queued. The problem is that the application callback prototype is incompatibly changed. Otherwise I would have added the argument instead of simply

Re: smime segfault on redhat 7.2

2002-02-22 Thread Dr S N Henson
alexandru matei wrote: Hello, I complied latest snaps (all snaps from 2002) on a Redhat 7.2 system. Make test finished succesfully. But on trying openssl smime -sign -encrypt command, it segfaults. The rest of commands (as far as I tested) are OK. Can you give me some advice? I'll

Re: key file

2002-02-22 Thread Dr S N Henson
Imran Badr wrote: Hi, The keyfile, representing an ecrypted private key, generated by openssl is ASN.1 type RSAPrivateKey (PKCS#1), ecrypted using DES-EDE3-CBC and then PEM encoded. Is that right ? It doesn't have to be triple DES encrypted. The traditional format involves adding some

Re: aes_init_key() broken for enc==-1

2002-02-24 Thread Dr S N Henson
Markus Friedl wrote: This patch is needed for EVP+AES --- crypto/evp/e_aes.c Sat Feb 16 13:39:53 2002 +++ crypto/evp/e_aes.c Sun Feb 24 16:54:59 2002 @@ -88,6 +88,8 @@ static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv,

Re: libeay.num

2002-02-26 Thread Dr S N Henson
Jeffrey Altman wrote: When compiling an application with OPENSSL_LOAD_CONF defined, the macro maps to OPENSSL_add_all_algorithms_conf(), which additionally calls OPENSSL_config(NULL). This will automatically load the openssl.cnf file for engine configuration. The idea behind all this

Re: libeay.num

2002-02-26 Thread Dr S N Henson
Jeffrey Altman wrote: Where is the openssl.cnf file expected to be found on Windows? The actual location is now determined by the function CONF_get1_default_config_file() and the openssl utility will be modified so everything goes through it. Currently this follows the same

Re: CSR Question

2002-03-05 Thread Dr S N Henson
[EMAIL PROTECTED] wrote: Hello, After generating CSR with openssl 0.9.8-dev, 0.9.7-dev or 0.9.6 'asn1dump' says that: 261 023: INTEGER 65537 : } : } : } 266 A00: [0] :

Re: cvs commit: openssl/ssl kssl.c s3_srvr.c

2002-03-12 Thread Dr S N Henson
Jeffrey Altman wrote: Just wondering. What are you compiling with that you are seeing warnings? VC++ 6.0 SP1, Kerberos 1.2.3 headers. I couldn't get the Kerberos 1.2.3 distribution to compile under Windows though. Can 1.2.4 sources/binaries be downloaded from anywhere outside the US? The

Re: cvs commit: openssl/ssl kssl.c s3_srvr.c

2002-03-12 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: From: Jeffrey Altman [EMAIL PROTECTED] jaltman Just wondering. What are you compiling with that you are seeing jaltman warnings? jaltman jaltman I compile this code without any warnings without these modifications. On Linux, with the target

Re: Memory Leak

2002-03-14 Thread Dr S N Henson
James Yonan wrote: I have an application which creates and destroys many SSL objects using SSL_new and SSL_free. The SSL objects are bound to memory BIOs rather than sockets. Here is a brief annotation of the relevent sections of code (with error checks removed): ks-ssl = SSL_new

Re: cvs commit: openssl/ssl kssl.c

2002-03-15 Thread Dr S N Henson
Jeffrey Altman wrote: Steve: Which flavor of Kerberos 5 are you using? Which release? I have a feeling the reasons that you are I are seeing different warnings is because the types of the fields in different flavors or versions are different. I'm compiling against MIT 1.2.4 which

Re: cvs commit: openssl/ssl kssl.c

2002-03-18 Thread Dr S N Henson
Jeffrey Altman wrote: Update on this. I've now got hold of MIT 1.2.4 sources from: http://non-us.debian.org/debian-non-US/pool/non-US/main/k/krb5 I tested compiling OpenSSL with KRB options under Linux (RHL 6.2) and it showed no warnings at all (my options are to use the -Wall

Re: Question about PKCS12_parse()

2002-03-19 Thread Dr S N Henson
Masanori Satake wrote: I tried parsing the PFX file attached(passphrase:test) using PKCS12_parse() function. However I cannot get the right value of DSA private key parameter x. And I tried executing open-ssl command following openssl -in target.pfx -out target.key -nocerts -nodes. I

