Re: [openssl-dev] [EXTERNAL] Re: PKCS12 safecontents bag type deviation from spec

2018-01-16 Thread Sands, Daniel
On Tue, 2018-01-16 at 14:50 +, Salz, Rich via openssl-dev wrote: > OpenSSL defines it as a SET OF and the spec says it’s a SEQUENCE > OF.  Ouch!  Will that cause interop problems if we change it?  (I > don’t remember the DER encoding rules) > > > Well, a SEQUENCE uses tag 16 while a SET

[openssl-dev] PKCS12 safecontents bag type deviation from spec

2018-01-15 Thread Sands, Daniel
After noticing that a safecontents bag written to a file was in a different order than I added them, I did some experimentation and discovered that it's sorting the list, which led me to notice that it's defining a safecontentsbag as a SET OF safecontents, which causes sorting:

Re: [openssl-dev] [EXTERNAL] Re: use SIPhash for OPENSSL_LH_strhash?

2017-01-11 Thread Sands, Daniel
With a small number of buckets, it seems to me that no hash algo will make you safe from a flooding attack. You can simply generate your hashes locally using whichever algo the server uses, and only send those that fit into your attack scheme. The data could even be pre-generated. The only way

Re: [openssl-dev] [EXTERNAL] Re: use SIPhash for OPENSSL_LH_strhash?

2017-01-11 Thread Sands, Daniel
Just a note from my own experience way back when: I tried hashing using various algos and measuring bucket use as the main comparison criteria. I found that the crypto hashes left a fair number of unused buckets. Of course, CRCs were far worse. What gave the most normal distribution was to

Re: [openssl-dev] [EXTERNAL] Re: [openssl.org #4473] Compile errors when compiling with C++ compiler

2016-03-24 Thread Sands, Daniel
On Thu, 2016-03-24 at 01:08 -0400, Jeffrey Walton wrote: Lack of relevance. C++ is NOT C. There many subtle and not so subtle differences. OpenSSL is written in C. Use a C compiler. 'make -k' is telling me its a little more than (ir)relevance. I see some stuff going on that's not allowed

Re: [openssl-dev] [EXTERNAL] Re: Fwd: Re: [openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-16 Thread Sands, Daniel
On Tue, 2015-11-17 at 00:01 +, Viktor Dukhovni wrote: On Mon, Nov 16, 2015 at 11:23:52PM +, Matt Caswell wrote: Disabling algorithms isn't the right answer IMO. I do like the idea of a "liblegacycrypto". That way people that only have need of current up-to-date crypto can stick with

Re: [openssl-dev] [EXTERNAL] Re: [openssl.org #4063] Client Hello longer than 2^14 bytes are rejected

2015-09-25 Thread Sands, Daniel
> > On Friday 25 September 2015 16:54:02 Alessandro Ghedini via RT wrote: > > > FWIW I checked a couple of TLS implementations I have around (GnuTLS > > > and s2n), and AFAICT they don't check for a maximum size at all. > > > > what do you mean by that? As we've said with Matt, you can't create a