Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread tincanteksup
On 29/12/2018 22:08, C.Wehrmeyer wrote: How am I supposed to get more adept when the documentation is a literal mess? Let me reverse that: What is the *point* of getting more adept with the API when I feel more and more disgusted by learning how it's working internally? Welcome to The

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Jordan Brown
On 12/29/2018 7:53 AM, Jakob Bohm via openssl-users wrote: > Well, these two latter arrays look like a stray copy of the HMAC > constants "ipad" and "opad", which (while looking like ASCII), are > defined as exact hex constants even on a non-ASCII machine, such > as PDP-11 or an IBM mainframe.

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Matt Milosevic
I do not want to complicate matters further, but there needs to be one thing clear here: this library is mainly developed and maintained by /volunteers/. They're putting in time and effort to improve the state of the crypto ecosystem, and they seem to be doing a damn good job at it, as even you,

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread C.Wehrmeyer
On 29.12.18 21:32, Viktor Dukhovni wrote: > I said it, neither because it can't be done, nor because it is > incompatible with session caching, or has anything to do with > ephemeral key agreement (which works just fine even with > session resumption), but simply because it is easier for a >

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Richard Levitte
When we're starting to stoop to this level, I think it's time to step away from the screen and take a few deep breaths... or maybe even go away and take a nap, go for a walk, or something else. Then, perhaps come back in a better mood. Cheers, Richard ( am off to sleep, it's getting late over

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Richard Levitte
In message <20181229.170846.804158981742723988.levi...@openssl.org> on Sat, 29 Dec 2018 17:08:46 +0100 (CET), Richard Levitte said: > In message <38b97114-0c66-40ed-f631-58aa20940...@gmx.de> on Sat, 29 Dec 2018 > 14:19:47 +0100, "C.Wehrmeyer" said: > ... > > What's wrong with that, you ask?

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Salz, Rich via openssl-users
> I didn't bother looking up what freeing entails - it's obvious to > anyone at this point that OpenSSL is a severe victim of feature creep, > that its memory allocation scheme is a mess, and long story short: I > will NOT free a perfectly fine object just because of incompetent

Re: [openssl-users] How can I compile nginx with openssl to support 0-rtt TLS1.3

2018-12-29 Thread Salz, Rich via openssl-users
* But I only get early data for get method. * When using post method, the server terminate connection. Is it related with openssl? If so, how can I do to allow post method? Early data can be replayed. It is only safe to use early data when the request is idempotent, like GET. You

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Filipe Fernandes
You really have no idea how to code. You look like one of those junior engineers that think they know it all. I won't be replying again, so don't need to get your hopes up. Na(o) sábado, 29 de dez de 2018, 17:19, C.Wehrmeyer escreveu: > On 29.12.18 16:53, Jakob Bohm via openssl-users wrote: >

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Viktor Dukhovni
> On Dec 29, 2018, at 8:19 AM, C.Wehrmeyer wrote: > > OK, so I've been reading the mails before going to sleep and spent some time > thinking and researching about this, and I've come to a conclusion: OpenSSL > is a goddamn mess, SSL_clear() is pretty much superfluous, and as such > shouldn't

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread J. J. Farrell
On 29/12/2018 17:18, C.Wehrmeyer wrote: On 29.12.18 17:21, J. J. Farrell wrote:> So instead of correct portable code which derives obviously and > straightforwardly from the specification, you'd write arrays of a > different length from the original, the first 48 bytes of which would > only be

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread C.Wehrmeyer
On 29.12.18 16:53, Jakob Bohm via openssl-users wrote: > The session caching in the SSL and TLS protocols is to skip the > expensive key exchange when reconnecting within a few seconds, > as is extremely common with web browsers opening up to 8 parallel > connections to each server. My outburst

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread J. J. Farrell
On 29/12/2018 13:19, C.Wehrmeyer wrote: ... Your corrections, improvements and enhancements would be very welcome as pull requests at https://github.com/openssl/openssl - thank you for your contributions. And don't give me any "trust us, we're experienced programmers" bullshit. I've

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Richard Levitte
In message <38b97114-0c66-40ed-f631-58aa20940...@gmx.de> on Sat, 29 Dec 2018 14:19:47 +0100, "C.Wehrmeyer" said: > I've written highly scalable libraries in the past before, and one > thing you always want to do there is to trim fat. Sure, but: > Now add to that the fact that OpenSSL has been

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread Jakob Bohm via openssl-users
On 29/12/2018 14:19, C.Wehrmeyer wrote: I don't have access to the actual testing environments until Wednesday next year, so I've had to create a private account. > Which version of OpenSSL is this? (I don't remember if you said this > already). I'm not entirely sure, but I *think* it's

Re: [openssl-users] Authentication over ECDHE

2018-12-29 Thread C.Wehrmeyer
I don't have access to the actual testing environments until Wednesday next year, so I've had to create a private account. > Which version of OpenSSL is this? (I don't remember if you said this > already). I'm not entirely sure, but I *think* it's 1.1.0.

Re: [openssl-users] Decrypting an OpenSSL encrypt AES256-CBC data

2018-12-29 Thread Jakob Bohm via openssl-users
On 29/12/2018 13:41, Ertan Küçükoglu wrote: Hello, Windows program does not know length of data. I would like to use some kind of standard method and use exact method on Windows to decrypt. I think my problem is really that I do not know what "padding" is used by default. I have found below

Re: [openssl-users] Decrypting an OpenSSL encrypt AES256-CBC data

2018-12-29 Thread Ertan Küçükoglu
Hello, Windows program does not know length of data. I would like to use some kind of standard method and use exact method on Windows to decrypt. I think my problem is really that I do not know what "padding" is used by default. I have found below function. However, there is no detailed

Re: [openssl-users] How can I compile nginx with openssl to support 0-rtt TLS1.3

2018-12-29 Thread Jakob Bohm via openssl-users
On 29/12/2018 07:42, carabiankyi wrote: Thanks for your advice. I get early data when I configure nginx ssl_early_data on. But I only get early data for get method. When using post method, the server terminate connection. Is it related with openssl? If so, how can I do to allow post method?