Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt?

2016-07-26 Thread Jim Carroll
July 26, 2016 12:07 PM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt? > > On Tue, Jul 26, 2016, Jim Carroll wrote: > > > Steve -- thanks, but I don't think I was clear enough. > > > > I am trying to get back the

Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt?

2016-07-26 Thread Jim Carroll
Perfect. thanks > -Original Message- > From: openssl-users [mailto:openssl-users-boun...@openssl.org] On > Behalf Of Salz, Rich > Sent: Tuesday, July 26, 2016 2:27 PM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt? > > > > What is

Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt?

2016-07-26 Thread Jim Carroll
: openssl-users@openssl.org > Subject: Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt? > > On Tue, Jul 26, 2016, Jim Carroll wrote: > > > After experimenting, I can confirm this is the same issue we're > seeing, > > although experiencing it very differently from

Re: [openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-21 Thread Jim Carroll
on > Sent: Thursday, July 21, 2016 3:00 PM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] Help finding replacement for > ASN1_seq_unpack_X509 > > On Thu, Jul 21, 2016, Jim Carroll wrote: > > > Steve, > > > > I ran into problems with swig when I tri

Re: [openssl-users] X509 Version changes?

2016-07-21 Thread Jim Carroll
I've run into what appears to be a change to defaults between 0.9.8 and 1.1.0, and I wanted to make sure it's not a bug we've introduced. While reviewing unittests, we see that calls to X509_REQ_new() generate an X509 object with the version set to -1. When we write this object to a PEM file

[openssl-users] PKCS7_sign conflict with PKCS7_decrypt?

2016-07-26 Thread Jim Carroll
Running into trouble -- any attempt to PKCS7_decrypt() S/MIME content that was created with PKCS7_sign()+PKCS7_encrypt() yields an empty result set. I have the distinct impression I'm doing something dumb -- but several days of debugging I'm completely stuck. I've created an MVCE and included it

Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt?

2016-07-26 Thread Jim Carroll
Dr. Stephen Henson > Sent: Tuesday, July 26, 2016 11:22 AM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] PKCS7_sign conflict with PKCS7_decrypt? > > On Tue, Jul 26, 2016, Jim Carroll wrote: > > > Running into trouble -- any attempt to PKCS7_decrypt() S

Re: [openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-21 Thread Jim Carroll
s-boun...@openssl.org] On > Behalf Of Dr. Stephen Henson > Sent: Thursday, July 21, 2016 9:53 AM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] Help finding replacement for > ASN1_seq_unpack_X509 > > On Wed, Jul 20, 2016, Jim Carroll wrote: > > > Thanks much..

Re: [openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-20 Thread Jim Carroll
inding replacement for > ASN1_seq_unpack_X509 > > On Tue, Jul 19, 2016, Jim Carroll wrote: > > > OpenSSL 1.1.0 has upgraded the safestack.h macro system, but I'm > having > > difficulty understanding the changes. I'm porting a piece of code > from > > OpenSSL 0.9.8 that

Re: [openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-21 Thread Jim Carroll
We are porting M2Crypto which is a python swig wrapper around OpenSSL. It currently supports OpenSSL 0.9.8 and we are porting it to 1.1.0. The 1.1.0 branch is really cool (clean, elegant code), but there were a few refactoring's that affected M2Crypto. Most were trivial getter/setter type

Re: [openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-21 Thread Jim Carroll
Thanks Rich! > -Original Message- > From: openssl-users [mailto:openssl-users-boun...@openssl.org] On > Behalf Of Salz, Rich > Sent: Thursday, July 21, 2016 8:57 AM > To: openssl-users@openssl.org > Subject: Re: [openssl-users] Help finding replacement for > ASN1_seq_unpack_X509 > > > >

[openssl-users] Help finding replacement for ASN1_seq_unpack_X509

2016-07-19 Thread Jim Carroll
OpenSSL 1.1.0 has upgraded the safestack.h macro system, but I'm having difficulty understanding the changes. I'm porting a piece of code from OpenSSL 0.9.8 that uses ASN1_seq_unpack_X509. In 0.9.8, safestack.h had this definition. #define ASN1_seq_unpack_X509(buf, len, d2i_func, free_func) \

[openssl-users] Trouble with BIO_s_mem() and SSL_new() on OpenSSL-1.1.0-pre7-dev

2016-08-05 Thread Jim Carroll
We have a non-blocking windows app that we are migrating to from OpenSSL 1.0.2i to 1.1.0-pre7-dev. We move data from sockets to SSL via BIO_s_mem() objects. rbio = BIO_new(BIO_s_mem()); wbio = BIO_new(BIO_s_mem()); ssl = SSL_new(ssl_ctx); SSL_set_bio(ssl, rbio, wbio);

[openssl-users] 'no shared cipher', TLS_method on OpenSSL-1-1-0-pre7-dev

2016-08-06 Thread Jim Carroll
Using OpenSSL 1.1.0-pre7-dev, our SSL server app is reporting: 10308:error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared cipher:ssl\statem\statem_srvr.c:1420: Client & server both set to use TLS_method() with default ciphers. With -DCIPHER_DEBUG enabled in our OpenSSL

Re: [openssl-users] Trouble with BIO_s_mem() and SSL_new() on OpenSSL-1.1.0-pre7-dev

2016-08-06 Thread Jim Carroll
penSSL-1.1.0-pre7-dev > > > > On 06/08/16 02:32, Jim Carroll wrote: > > We have a non-blocking windows app that we are migrating to from > OpenSSL > > 1.0.2i to 1.1.0-pre7-dev. We move data from sockets to SSL via > > BIO_s_mem() objects. > > > > &

Re: [openssl-users] 'no shared cipher', TLS_method on OpenSSL-1-1-0-pre7-dev

2016-08-06 Thread Jim Carroll
My bad - needed to initialize SSL_CTX_set_tmp_dh() BEFORE calling SSL_new(). From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Jim Carroll Sent: Saturday, August 06, 2016 6:59 AM To: openssl-users@openssl.org Subject: [openssl-users] 'no shared cipher', TLS_method