RSA padding scheme for EVP_SealInit() ?

2022-11-03 Thread Norm Green
Hi In OpenSSL 3.x, what RSA padding scheme does EVP_SealInit() use? PKCS1 or OAEP ? In 1.1, I wrote my own version of this code that forced the padding to be OAEP and am wondering if I still need that in 3.x. Norm Green

Re: Secure Remote Password (SRP)

2022-10-17 Thread Norm Green
I'm also interested in the answer to these questions regarding SRP in OpenSSL v3. Our project still uses OpenSSL v1.1.1 with plans to move to v3 next year. However we use SRP extensively and will not be able to move to v3 if SRP support is soon to be no longer available. Norm Green GemTalk

Re: Checking if a key can sign / verify in 3.0

2020-08-21 Thread Norm Green
EVP_PKEY_can_verify() with some assurance such a PR would be accepted. Norm Green On 8/18/2020 6:01 PM, Norm Green wrote: In 3.0 I see this new function in evp.h : int EVP_PKEY_can_sign(const EVP_PKEY *pkey); Is there an equivalent way to check if a key can verify? I'm not seeing an obvious way to do

Checking if a key can sign / verify in 3.0

2020-08-18 Thread Norm Green
In 3.0 I see this new function in evp.h : int EVP_PKEY_can_sign(const EVP_PKEY *pkey); Is there an equivalent way to check if a key can verify? I'm not seeing an obvious way to do that.  Previously I used EVP_PKEY_meth_get_verifyctx() but that call is now deprecated in 3.0. thanks, Norm

Re: openssl 3 alpha 1 test failures on AIX

2020-05-06 Thread Norm Green
Kaduk wrote: On Wed, May 06, 2020 at 05:22:17PM -0700, Norm Green wrote: All tests on AIX fail like this.  Is this a known issue?  What debugging information is needed?  Should I open an issue on github? Also note I had to set LD_LIBRARY_PATH to the SSL build directory to get the tests to run at all

openssl 3 alpha 1 test failures on AIX

2020-05-06 Thread Norm Green
All tests on AIX fail like this.  Is this a known issue?  What debugging information is needed?  Should I open an issue on github? Also note I had to set LD_LIBRARY_PATH to the SSL build directory to get the tests to run at all. normg@sky>gmake test     make depend && make _tests

OpenSSL v3 alpha 1: include file problem

2020-04-27 Thread Norm Green
ssl.h.  Is this intentional or a bug? It's easy enough for me to fix this in my source code, but other packages that rely upon openssl break with "ssl.h is unusable" errors due of this change (OpenLDAP is one such example). Norm Green

Re: empty directory in the 1.1.1 series release tags

2020-04-21 Thread Norm Green
>I use the git release tags, not the tarballs. I do too, and I suspect many others do as well. The empty krb5 directory has not caused grief for me, but it would be nice if the git release tag directory structure matched the tarball. Norm Green On 4/21/2020 10:19 AM, Quanah Gibson-Mo

Re: EVP_aes_256_xts() problems with multiple calls to EVP_CipherUpdate

2019-09-30 Thread Norm Green
Could be, but that's not how EVP_CipherUpdate is documented to work.  If this is an XTS mode limitation and not a bug, shouldn't the limitation be documented on a man page somewhere?  And shouldn't my second call to EVP_CipherUpdate fail? Norm Green On 9/30/2019 8:04 PM, Thulasi Goriparthi

EVP_aes_256_xts() problems with multiple calls to EVP_CipherUpdate

2019-09-30 Thread Norm Green
; EVP_CipherUpdate(ctx, [512], , [512], 512); // second chunk EVP_CipherFinal(); (produces no additional data) I have a short C program that demonstrates the problem that I can post if necessary. Can anyone explain what's going on? Norm Green CTO, GemTalk Systems Inc.

Re: 1.1.1b crash (RUN_ONCE problem?)