Re: openssl ca sets wrong authorityKeyIdentifier

2002-03-19 Thread Dr S N Henson
Michael Bell wrote: Hi, I found a bug in openssl ca. If you set authorityKeyIdentifier to keyid and issuer always then the keyid will be set correctly but the issuer is wrong. Example: Root-CA -- Sub-Level 1 CA -- Sub-Level 2 CA -- User If I issue a certificate for a user then

Re: API functions for ASN1 on openssl

2002-03-19 Thread Dr S N Henson
Benzy Gabay wrote: Hi, I'm trying programmatically to code / decode ASN1 streams. - Could someone tell me what are the set of API functions that I can use to code / decode ASN1 streams. Applications use the i2d/d2i functions to encode or decode data between memory and C structures

Re: cvs commit: openssl/ssl kssl.c

2002-03-19 Thread Dr S N Henson
Jeffrey Altman wrote: To make it very clear, the locations that I'm seeing warnings are: ssl\kssl.c: In print_krb5_data() kdata-length is unsigned In print_krb5_keyblock() keyblk-length is unsigned In print_krb5_princ() princ-realm.length and princ-realm.data[i].length are

Re: openssl ca sets wrong authorityKeyIdentifier

2002-03-19 Thread Dr S N Henson
Michael Bell wrote: Dr S N Henson schrieb: Michael Bell wrote: Hi, I found a bug in openssl ca. If you set authorityKeyIdentifier to keyid and issuer always then the keyid will be set correctly but the issuer is wrong. Example: Root-CA -- Sub-Level 1 CA -- Sub

Re: How to add a new X.509 v3 extension id?

2002-03-19 Thread Dr S N Henson
Kiyoshi Watanabe wrote: Dear All, I am writing a code to add my private extension. For the extesion id, where I should look at and add it? Each standard extension has the id like NID_basic_constraints. If I want to write this, ex = X509V3_EXT_conf_nid(NULL,

Re: openssl ca sets wrong authorityKeyIdentifier

2002-03-19 Thread Dr S N Henson
Robert Joop wrote: the user cert has the user CA's DN in the issuer DN (CN=User CA) and the root CA's DN in the authority key identifier DirName (CN=Test-CA (G4)), see the attached example. but the user cert's authority key identifier keyid is the user CA cert's subject key identifier

Re: Question about PKCS12_parse()

2002-03-20 Thread Dr S N Henson
Masanori Satake wrote: I tried parsing the PFX file attached(passphrase:test) using PKCS12_parse() function. However I cannot get the right value of DSA private key parameter x. And I tried executing open-ssl command following openssl -in target.pfx -out target.key -nocerts -nodes. I

Re: API functions for ASN1 on openssl

2002-03-21 Thread Dr S N Henson
Benzy Gabay wrote: Dr S N Henson, First I want to thank you for the answer. Secondly, you mentioned in your answer that I should use version 0.9.7. I can't seem to find the 0.9.7 on openssl.org. where can I get d/l it from? It hasn't been released yet but you can get development

Re: manpage of EVP_SealFinal

2002-03-21 Thread Dr S N Henson
thomas poindessous wrote: Hi, in manpage (version 0.9.6b et version 0.9.7-stable-SNAP-20020317), there is : -- int EVP_SealFinal(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl); and EVP_SealUpdate() and EVP_SealFinal() return 1 for success and 0

Re: DES...

2002-03-21 Thread Dr S N Henson
Jeffrey Altman wrote: From: Jeffrey Altman [EMAIL PROTECTED] jaltman I prefer that des_old.h be compatible with libdes since that apps that jaltman are built using it assume that the api they were using was constant jaltman and unchanging. The way things work now, there is at

Re: use evp? (was DES...)

2002-03-21 Thread Dr S N Henson
Rodney Thayer wrote: At 09:29 PM 3/21/2002 +, S.Henson wrote: Is there some particular reason why such applications couldn't use the EVP layer? An attempt has been made to keep this consistent and to make any enhancements backwards compatible. In fact some of the more recent changes

Re: strangeness in `x509 -noout -text` output

2002-04-28 Thread Dr S N Henson
Lutz Jaenicke wrote: On Fri, Apr 26, 2002 at 12:38:05PM +0200, Robert Joop wrote: `x509 -noout -text` prints inconsistent output. ... openssl x509 -noout -text -in old.pem | grep Issuer: Issuer: [EMAIL PROTECTED], CN=CA UCO, O=Universidad de Cordoba, C=ES ... openssl x509

