Re: [openssl-users] Chinese remainder algorithm

2018-08-20 Thread Jan Bilek
Hi Thulasi, Thank you for your email, it was an inspiration for our team to follow up. Final solution then looks like this: bool InitKey(RSA_ptr& pkey) { //Recalculate Modulus from provided components BnCtx ctx; { const BIGNUM* p; const BIGNUM* q; RSA_get0_factors(pkey.get(),

Re: [openssl-users] Anonymous DH (ADH) in real world applications

2018-08-20 Thread Viktor Dukhovni
> On Aug 19, 2018, at 8:41 AM, Kurt Roeckx wrote: > >> Does anyone know some examples of applications using >> ADH ciphersuites for TLS connections in production >> environment? > > At least postfix can use it for SMTP. And prefers it by default with opportunistic TLS, when authentication

Re: [openssl-users] Anonymous DH (ADH) in real world applications

2018-08-20 Thread Jakob Bohm
On 19/08/2018 14:36, Anton wrote: Hello Does anyone know some examples of applications using ADH ciphersuites for TLS connections in production environment? I know it is vulnerable to MITM, but it still can be useful, for example if communicating devices do not store state data for

[openssl-users] How to encode R and S of an ECDSA signature to ASN1 sequence

2018-08-20 Thread William Roberts
I can successfully deconstruct an an ECDSA Signature Sequence, but now I need to construct it, and I am getting lost. The format I need to build is: sECDSA-Sig-Value ::= SEQUENCE { r INTEGER, s INTEGER } I have r and s as buffers in the same format as returned from: d2i_ASN1_INTEGER() if one

Re: [openssl-users] TLS-Session

2018-08-20 Thread Short, Todd via openssl-users
TCP Nagle + TCP Delayed ACKs can cause what appears to be the ClientHello being retransmitted. Tweaking these TCP options will give you better initialization performance. TCP_NODELAY TCP_QUICKACK This may not help the "end session" issue. -- -Todd Short //

[openssl-users] Problem using GOST engine with OpenSSL_1_1_0-stable

2018-08-20 Thread Dmitry Belyavsky
Hello, I've found a problem when using GOST engine with OpenSSL_1_1_0-stable The command openssl s_client -connect tlsgost-256.cryptopro.ru:443 provides the following error report: 139771868619968:error:0306B067:bignum routines:BN_div:div by zero:crypto/bn/bn_div.c:179:

Re: [openssl-users] TLS-Session

2018-08-20 Thread Viktor Dukhovni
> On Aug 17, 2018, at 6:43 AM, Konstantinos Schoinas wrote: > > So my dpdk application is responding with the correct TLS alert and it > actually block the TLS session.I have seen the correct packet in wireshark as > well.I am also putting a picture with this mail in order to see the

[openssl-users] TLS-Session

2018-08-20 Thread Konstantinos Schoinas
Hello, I have deployed 3 VMs in my host (linux) pc.1 ubuntu Desktop and 2 ubuntu Servers. I am using ovs-dpdk(openvswitch-dpdk) in order to create a bridge and make the VMs speak to each other. The test-⁠case is this: VM1 : using openssl as a client to connect to an apache2 server hosted