2019-03-04 Thread Norm Green
with pthread_exit() or return to a known state such that no SSL calls are in progress in any thread before the process can safely exit(). On 3/1/2019 11:54 AM, Viktor Dukhovni wrote: On Fri, Mar 01, 2019 at 11:16:52AM -0800, Norm Green wrote: [ Please avoid non-breaking spaces in your posts

1.1.1b crash (RUN_ONCE problem?)

2019-03-01 Thread Norm Green
I'm debugging a failure in a debug build on Solaris SPARC in the below code in rand_lib.c.  On line 744, rand_meth_lock is NULL, which suggests the RUN_ONCE code is not working.  Wondering if anyone else has seen this problem? We did not see this issue in 1.1.1a.  Perhaps changes in the

[openssl-users] 1.1.1a test/rsa_complex link failure on Solaris

2018-11-23 Thread Norm Green
I'm seeing the following link failure on Solaris, both SPARC and x86_64 with 1.1.1a.  1.1.1 does not have this problem.  Adding -lcrypto to the link line makes the problem go away. Any suggestions on how to proceed? Norm Green rm -f test/rsa_complex ${LDCMD:-/opt/studio12.5/bin/cc} -m64

[openssl-users] Certificate Revocation List and SSL

2018-03-21 Thread Norm Green
How does one specify the CRL to the SSL_CTX when setting up a connection?  I would expect there to be something similar to SSL_CTX_use_certificate(), such as: int SSL_CTX_use_crl(SSL_CTX *ctx, X509_CRL *crl) but can nothing like that. Norm Green -- openssl-users mailing list To unsubscribe

Re: [openssl-users] OpenSSL 1.1.1pre2 alpha build error: MS Windows 32 bit

2018-03-01 Thread Norm Green
SSL version-specific?  SSL 1.1.0 builds clean on the same machine I'm wondering if the solution is code changes or On 3/1/18 04:27, Andy Polyakov wrote: I mean it might happen that it's not version-specific... -- openssl-users mailing list To unsubscribe:

[openssl-users] OpenSSL 1.1.1pre2 alpha build error: MS Windows 32 bit

2018-02-28 Thread Norm Green
It looks like 32 bit builds set the -WX flag (treat warnings as errors) while the 64 bit builds don't.     cl  -W3 -wd4090 -Gs0 -GF -Gy -nologo /MDd /Od -WX /Zi /Fdossl_static /I "." /I "crypto\include" /I "include" /I "crypto\ec\curve448\arch_32" /I "crypto\ec\curve448" -DDSO_WIN32

Re: [openssl-users] OpenSSL 1.1.1pre2 build failure on Darwin

2018-02-27 Thread Norm Green
:39:47 -0800, Norm Green <norm.gr...@gemtalksystems.com> said: norm.green> With CC=cc, I get this: norm.green> norm.green> cc  -I. -Icrypto/include -Iinclude -g -O0 -arch x86_64 -Wall norm.green> -Qunused-arguments -fPIC -DDSO_DLFCN -DHAVE_DLFCN_H norm.green> -DOPENSSL_NO_

[openssl-users] OpenSSL 1.1.1pre2 build failure on Darwin

2018-02-27 Thread Norm Green
With CC=cc, I get this: cc  -I. -Icrypto/include -Iinclude -g -O0 -arch x86_64 -Wall -Qunused-arguments -fPIC -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_NO_STATIC_ENGINE -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m

Re: [openssl-users] OpenSSL 1.1.1pre1 fails to build on AIX 7.1

2018-02-23 Thread Norm Green
Adding "-cru" to arflags for AIX in Configuratinos/10-main.conf solves the problem. On 2/23/2018 2:36 PM, Dennis Clarke wrote: On 23/02/18 05:31 PM, Norm Green wrote: Looks like no target .a file is passed to ar ? Note: OpenSSL 1.1.0 succeeds on this platform. /export/localne