Re: [PATCH] md4 for openssl 0.9.5a

2000-08-16 Thread Dr S N Henson
Lewis McCarthy wrote: Hi, Evan Carew wrote re: MD4: Because if it is bundled into a standard package such as this you can ship source or executable code designed to link to it that will do things like crack open NT boxes that still use it. Recently, while at a major bank in the US

Re: s/mime

2000-08-20 Thread Dr S N Henson
Simon Josefsson wrote: apps/smime.c contain code, documentation seem to be somewhat nonexisting/unstructured so the source was more useful for me at least. I've got some plain text docs for the stuff I originally did for Celo. I haven't found time to convert to pod yet. ObPatch: Could

Re: Nonblocking again. Don't want OpenSSL to do any networking.

2000-08-22 Thread Dr S N Henson
Jeffrey Altman wrote: I think what he would like is the ability to do what the Microsoft SSPI does. Instead of OpenSSL being a layer between the I/O channel and the app, he would like the app to provide all I/O functions and have OpenSSL provide routines that encode and decode buffers

Re: Several issues concerning ASN1 in OpenSSL

2000-08-22 Thread Dr S N Henson
Sven Heiberg wrote: Hi! I'm not sure whether all topics touched describe bugs or not. At least these are things which seem unnatural to me. Thank you in advance for your attention and patience. Sven Heiberg - 1.

Re: Several issues concerning ASN1 in OpenSSL

2000-08-22 Thread Dr S N Henson
Svenning Sørensen wrote: I don't think that is quite enough. If BN_bin2bn returns NULL, there would still be a problem. Rather, I think you need something like: if (ret ai-type == V_ASN1_NEG_INTEGER) ret-neg = 1; Yes I looked at the code too quickly. I thought it exited if 'ret'

Re: Several issues concerning ASN1 in OpenSSL

2000-08-22 Thread Dr S N Henson
Peter Sylvester wrote: It is my understanding that an i2d function should return the length of the identifier, length and content octets, and that in the case described below i2d_ASN1_OBJECT did not. That's all. Based on Steve's message (which I read after sending my message), this

Re: Several issues concerning ASN1 in OpenSSL

2000-08-22 Thread Dr S N Henson
Peter Sylvester wrote: Yes thats something I'm considering for the ASN1 revision. Something like saving the lengths when the length is calculated and then using them when the stuff is written out. Maybe one could cache the length in the ASN1 object. As long as any object is only used

Re: Nonblocking again. Don't want OpenSSL to do any networking.

2000-08-22 Thread Dr S N Henson
Jeffrey Altman wrote: I was just attempting to summarize what the original poster was asking for. I think the primary problem is that there are no example apps showing how to use the different types of BIOs. No there isn't much, which is a pity because BIOs are very useful things and

Re: X509v3 extensions for root CA certs to support OCSP?

2000-08-23 Thread Dr S N Henson
Alicia da Conceicao wrote: My contacts at Netscape mentioned that a few CA'a like Versign have issued new root CA certs that support the new OCSP (Online Cert Status Protocol), specified in RFC 2560. He also mentioned that OCSP support will not only be included in future Netscape

Re: PEM file format

2000-08-29 Thread Dr S N Henson
Baber Amin wrote: Need info on the PEM format used by openSSL for keys. Is it just b64 encoding of der and other pkcs formats or something more? Any pointers to implementation and/or decoding would be appreciated? Try reading the docs to the applications, rsa, dsa and pkcs8 they give

Re: Convert ASN1_UTCTIME to time_t ?

2000-08-29 Thread Dr S N Henson
Rich Salz wrote: time_t TSPX_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm,int gmt) { ... if (strncmp(tm-data,strtime,15) 0) test -= (time_t)(1 i) ; This is curious code. It is trying to treat the TIME datatype as opaque, but then

Re: SV: Convert ASN1_UTCTIME to time_t ?

2000-08-30 Thread Dr S N Henson
"Hellan,Kim KHE" wrote: An ASN1_UTCTIME_get() function is probably exactly what I am looking for, but the problem is that I can't see that such a function exists? I have looked everwhere in my OpenSSL 0.9.5a installation, but I can't find it??? crypto/asn1/a_utctm.c,

Re: PEM file format

2000-08-30 Thread Dr S N Henson
Baber Amin wrote: Thanks, so let me get this straight. 1. openSSL PEM format for importing and exporting keys is a b64 encoding of DER encoded public and private keys, yes/no. Yes but "DER encoded public and private keys" doesn't mean much, since it doesn't specify what structure is

Re: How to check key_usage X509v3 extension ?

