DH Prime Question

2008-04-14 Thread Julian
Hi, I am working on an application that is both a client and a server. The DH prime is stored in the binary for the server. Since the Server will exists inside the Client is there a considerable risk of embedding the DH p into the code? The alternative is to have the Server generate a

Re: DH Prime Question

2008-04-14 Thread Bernhard Froehlich
Julian schrieb: Hi, I am working on an application that is both a client and a server. The DH prime is stored in the binary for the server. Since the Server will exists inside the Client is there a considerable risk of embedding the DH p into the code? The alternative is to have the Server

Using OpenSSL cryptographic functions in a multi-threaded application

2008-04-14 Thread wang yanbo
Hi: We are using only the OpenSSL cryptographic functionality, the EVP and HMAC functions, in a multi-threaded application. Do we need to do anything to ensure thread safety ? The documentation mentions CRYPTO_set_locking_callback() and CRYPTO_set_id_callback() ,but we are not calling these

Re: DH Prime Question

2008-04-14 Thread jimmy bahuleyan
Bernhard Froehlich wrote: Julian schrieb: Hi, I am working on an application that is both a client and a server. The DH prime is stored in the binary for the server. Since the Server will exists inside the Client is there a considerable risk of embedding the DH p into the code? The

Possibly unintended side-effect in BIO_nread0

2008-04-14 Thread Keller, Michael
Hi, I wrote an SSL layer over a custom network layer (IOCP on Windows, poll() on UNIX) for my employer, using the non-copy functions BIO_nread and BIO_nwrite. I am aware that they are not official, and in particular lack documentation. So it doesn't make much sense to speak about bugs, as there

Re: DH Prime Question

2008-04-14 Thread Julian
My fear is that get a hold of P will allow for someone else to use it to start a protocol disassembly. For instance anyone could create a DHE-RSA-AES256-SHA TLS server and use P to listen for connections, of course if would have to have a cert signed by CA to proceed even if they have P.

RE: Using OpenSSL cryptographic functions in a multi-threaded application

2008-04-14 Thread Mark
We are using only the OpenSSL cryptographic functionality, the EVP and HMAC functions, in a multi-threaded application. Do we need to do anything to ensure thread safety ? The documentation mentions CRYPTO_set_locking_callback() and CRYPTO_set_id_callback() ,but we are not

Re: DH Prime Question

2008-04-14 Thread jimmy bahuleyan
Julian wrote: My fear is that get a hold of P will allow for someone else to use it to start a protocol disassembly. For instance anyone could create a DHE-RSA-AES256-SHA TLS server and use P to listen for connections, of course if would have to have a cert signed by CA to proceed even if they

Re: DH Prime Question

2008-04-14 Thread Julian
Thanks jb that clears up a lot. j On Apr 14, 2008, at 6:14 AM, jimmy bahuleyan wrote: Julian wrote: My fear is that get a hold of P will allow for someone else to use it to start a protocol disassembly. For instance anyone could create a DHE-RSA-AES256-SHA TLS server and use P to listen

SSL overhead

2008-04-14 Thread Tomas Neme
We have our own TCP implementation, and we're thinking of using a BIO_s_mem to add an SSL layer to it. The plan is: read the socket, put the encrypted data into the ssl object's BIO, and then do a read from it. Likewise, produce the data, feed it into OpenSSL, and then take the data from the BIO

problem with PKCS7_decrypt

2008-04-14 Thread shankar ks
Hi , I have encrypted the data using pkcs7_encrypt and stored the content in one file . and I called the same file as a input for the decrypt using pkcs7_decrypt Api and copied the data to a file . then if i open the output file, i have the orginal data which i encrypted . but the problem is on

Re: problem with PKCS7_decrypt

2008-04-14 Thread Dr. Stephen Henson
On Mon, Apr 14, 2008, shankar ks wrote: Hi , I have encrypted the data using pkcs7_encrypt and stored the content in one file . and I called the same file as a input for the decrypt using pkcs7_decrypt Api and copied the data to a file . then if i open the output file, i have the orginal

Re: DH Prime Question

2008-04-14 Thread Michael Sierchio
Julian wrote: My fear is that get a hold of P will allow for someone else to use it to start a protocol disassembly. For instance anyone could create a DHE-RSA-AES256-SHA TLS server and use P to listen for connections, of course if would have to have a cert signed by CA to proceed even if they

Re: SSL overhead

2008-04-14 Thread Tomas Neme
I'm getting started with ssl, and there's a lot of things I don't get about the library, small, and quite a lot of them Isn't there an IRC channel, or some kind of faster communication way than this? The documentation's poor at best, and I don't completely get the general concepts. From reading

Re: SSL overhead

2008-04-14 Thread Tomas Neme
general concepts. From reading examples I figure that only the BIO_f_ssl does encryption-decryption when written into? so what should Or doing SSL_write into a SSL object with a BIO_s_mem object as the write-bio will write the encrypted data into it? T -- |_|0|_| |_|_|0| |0|0|0| (\__/)

Re: usig apache and pkcs12 for auth, pass phrase needed

2008-04-14 Thread Deceased
One dev wrote: El vie, 11-04-2008 a las 17:01 +0300, Deceased escribió: Hi, I'm using apache and pkcs12 certs to for auth., but I cannot make web browser to ask pass phrase every time I connect to it, only for import pass on cert install. I'm using firefox. Is there any way to make pkcs12

Re: SSL overhead

2008-04-14 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tomas Neme wrote: | The documentation's poor at best, and I don't completely get the | general concepts. From reading examples I figure that only the | BIO_f_ssl does encryption-decryption when written into? so what should | I do if I want to

RE: SSL overhead

2008-04-14 Thread David Schwartz
The documentation's poor at best, and I don't completely get the general concepts. From reading examples I figure that only the BIO_f_ssl does encryption-decryption when written into? so what should I do if I want to provide an api that has functions b_encrypt and encrypt_flush? I think you

How to use a custom elliptic curve in crypto/ec?

2008-04-14 Thread Mark Hansen
Does anyone know of any documentation or examples on how to use a custom elliptic curve with ECDSA and ECDH of openssl's crypto library? It doesn't look like support of custom curves is built-in. So, I have tried to duplicate what was done with built-in curves in crypto/ec/ec_curve.c to

RE: Hash input and output

2008-04-14 Thread Dave Thompson
From: [EMAIL PROTECTED] On Behalf Of Badra Sent: Friday, 11 April, 2008 09:57 static char *login=login; static char *password=password; static char *label=label; These could better be pointers to const char, since you shouldn't and don't try to modify the strings pointed to. const

RE: Security pedanticism versus usability (and where PKIX fails)

2008-04-14 Thread Dave Thompson
From: [EMAIL PROTECTED] On Behalf Of Kyle Hamilton Sent: Thursday, 10 April, 2008 07:39 David Schwartz wrote: And with respect to the other thread, I agree with you. The level of security should be the highest that doesn't require sacrificing things that are more important than