[openssl-users] OpenSSL 1.1.1pre1 fails to build on AIX 7.1

2018-02-23 Thread Norm Green
Looks like no target .a file is passed to ar ? Note: OpenSSL 1.1.0 succeeds on this platform. /export/localnew/RISC6000.AIX/perl-5.24.0/bin/perl -i -pe 's/^.*\|//; s/ \/(\\.|[^ ])*//; $_ = undef if (/: *$/ || /^(#.*| *)$/); $_.="\n" unless !defined($_) or /\R$/g;' apps/s_socket.d.tmp ar -X

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-21 Thread Norm Green
On 2/21/2018 12:46 PM, Andy Polyakov wrote: And "the default for all v9 architectures is -xmemalign=8s". I'm getting confused.  Since I did not specify -xmemalign at all, why did the test fail with SIGBUS in the first place?  Seems like there should have been no alignment problem if the

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-21 Thread Norm Green
On 2/21/2018 9:42 AM, Dennis Clarke wrote: Which is correct way to do this on sparc systems. Why do you say that?  We've been building OpenSSL on SPARC for the past 7 years without that flag and it's worked just fine with only a few minor changes to the compile/link flags. Norm --

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-21 Thread Norm Green
On 2/21/2018 8:42 AM, Dennis Clarke wrote: Pretty sure I have done builds and tests. In fact I am certain of it. If you added -xmemalign=8s to the SPARC compiler flags (as shown in one of your emails from yesterday) then you would not see the problem.  -xmemalign=8s forces the compiler to

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-20 Thread Norm Green
Hi Dennis, You're right, I did modify the config file, sorry.  I did it so long ago I had forgotten.  I will email it to you shortly. Norm On 2/20/2018 10:14 AM, Dennis Clarke wrote: On 20/02/18 01:11 PM, Norm Green wrote: Just download and build v1.1.1 pre alpha 1 on Solaris.  It's

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-20 Thread Norm Green
Just download and build v1.1.1 pre alpha 1 on Solaris.  It's on ftp.openssl.org.  That's all I did.  Configure using solaris64-sparcv9-cc .  I'm using Solaris studio 12.3. Norm On 2/20/2018 10:01 AM, Dennis Clarke wrote: On 20/02/18 12:47 PM, Norm Green wrote: On 2/20/2018 5:43 AM, Michael

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-20 Thread Norm Green
On 2/20/2018 5:43 AM, Michael Wojcik wrote: Not by default. The comments in /usr/include/sys/feature_tests.h (on a Solaris system) explain this in excruciating detail, but in short you need either -DPOSIX_C_SOURCE=200112L or -D_XOPEN_SOURCE=600 (or the equivalent in the code) to compile with

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-20 Thread Norm Green
ns_elem_size); ret = ASN1_item_print(bio_err, o, 0, i, NULL); On 2/19/2018 9:00 PM, Viktor Dukhovni wrote: On Mon, Feb 19, 2018 at 01:45:26PM -0800, Norm Green wrote: # ASN1_LONG_DATA: #   success: TRUE t@1 (l@1) signal BUS (invalid address alignment) in asn1_item_print_ctx at line 155 in file

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-19 Thread Norm Green
s compiler which apparently does not define these macros. Nornm On 2/19/2018 1:20 PM, Norm Green wrote: The output is not too long. /export/localnew/sparc.Solaris/bin/gmake depend && /export/localnew/sparc.Solaris/bin/gmake _tests gmake[1]: Entering directory '/hamburg4/users

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-19 Thread Norm Green
205 in "driver.c"   [9] main(argc = 1, argv = 0x7fffec08), line 51 in "main.c" (dbx) On 2/19/2018 1:30 PM, Viktor Dukhovni wrote: On Feb 19, 2018, at 4:20 PM, Norm Green <norm.gr...@gemtalksystems.com> wrote: /export/localnew/sparc.Solaris/bin/gmake depend &a

