[openssl-users] Slightly OT: X.509 & PCKS10 generation in Perl

2018-07-28 Thread Felipe Gasper
Hi all, Based on some comments I’ve seen lately, I thought it might be helpful to mention Crypt::Perl (https://metacpan.org/pod/Crypt::Perl), a Perl crypto toolkit I’ve written that implements RSA, ECC, and Ed25519 and can generate TLS certificates and CSRs. I mention it

Re: [openssl-users] Using a TPM to sign CSRs

2018-07-28 Thread William Roberts
On Sat, Jul 28, 2018, 09:13 Devang Kubavat wrote: > Hi Kaarhik, > > Please refer https://github.com/ThomasHabets/openssl-tpm-engine. It is > OpenSSL TPM Engine. It will help to offload all crypto operation to TPM. > Is this for tpm2.0? > Regards, > Devang. > > On Tue, Jul 24, 2018 at 4:48 PM,

Re: [openssl-users] openssl cms -decrypt failing due to malloc(3) failure

2018-07-28 Thread Salz, Rich via openssl-users
>It would appear that both commands fail due to them being unable to allocate more memory to slurp the rest of the input file's contents into. Is this intentional behaviour? It is a known issue. -- openssl-users mailing list To unsubscribe:

[openssl-users] openssl cms -decrypt failing due to malloc(3) failure

2018-07-28 Thread Christian Böhme
Hello all, Assume that we have $ uname -srvmpio Linux 4.4.0-109-generic #132-Ubuntu SMP Tue Jan 9 19:52:39 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux $ openssl version OpenSSL 1.0.2g 1 Mar 2016 $ printenv SHELL /bin/bash $ ulimit -a core file size (blocks, -c) 0 data seg size

Re: [openssl-users] Using a TPM to sign CSRs

2018-07-28 Thread Devang Kubavat
Hi Kaarhik, Please refer https://github.com/ThomasHabets/openssl-tpm-engine. It is OpenSSL TPM Engine. It will help to offload all crypto operation to TPM. Regards, Devang. On Tue, Jul 24, 2018 at 4:48 PM, Kaarthik Sivakumar wrote: > Hello > > I need to create a key pair using a TPM

Re: [openssl-users] Ed25519 and X.509

2018-07-28 Thread Felipe Gasper
Ah ok. Thank you for clarifying! -FG > On Jul 28, 2018, at 7:42 AM, Matt Caswell wrote: > > > >> On 28/07/18 12:23, Felipe Gasper wrote: >> I knew about this one. I see OIDs here for the key algorithm, but not the >> signature/hash algorithm .. ? I’m looking for the OID that precedes the

Re: [openssl-users] request for TLBleed information / non-constant-time vulnerabilities

2018-07-28 Thread Michael Wojcik
> From: Michael R. Hines [mailto:mrhi...@digitalocean.com] > Sent: Friday, July 27, 2018 19:06 > > Forgive the stupid question, but what's the takeaway for a cloud > provider? Well, in general, it's probably the commonplace that security is a process, not a product. There will always be new

Re: [openssl-users] Ed25519 and X.509

2018-07-28 Thread Matt Caswell
On 28/07/18 12:23, Felipe Gasper wrote: > I knew about this one. I see OIDs here for the key algorithm, but not the > signature/hash algorithm .. ? I’m looking for the OID that precedes the > signature in an X.509 structure. There is an example of a certificate signed with Ed25519 in that

Re: [openssl-users] Ed25519 and X.509

2018-07-28 Thread Felipe Gasper
I knew about this one. I see OIDs here for the key algorithm, but not the signature/hash algorithm .. ? I’m looking for the OID that precedes the signature in an X.509 structure. Thank you! -FG > On Jul 28, 2018, at 7:10 AM, Matt Caswell wrote: > > > >> On 28/07/18 03:49, Felipe Gasper

Re: [openssl-users] Ed25519 and X.509

2018-07-28 Thread Matt Caswell
On 28/07/18 03:49, Felipe Gasper wrote: > Hi all, > > Are there yet OIDs for Ed25519-signed X.509? I know about the drafts > for the key format but am not aware of actual OIDs to identify the signature > hash algorithm. > > Thank you! > See:

Re: [openssl-users] genpkey for ed25519

2018-07-28 Thread Matt Caswell
On 27/07/18 15:04, Tomas Mraz wrote: > On Fri, 2018-07-27 at 09:44 -0400, Robert Moskowitz wrote: >> Here we go again with figuring out what to put in the command >> lines. >> Dr. Google is not giving up enough answers. >> >> For ecdsa I started with: >> >> openssl genpkey -aes256 -algorithm