2000-09-04 Thread Dr S N Henson
Peter Onion wrote: I need to check if a certificate is marked for a particular key usage. I can get the extension and dump (as text) its contents. I've looked at how the string name for each bit in the extension is found in the function i2v_ASN1_BIT_STRINGS() but I can't see any

Re: Some man-pages

2000-09-10 Thread Dr S N Henson
Lutz Jaenicke wrote: Hi! As the usual non-blocking question had to be answered again in the last days, I thought it would be better to provide some man-pages instead of writing things again and again... (Do I really think this helps? ...) Well it will be something else for newbies to

Re: [PATCH] Support for directoryName format in GeneralName fields

2000-09-12 Thread Dr S N Henson
Oliver King wrote: Hi, We'd like to submit the following patch to OpenSSL, which allows you to specify the directoryName format for X509v3 extensions such as subjectAltName, crlDistributionPoints, etc. It parses RFC2253-style distinguished names, so you can specify something like the

Re: RSA_private_encrypt

2000-09-15 Thread Dr S N Henson
"montinip@libero." wrote: Hi everybody, I have a problem: I am developing a project in which I need to use 'special' RSA private keys. I use RSA_generate_key() to generate the key pair and the I use BN_copy to modify manually tha value of rsa-d. If I check with RSA_check_key the test

Re: BIO_ctrl() defaule return value...

2000-09-17 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: I'm surprised this hasn't been discovered yet. Stephen just discovered that the default return value (the value returned when a specific control command is unimplemented) from the BIO *_ctrl() functions is 0. However, that is also an "OK" value from a

Re: asn1/x_attrib.c

2000-09-19 Thread Dr S N Henson
Peter Sylvester wrote: It seems to me that SMIMEEncryptionKeyPreference ::= CHOICE { issuerAndSerialNumber [0] IssuerAndSerialNumber, receipentKeyId [1] RecipientKeyIdentifier, subjectAltKeyIdentifier [2] SubjectKeyIdentifier } is not supported since d2i_ASN1_TYPE

Re: rewriting the ASN1

2000-09-20 Thread Dr S N Henson
SCH wrote: What is the goal of rewriting the ASN1 code? Will Steve try some ASN1 compiler? As to my vision, The c code generated by ASN1 compiler is dirty. Maybe we can write the ASN1 code in openssl with C++. I am to build some PKIX stuff with the current ASN1 routines in Openssl.So

Re: rewriting the ASN1

2000-09-20 Thread Dr S N Henson
Michael Sierchio wrote: Dr S N Henson wrote: One goal is to reduce code bloat. As such I want to avoid any option that results in lots of code. I'm planning an "intelligent" encoder and decoder that gets passed a tiny structure describing the ASN1 structure to encode

Re: rewriting the ASN1

2000-09-20 Thread Dr S N Henson
Frank Balluffi wrote: Steve, If the decoder possesses meta data, it would be nice for the decoder to report the location and cause of errors. For example, if the third extension in a certificate contained the illegal object identifier value 1.9.3.4, the decoder could report the

Re: rewriting the ASN1

2000-09-21 Thread Dr S N Henson
SCH wrote: To rewrite ASN1 code will change almost everything in openssl. the current nid--oid definig, the signing ,verifing of RSA and DSA, then the cert and request management, PKCS5,7,8,12, then the SSL handshake, the last but necessary, the demos and apps. I haven't look into the

Re: [BUG] X509_V_ERR_SUBJECT_ISSUER_MISMATCH weirdness

2000-09-22 Thread Dr S N Henson
Bodo Moeller wrote: On Fri, Sep 22, 2000 at 03:31:06PM +0200, Lutz Jaenicke wrote: I just tried Postfix/TLS 0.9.6 and found problems with certificate verification: 0.9.6 returned X509_V_ERR_SUBJECT_ISSUER_MISMATCH on a completely valid certificate. [...] Do you use a

Re: Minor incompleteness in verify.c docs

2000-09-23 Thread Dr S N Henson
Lutz Jaenicke wrote: Hi! In verify.c there is an option "-trusted", which is not documented in verify.pod. I am not sure that I understood all of the source of verify.c, at least I did not understand what this option is good for :-) Not much. It supplies a file of trusted certificates

Re: Object names

2000-09-25 Thread Dr S N Henson
Michael Ströder wrote: Richard Levitte - VMS Whacker wrote: X509_NAME_oneline(), it's displayed as "/Email=...". Other products, like the JDK, seem to name it "/EmailAddress=...". As you can see, that will create a problem when you try to use the representation used by one system

Re: Is PKCS#12 secure?