Re: [openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-19 Thread Norm Green
Error 2 slow test failed On 2/19/2018 12:50 PM, Benjamin Kaduk wrote: On 02/19/2018 02:06 PM, Norm Green wrote: Not sure if this is expected on this platform? Test Summary Report --- ../test/recipes/04-test_asn1_encode.t    (Wstat: 256 Tests: 1 Failed: 1)   Failed test:  1  

[openssl-users] 1.1.1 pre1 tests failing on Solaris SPARC

2018-02-19 Thread Norm Green
Not sure if this is expected on this platform? Test Summary Report --- ../test/recipes/04-test_asn1_encode.t    (Wstat: 256 Tests: 1 Failed: 1)   Failed test:  1   Non-zero exit status: 1 ../test/recipes/90-test_secmem.t (Wstat: 256 Tests: 1 Failed: 1)

[openssl-users] OSSL_STORE_ctrl

2018-02-13 Thread Norm Green
In 1.1.1 pre-relase 1, we have this new function: int OSSL_STORE_ctrl(OSSL_STORE_CTX *ctx, int cmd, ... /* args */); Would it be possible to add a version that takes va_args like this? int OSSL_STORE_vctrl(OSSL_STORE_CTX *ctx, int cmd, va_list args); OpenSSL already have this precedent in

Re: [openssl-users] OpenSSL 1.1.1 pre-release 1 build failure

2018-02-13 Thread Norm Green
Turns out it only fails in my build environment and it builds clean as a stand-alone SSL build.  So it's something on my end. Sorry for the noise. Norm On 2/13/2018 2:59 PM, Matt Caswell wrote: On 13/02/18 21:06, Norm Green wrote: This is on Ubuntu 16.04with a build configured to be debug

[openssl-users] OpenSSL 1.1.1 pre-release 1 build failure

2018-02-13 Thread Norm Green
This is on Ubuntu 16.04with a build configured to be debug-linux-x86_64 normg@moop>gmake make depend && make _all make[1]: Entering directory '/export/moop3/users/normg/gs64-3xm1/slow50/openssl_1.1' make[1]: Leaving directory '/export/moop3/users/normg/gs64-3xm1/slow50/openssl_1.1' make[1]:

Re: [openssl-users] cert chain file ordering question

2018-01-10 Thread Norm Green
On 1/9/18 19:32, Viktor Dukhovni wrote: This Key Usage is more appropriate. When the "Key Usage" is present in a CA certificate, it*MUST* include "Certificate Sign". That was indeed the problem.  Thank you!! It seems strange to me that OpenSSL will allow creation of a CA cert (CA:TRUE) that

Re: [openssl-users] cert chain file ordering question

2018-01-09 Thread Norm Green
2018 4:55 PM, Viktor Dukhovni wrote: On Jan 9, 2018, at 7:28 PM, Norm Green <norm.gr...@gemtalksystems.com> wrote: It still doesn't verify correctly. Or correctly fails to verify? To simplify, I tried it with 1 intermediate CA. Here's the chain: rootCa.pem - self-signed roo

Re: [openssl-users] cert chain file ordering question

2018-01-09 Thread Norm Green
On 1/9/2018 3:57 PM, Viktor Dukhovni wrote: On Jan 9, 2018, at 6:43 PM, Norm Green <norm.gr...@gemtalksystems.com> wrote: What is the correct order of intermediate CA certs in the untrusted chain file? The untrusted CA list is a heap, the order is irrelevant. -- openssl-users m

Re: [openssl-users] cert chain file ordering question

2018-01-09 Thread Norm Green
Well that is not *at all* obvious from the documentation, but ok. What is the correct order of intermediate CA certs in the untrusted chain file? On 1/9/2018 3:36 PM, Viktor Dukhovni wrote: The correct way to verify a chain is to put the root CA in a CAfile, intermediate CAs in an

Re: [openssl-users] cert chain file ordering question

2018-01-09 Thread Norm Green
On 1/9/2018 6:03 AM, Benjamin Kaduk wrote: Did you try something like (with a 1.1.0 installation): openssl verify -CAfile RootCA.pem -untrusted chain.pem chain.pem with the leaf certificate as the first one in chain.pem? Same result. The only way it seems to work is if the leaf cert appears

