[openssl.org #1710] Error when trying to install openssl in Solaris environment

2008-07-08 Thread sathyaprakash.sivaprakasam via RT
Hi, I downloaded the openssl-0.98 version and when trying to run ./config command i am getting the following error :- Can't open perl script ./util/mkdir-p.pl: No such file or directory *** Error code 2 The following command caused the error: /usr/perl5/5.8.4/bin/perl ./util/mkdir-p.pl

Re: simple command line client

2008-07-08 Thread Lucito07
Thanks for the feedback. Kindest regards, JLP chickenandporn wrote: Stunnel. It armours a basic connection into SSL, but you'd still need to run expect or nc. Allan On Sat, Jul 5, 2008 at 23:04, Lucito07 [EMAIL PROTECTED] wrote: Hi, I would like to know if any one knows

Re: simple command line client

2008-07-08 Thread Lucito07
Thank a lot for the feedback. I will give it a shot. On what platform can it be compiled? Is the code portable as I might have to debug here at the office on Windows, and we might deploy later on a Linux platform? Kindest regards, JLP toorandom wrote: I made a some I/O routines of SSL to

FIPS compliance for Diffie-Hellman

2008-07-08 Thread Nilay Tripathi
Hi All, I have a query regarding FIPS compliance for Diffie-Hellman api's in the openssl stack. FIPS uses the recommendation for pairwise-key establishment schemes from NIST. Document is SP800-56A. Rev.1 As per FIPS compliance requirement for DH, there are a couple of KAT (Known Answer Test)

Re: FIPS compliance for Diffie-Hellman

2008-07-08 Thread Kyle Hamilton
fips-1.1.2 does not have validation for Diffie-Hellmann. Which version are you looking at? -Kyle H On Tue, Jul 8, 2008 at 2:57 AM, Nilay Tripathi [EMAIL PROTECTED] wrote: Hi All, I have a query regarding FIPS compliance for Diffie-Hellman api's in the openssl stack. FIPS uses the

FIPS SSHv2 KDF

2008-07-08 Thread Nilay Tripathi
Hi, I am using openssl fips 1.1.2 stack. Can someone please help me with some source for DH KDF specified in Sec 5.8 of SP800_56A doc. Thanks, Nilay

Re: FIPS compliance for Diffie-Hellman

2008-07-08 Thread Kyle Hamilton
fips-1.1 is not available, fips-1.1.1 is revoked, fips-1.1.2 is current (without DH), fips-1.2.0 is currently submitted for validation. Steve M (of the OSS Institute, which is the sponsor for the validation) stated that the fast-tracking of the fips-1.1.2 validation was possible because of the

Re: FIPS SSHv2 KDF

2008-07-08 Thread Kyle Hamilton
With the caveat that any changes you make will not have validation, http://www.cryptopp.com/ has a C++ library which has certain binary versions FIPS-validated. It may be helpful as reference material. -Kyle H On Tue, Jul 8, 2008 at 4:06 AM, Nilay Tripathi [EMAIL PROTECTED] wrote: Hi, I am

Re: FIPS compliance for Diffie-Hellman

2008-07-08 Thread Nilay Tripathi
Thanks very much Kyle !! Lemme see if I can make some progress with that 1.2.0 code-base on this. - Nilay On Tue, Jul 8, 2008 at 5:17 PM, Kyle Hamilton [EMAIL PROTECTED] wrote: fips-1.1 is not available, fips-1.1.1 is revoked, fips-1.1.2 is current (without DH), fips-1.2.0 is currently

Re: FIPS compliance for Diffie-Hellman

2008-07-08 Thread Joshua Hill
On Tue, Jul 08, 2008 at 03:27:08PM +0530, Nilay Tripathi wrote: Generating 'p' randomly as a safe prime and using 'g' order as 5, the keys generated are not consistently passing Sec 5.6.2.4 KAT test. It would be a good idea for you to understand why this is, rather than just iterate until it

Re: FIPS SSHv2 KDF

2008-07-08 Thread Joshua Hill
On Tue, Jul 8, 2008 at 4:06 AM, Nilay Tripathi wrote: I am using openssl fips 1.1.2 stack. Can someone please help me with some source for DH KDF specified in Sec 5.8 of SP800_56A doc. On Tue, Jul 08, 2008 at 04:58:12AM -0700, Kyle Hamilton responded: With the caveat that any changes you make

[openssl.org #1711] DTLS: Handshake does not detect missing/incomplete records in flight.

2008-07-08 Thread Alex Lam via RT
Hi, This is somewhat related to RT #1709 In the case where one record within the flight is lost, the DTLS state machine will continue to move forward without detecting it. This is observed when the MTU is low and the cert was fragmented into multiple records. Let's say one fragment of the