2000-09-27 Thread Dr S N Henson
zhu qun-ying wrote: I am actually quite new to the Crypto world, just about 2 months. While reading Peter Gutmann's article on breaking PKCS#12 formatted file, I am wondering is the implementation of OpenSSL's PKCS#12 routines subject to the same attack. What's the most secure format could

Re: Is PKCS#12 secure?

2000-09-27 Thread Dr S N Henson
zhu qun-ying wrote: Thank you for your clearence. There are still some information that I want to know. Is the default setting to PKCS12_create() will be sufficient? Or do I need to increase the mac_iter and nid_cert ciper to 3DES-CBC? They should be sufficient. Certificates are usually

Re: iis certificate renewal woes

2000-09-30 Thread Dr S N Henson
nagendra wrote: Hi, We're generating a CSR on IIS (win2k). When a certificate is already installed on IIS, it generates a PKCS#7 certificate renewal request rather than a PKCS#10 CSR. Furthermore the PEM header in the request is an invalid PKCS#7 header. As a result none of the openssl

Re: BER in pkcs7 encoding

2000-10-02 Thread Dr S N Henson
Jean-Marc Desperrier wrote: Hi, pkcs#7 DER structures generated by openssl have two header in BER (infinite length) for the two sequence at the very start of the encoding. Is there a good reason for that ? I have a tool that 's annoyed by this BER encoding and I think it should not

Re: d2i_GENERAL_NAMES

2000-10-03 Thread Dr S N Henson
Frank Balluffi wrote: I am unable to decode an authority key identifier extension containing a directory name choice in a Microsoft-Certificate-Server-generated certificate using OpenSSL's d2i_AUTHORITY_KEYID when d2i_GENERAL_NAMES is asked to expect the class universal (i.e.,

Re: d2i_GENERAL_NAMES

2000-10-03 Thread Dr S N Henson
Frank Balluffi wrote: Steve, Attached are: 1. cert.pem: sample certificate (PEM format) 2. cert.der: sample certificate (DER encoded) 3. cert.html: dump of cert.der (in HTML) 4. aki.der: AuthorityKeyIdentifier from sample certificate (DER encoded) 5. aki.html: dump of aki.der

Re: Object identifiers and ASN.1 syntax

2000-10-03 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: I'm trying to make a simple perl script that is capable of parsing through an ASN.1 module embedded in any document an extracting the OIDs from it. When I'm done with that, I'll extend it to be able to parse LDAP schemas entries as in RFC2256. Then

Re: Rijndael in OpenSSL

2000-10-03 Thread Dr S N Henson
Terje Elde wrote: * Ulf Moeller ([EMAIL PROTECTED]) [001003 18:01]: On Tue, Oct 03, 2000, Terje Elde wrote: Any thoughts around implementing Rijndael in OpenSSL? I assume it's something that's going to get done at some point in time, but have anyone thought about who will do it,

Re: OpenSSL Questions

2000-10-06 Thread Dr S N Henson
Jason Tanner wrote: I am thinking of using the OpenSSL library for a project I am working on but have a couple of questions. Perhaps someone in the know could answer them for me. 1. It would seem that the SSL/TLS library does not include the Blowfish crypto algorithm when

Re: [BUG?] BIO_sock_should_retry() on Win32

2000-10-07 Thread Dr S N Henson
"Reddie, Steven" wrote: [Firstly, I'm working with 0.9.5a, but the relevant 0.9.6 source seems to be unchanged.] This may be a bigger problem than just my specific case, but here is what I've found: We are using BIO_do_handshake() to accept socket connections, which results in a call

Re: Sanity check: RSA performance on Linux

2000-10-12 Thread Dr S N Henson
patrick engel wrote: Hi, First, thanks for providing an open source implementation of SSL. The package built with no problems on my Linux box. I have been running some bench marks for assymetric key encryption. Using RSA yeilds some very long encryption and decryption times. I'm