[openssl-users] cert chain file ordering question

2018-01-08 Thread Norm Green
of things correct?  Seems like there should be a way for the openssl command to verify a chain file which will be used with the SSL_CTX_use_certificate_chain_file() function. Norm Green -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] OCB ciphers

2017-01-28 Thread Norm Green
This is with openssl 1.10d. When I run: ./openssl ciphers -v The OCB ciphers are not in the list. Is this an omission or intentional? Other AEAD ciphers are there (GCM). Thanks, Norm Green normg@bunk>./openssl ciphers -v |grep AEAD ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH

[openssl-users] Encrypting using EC public key

2017-01-14 Thread Norm Green
yYdrQv XmxFEr1AwKnmeD8dAg4F62ddmzX76fNaw1QqLbmEQTLdrEYM3KxUdA== -END PUBLIC KEY----- Norm Green -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] AECDH problem: works in 1.0.2, fails in 1.1

2016-12-14 Thread Norm Green
That was it. Thanks Matt! On 12/13/16 15:48, Matt Caswell wrote: On 13/12/16 21:09, Norm Green wrote: I have a simple C program that works in 1.0.2 but fails with the same code in 1.1. Here's the psuedo code for the client and server: Server: const SSL_METHOD *meth = TLSv1_2_server_method

[openssl-users] AECDH problem: works in 1.0.2, fails in 1.1

2016-12-13 Thread Norm Green
ails: error:141640B5:SSL routines:tls_construct_client_hello:no ciphers available ssl/statem/statem_clnt.c at 815 What do I need to do to make AECDH work in 1.1 ? Norm Green -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] OpenSSL 1.1 on solaris x86 32 bit

2016-11-26 Thread Norm Green
in the build log where the assembler is being invoked directly. My compiler is: cc: Sun C 5.10 SunOS_i386 Patch 142363-05 2010/04/28 usage: cc [ options] files. Use 'cc -flags' for details thanks, Norm Green -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo

Re: [openssl-users] Using RSA_PKCS1_OAEP_PADDING with high level EVP_Seal functions

2016-09-09 Thread Norm Green
+1 I agree with Daniel's sentiment and respectfully suggest EPV_Seal* and EVP_Open be updated and kept up to date. We all know how easy it is to get crypto wrong. Having "one stop shop" functions like these are invaluable for when it comes to getting crypto right. Norm Green O

Re: [openssl-users] EVP_SealInit question

2016-08-15 Thread Norm Green
Sorry, I'm still not quite getting it. It sounds like you're saying that only RSA supports encrypting with a public key. But can't any asymmetric encryption algorithm encrypt using the public key? Why is RSA special in this regard? Norm Green On 8/15/2016 5:31 PM, Dr. Stephen Henson wrote

Re: [openssl-users] EVP_SealInit question

2016-08-15 Thread Norm Green
Ok, thanks. What I don't understand is what key transport has to do with EV_SealInit() ? Why is key transport important here ? Norm Green On 8/15/2016 2:38 PM, Dr. Stephen Henson wrote: On Mon, Aug 15, 2016, Norm Green wrote: The man page for EVP_SealInit says: "The public key

[openssl-users] EVP_SealInit question

2016-08-15 Thread Norm Green
The man page for EVP_SealInit says: "The public key must be RSA because it is the only OpenSSL public key algorithm that supports key transport." 1 ) Is this still true? 2) Will this restriction change now that RSA key transport is being dropped from TLS 1.3 (or so I've read..

