DESCryptoServiceProvider encryption and OpenSSL decrypt

2010-11-09 Thread wizard2010
Hello everyone. I'm using .NET to encrypt a file using DES. I'm using this: DESCryptoServiceProvider, CryptoTransform and CryptoStream Anyone knows how to use OpenSSL to decrypt the file? Thanks in advance. Best Regards.

Re: openssl verify fails

2010-11-09 Thread Michael Ströder
Bruce Stephens wrote: Bruce Stephens bruce.steph...@isode.com writes: Dr. Stephen Henson st...@openssl.org writes: [...] Is that unmodified OpenSSL 0.9.8o? If so that's peculiar I get the expected error here. No, it's Debian's 0.9.8o-2. Ah, my fault. Obvious in retrospect: Debian's

Re: openssl verify fails

2010-11-09 Thread Victor Duchovni
On Tue, Nov 09, 2010 at 01:45:15PM +, Bruce Stephens wrote: Michael Str??der mich...@stroeder.com writes: Bruce Stephens wrote: [...] Ah, my fault. Obvious in retrospect: Debian's openssl finds the root cert because it's in the ca-certificates package! Did you use -CAfile

Re: openssl verify fails

2010-11-09 Thread Bruce Stephens
Michael Ströder mich...@stroeder.com writes: Bruce Stephens wrote: [...] Ah, my fault. Obvious in retrospect: Debian's openssl finds the root cert because it's in the ca-certificates package! Did you use -CAfile as in my original posting when testing? I did. Doesn't -CAfile set

Option -issuer_hash vs signature validation with -CAfile?

2010-11-09 Thread Jens Lechtenboerger
Hi there, I received an SMIME certificate and want to know the correct filename to use in the command openssl smime -verify -CAfile filename... In my particular example, openssl x509 -in smime.pem -issuer_hash -noout results in 9ec3a561. However, if I use that certificate (available as

Upgrading the key size in OpenSSL certificate

2010-11-09 Thread josh kirbey
Hi All, We are required to upgrade the sizes of private/public key pairs to 3072 bits from 1024 bits. We have two main data structures, X509Stack and PKCS7. We fill these two structures at the initialization by reading the PEM files on disk. During the upgrade process, I pick the X509stack and

.RSA conversion

2010-11-09 Thread tera tellence
Dear All, I have a certificate with a .rsa extension. On googling I found that this is a pkcs7 format using MD5 with RSA. Now my question is, is there a way to convert it to openssl specifics and handle?? I want to read it in say PEM.. thanks

Re: Option -issuer_hash vs signature validation with -CAfile?

2010-11-09 Thread Dr. Stephen Henson
On Tue, Nov 09, 2010, Jens Lechtenboerger wrote: Hi there, I received an SMIME certificate and want to know the correct filename to use in the command openssl smime -verify -CAfile filename... The hash based filename doesn't apply to the -CAfile option: you can name the file anything you

Re: Upgrading the key size in OpenSSL certificate

2010-11-09 Thread Victor Duchovni
On Tue, Nov 09, 2010 at 11:42:14AM -0500, josh kirbey wrote: Hi All, We are required to upgrade the sizes of private/public key pairs to 3072 bits from 1024 bits. Welcome to bureaucratic insanity. There is no rational basis for this requirement. Even 2048 bits is excessively conservative

Re: Upgrading the key size in OpenSSL certificate

2010-11-09 Thread josh kirbey
Thanks Viktor for your quick response. Even I am contesting the unnecessary usage of 3072 bit sized key. Surprisingly, in the given scenario, if I write this line of code before modifying the certificate it works like a charm. pkcs7 = PKCS7_dup(pkcs7); Below is the flow of APIs 1) pkcs7 =

Re: Upgrading the key size in OpenSSL certificate

2010-11-09 Thread Victor Duchovni
On Tue, Nov 09, 2010 at 01:31:40PM -0500, josh kirbey wrote: Thanks Viktor for your quick response. Even I am contesting the unnecessary usage of 3072 bit sized key. Surprisingly, in the given scenario, if I write this line of code before modifying the certificate it works like a charm.

Re: Option -issuer_hash vs signature validation with -CAfile?

2010-11-09 Thread Jens Lechtenboerger
On 2010-11-09, Dr. Stephen Henson wrote: On Tue, Nov 09, 2010, Jens Lechtenboerger wrote: Hi there, I received an SMIME certificate and want to know the correct filename to use in the command openssl smime -verify -CAfile filename... The hash based filename doesn't apply to the

.deb packages for 1.0.0?

2010-11-09 Thread Chris Bare
Has anyone seen .deb packages for openssl 1.0.0? I took a quick stab at converting the 0.9.8 debian files, but I ran into a lot of problems and it takes a long time to debug. -- Chris Bare ch...@bareflix.com __ OpenSSL Project

EC domain params instead of the OID in the pkcs8 key file?

2010-11-09 Thread Stef Hoeben
Hi, using the openssl tool, we generated an Elliptic Curve key pair and put it into a pkcs8 file: 0 48: SEQUENCE { 32: INTEGER 0 6 48: SEQUENCE { 86: OBJECT IDENTIFIER ecPublicKey (1 2 840 10045 2 1) 176: OBJECT IDENTIFIER '1 2 840 10045 3 1 7'

Re: EC domain params instead of the OID in the pkcs8 key file?

2010-11-09 Thread Victor Duchovni
On Tue, Nov 09, 2010 at 09:34:42PM +0100, Stef Hoeben wrote: Hi, using the openssl tool, we generated an Elliptic Curve key pair and put it into a pkcs8 file: 0 48: SEQUENCE { 32: INTEGER 0 6 48: SEQUENCE { 86: OBJECT IDENTIFIER ecPublicKey (1 2 840

Config file being ignored

2010-11-09 Thread Bram Cymet
Hi, I have the following in my /etc/ssl/openssl.cnf file: openssl_conf= openssl_def [openssl_def] engines = engine_section [engine_section] pkcs11 = pkcs11_section [pkcs11_section] engine_id = pkcs11 SO_PATH = /usr/local/lib/engines/engine_pkcs11.so MODULE_PATH =

Re: Config file being ignored

2010-11-09 Thread Bram Cymet
Here is an example of what happens if I run it from the command line interface: openssl OpenSSL engine dynamic -pre SO_PATH:/usr/local/lib/engines/engine_pkcs11.so -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre MODULE_PATH:/usr/lib64/opensc-pkcs11.so (dynamic) Dynamic engine loading support

Re: Config file being ignored

2010-11-09 Thread Bram Cymet
Ok I am getting closer. I can get the engine to load now with this (better) config file openssl_conf = openssl_def [openssl_def] engines = engine_section [engine_section] pkcs11 = pkcs11_section [pkcs11_section] engine_id = pkcs11 dynamic_path = /usr/local/lib/engines/engine_pkcs11.so

Re: Force ASN.1 encoding routines to keep existing encoding

2010-11-09 Thread Martin Boßlet
OK, I guess this is the only way to go then. Thanks for the help! Regards, Martin 2010/11/9 David Schwartz dav...@webmaster.com: On 11/6/2010 7:44 AM, Martin Boßlet wrote: I just tested, whether the BER-encoding is preserved if I do not alter any of the contents. Unfortunately, it seems as