Re: Bug in openssl 0.9.6 for certificate verification

2000-10-13 Thread Dr S N Henson
Jean-Marc Desperrier wrote: I have some code that I could use to verify certificate, and that's not able to do it anymore when compiled with 0.9.6 I traced this to the following line (330) in the file by_dir.c This line has been changed from 0.9.5 to 0.9.6. I think the last argument in

Re: iPlant and OpenSSL

2000-10-18 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: Actually, that macro mumbo-jumbo should be avoided and we should adopt a new name standard, but that will also require a lot of work, not only on our part... Perhaps to version 1? Or dump the low level APIs... geoff Thoughts anyone? Well, apart

Re: negotiating EXP-RC4-MD5 with SSLv3

2000-10-27 Thread Dr S N Henson
Tarik Miller wrote: Greetings, I've posted this question to openssl-users and haven't received any responses so I figured I would try here as well. I've discovered that when using s_client, I cannot connect to my server using EXP-RC4-MD5 w/ SSLv3 or TLSv1. The minimal server example

Re: Problem with 1024 file descriptors

2000-10-29 Thread Dr S N Henson
Dan Kegel wrote: I'm doing it; right now, I have a single network thread doing all normal networking *and* SSL; after I write the load tests that demonstrate how woefully inadequate that is :-), I'll split that into two threads: one for doing the SSL accept / connect stuff, and one for

Re: Lots of SSL connections in few threads (was: Re: Problem with 1024file descriptors)

2000-10-29 Thread Dr S N Henson
Dan Kegel wrote: Dr S N Henson wrote: Dan Kegel wrote: I'm doing it; right now, I have a single network thread doing all normal networking *and* SSL; after I write the load tests that demonstrate how woefully inadequate that is :-), I'll split that into two threads: one

Re: Problem with 1024 file descriptors

2000-10-30 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: rsalz Also, have you looked at bio/bss_fd.c? rsalz rsalz Sure, but the issue is what OpenSSL uses interally, as I hope rsalz my example showed. Oh, absolutely. What I wanted to point out is that there is a BIO that uses file descriptors, which

Re: new engine

2000-11-01 Thread Dr S N Henson
Geoff Thorpe wrote: On Tue, 31 Oct 2000, Ben Laurie wrote: BTW: Right now, all the existing engine implementations typically work immediately without any "setup" beyond what they work out for themselves before, during, or after initialisation. Indeed, but its possible to imagine

Re: new engine

2000-11-01 Thread Dr S N Henson
Ben Laurie wrote: Dr S N Henson wrote: The idea behind this is that a simple engine aware application could then just call ENGINE_load_config("filename.cnf") and forget about any other details. The reason I suggested a handle instead of a filename was so that the data could

Re: Constification

2000-11-07 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: I've become irritated enough with some functions not having const used properly (or at least what appears proper), so I've started working on bringing better use of const to OpenSSL, as some may already have noticed. This may, for a few days, bring

Re: cvs commit: openssl/crypto/bn bn.h bn_exp.cbn_exp2.cbn_gcd.cbn_lib.c bn_mont.c bn_mul.c bn_prime.c bn_recp.cbn_shift.cbn_sqr.cbntest.c

2000-11-08 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: And oh, you may not have noticed, but the unconstification carried to a couple of other places. One of them is in the ASN.1 macros, but if I understood Stephen right, the new ASN.1 code he's working on will take away that problem (Stephen, I'd like to

Re: ASN1 query...

2000-11-10 Thread Dr S N Henson
Dr S N Henson wrote: Now since I've never heard a report of this problem I can only assume hardly anyone uses this parameter. Fixing the existing code is a very painful task and the only advice that can be given is don't use that parameter! There's another case I've just realised

ASN1 query...

2000-11-10 Thread Dr S N Henson
Does anyone reuse the (type **) parameter to the ASN1 functions and friends (such as PEM)? As many of you may know I'm currently revising the OpenSSL code and I'm seeing what features are used and which should be dumped or fixed. The parameter is one case where there is a feature which is

Re: ASN1 non blocking I/O...

2000-11-11 Thread Dr S N Henson
Dr S N Henson wrote: Another general ASN1 question. The revised OpenSSL ASN1 code will eventually have support for I/O based operations in addition to the current memory based operations which need to have the entire structure in memory (tricky if its a 1Gb structure on tape). Doing

Re: ASN1 query...

2000-11-11 Thread Dr S N Henson
Rich Salz wrote: So with that in mind, is there a good reason to try and have this functionality (but working this time!) in the new ASN1 code or should any existing structure be freed and a new one freshly allocate? Are refcounts on the ASN1 objects or higher-level? How do you

Re: cvs commit: openssl/crypto/evp bio_enc.c evp.h

2000-11-12 Thread Dr S N Henson
Ben Laurie wrote: [EMAIL PROTECTED] wrote: /* read in at offset 8, read the EVP_Cipher * documentation about why */ - i=BIO_read(b-next_bio,(ctx-buf[8]),ENC_BLOCK_SIZE); +

Re: ASN1 non blocking I/O...

2000-11-12 Thread Dr S N Henson
Dan Kegel wrote: Dr S N Henson wrote: The revised OpenSSL ASN1 code will eventually have support for I/O based operations in addition to the current memory based operations which need to have the entire structure in memory (tricky if its a 1Gb structure on tape). Doing

Re: cvs commit: openssl/crypto/evp bio_enc.c evp.h

2000-11-12 Thread Dr S N Henson
Ben Laurie wrote: Dr S N Henson wrote: Eh? Isn't the IV length the same as the block length? Nope. Rijndael's biggest IV is 16 bytes, but the biggest block is 32 bytes. I haven't checked why, so if someone wants to enlighten me... Well they can enlighten me too then. I can't see

Re: cvs commit: openssl/crypto/asn1 asn1t.h tasn_dec.c tasn_fre.c tasn_new.c tasn_utl.c

2000-11-14 Thread Dr S N Henson
Ulf Moeller wrote: On Tue, Nov 14, 2000, [EMAIL PROTECTED] wrote: +The BOOLEAN type now takes three values. Yeah, *that* is progress! Yes it reminded me of Eric's old signature about a tristate boolean in Windoze. Well strictly speaking two values are for DER and the other is only

Re: Use of OpenSSL for EPOC 32 used by Psion.

2000-11-15 Thread Dr S N Henson
[EMAIL PROTECTED] wrote: Hi all, Can we use OpenSSL to implement security in EPOC32.? Well there's no public port of OpenSSL to EPOC32 but there are a couple of problems anyway. OpenSSL is currently rather large so the result would be larger than 1Mb. The second is a problem with

Re: cvs commit: openssl/crypto/asn1 asn1t.h tasn_dec.c tasn_fre.ctasn_new.c tasn_utl.c

2000-11-15 Thread Dr S N Henson
Frank Balluffi wrote: Steve Henson said: BOOLEAN is an evil thing for the ASN1 code. Its declared as an 'int'. Every other type is declared as a pointer which is allocated as required: if it is NULL then the field is omitted (I'll be adding a check to see if thats allowed at some

Re: S/MIME in openssl

2000-11-19 Thread Dr S N Henson
Maxim Masiutin wrote: Hello openssl-dev! My question is: who is currently in charge of S/MIME implementation in openssl? Me probably. I would also like to implement such neat additions as draft-ietf-smime-compression, it would be great if we had two implementations

Re: rsa_lib.c

2000-11-25 Thread Dr S N Henson
Geoff Thorpe wrote: Hi y'all, Quick question about RSA_new() I wanted to run by interested parties; namely, RSA_new() does a bunch of initialisations of a new RSA structure prior to calling the RSA_METHOD's "init()" handler to do any tweaking to the new RSA structure that it may choose

Re: rsa_lib.c

2000-11-25 Thread Dr S N Henson
Geoff Thorpe wrote: On Sat, 25 Nov 2000, Dr S N Henson wrote: An application could always use the ex_data callback new_func() to do the initialization. Not really, because you'd need to wait until the CRYPTO_EX_DATA structure had actually been initialised (which is after init() gets

Re: rsa_lib.c

2000-11-25 Thread Dr S N Henson
Geoff Thorpe wrote: Unless I misunderstand the RSA_get_ex_new_index() stuff - calling it to just get an index from inside the init() handler the first time it happens (and passing NULL callbacks) and then using CRYPTO_[set|get]_ex_data with that index should be functionally equivalent to

Re: A Puzzle :-(

2000-11-25 Thread Dr S N Henson
Deng Rowe wrote: Hi there, Are there somebody having noticed this: struct bio_st/* From /openssl/crypto/bio/bio.h. */ { .. char *cb_arg; /* Here in the struct BIO, cb_arg is defined as pionter to char. */ ... }; yet, look at these codes: /* Form

  1   2   3   >