Re: [openssl-users] Checking for AES-NI accelration

2016-08-10 Thread Norm Green
implemented without aes instructions in that case? Norm Green On 8/10/16 06:28, Jan Just Keijser wrote: Hi, On 10/08/16 14:25, Nagesh shamnur wrote: Hi Group, I am running an application which transfers huge chunks of data every second (850Mbps) and the same is secured using openssl

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Norm Green
Yes, it's only required on the server. Norm Green On 5/25/16 14:10, Jeremy Farrell wrote: Interesting; is this a server-side requirement? I ask because with 1.0.2g my client using "AECDH+AES:ADH+AES" makes a TLS 1.2 connection with AECDH-AES256-SHA without calling this function

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Norm Green
Yes! That was the problem. In order to use cipher "AECDH", SSL_CTX_set_ecdh_auto(ctx, 1) must be called first. Thanks Michael!! Norm On 5/24/16 15:52, Michael Wojcik wrote: From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Norm Green Sent: Tuesday, Ma

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Norm Green
shared cipher:s3_srvr.c:1417: The following works but is not what I want: SSL_CTX_set_cipher_list("ADH") Any suggestions on how to proceed? Norm Green On 5/24/16 10:45, Salz, Rich wrote: >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None" AECDH-AES256-SHAS

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Norm Green
I previously tried "kEECDH:kEDH" and that didn't work. 2) These ciphers all report as SSLv3. Do I have to use SSLv3 client/server methods to get access to these ciphers? I was using TLS 1.2 (TLSv1_2_server_method()) methods. Norm Green On 5/24/16 10:08, Salz, Rich wrote: 1)

[openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Norm Green
encryption keys used every time with ADH? 3) Is it possible to use ephemeral DH without using certificates? I was not able to get that to work. 4) What is the best practice for establishing an anonymous encrypted channel using OpenSSL? Norm Green -- openssl-users mailing list To unsubscribe: https

[openssl-users] 1.0.2g build fails on Windows

2016-03-02 Thread Norm Green
going to try modifying the make file to use shorter directory names to try to get the link line back under the max length threshold. Any other suggestions? Norm Green -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Symlinks broken in 1.0.2e ?

2015-12-03 Thread Norm Green
included in the in error? What will 1.0.2f look like in this regard? I need to merge 1.0.2e into a vendor branch in svn and I can foresee these symlink changes causing me a lot of grief. Norm Green On 12/3/2015 9:05 AM, Viktor Dukhovni wrote: On Thu, Dec 03, 2015 at 04:59:56PM +, Viktor Dukho

[openssl-users] Symlinks broken in 1.0.2e ?

2015-12-03 Thread Norm Green
ztvf openssl-1.0.2d.tar.gz |grep cast.h -rw-rw-r-- openssl/openssl 4659 2015-07-09 04:53 openssl-1.0.2d/crypto/cast/cast.h lrwxrwxrwx openssl/openssl 0 2015-07-09 05:03 openssl-1.0.2d/include/openssl/cast.h -> ../../crypto/cast/cast.h How can I resolve th

[openssl-users] Symlinks STILL broken in 1.0.2e

2015-12-03 Thread Norm Green
.c ./test/rsa_test.c ./test/evp_test.c ./test/ecdhtest.c ./test/mdc2test.c ./test/rc5test.c ./test/rc2test.c ./test/ectest.c ./test/exptest.c ./test/constant_time_test.c Will there be a 3rd 1.0.2e tarball released to fix this? Norm Green On 12/3/15 09:41, Viktor Dukhovni wrote: On Thu, Dec

Re: [openssl-users] Symlinks STILL broken in 1.0.2e

2015-12-03 Thread Norm Green
Are these sym links going to remain this way in subsequent releases? Or will they revert back to the way they were in 1.0.2d? Merging changes like this into svn is a pain because it causes conflicts. Norm Green On 12/3/15 13:31, Matt Caswell wrote: On 03/12/15 21:27, Norm Green wrote

Ephemeral DH

2014-10-13 Thread Norm Green
error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure:s3_pkt.c:1275:SSL alert number 40 Thanks, Norm Green __ OpenSSL Project http://www.openssl.org User Support Mailing List

Hang during SSL /connect - accept

2014-09-08 Thread Norm Green
=0x1082180) at s3_srvr.c:680 #9 0x7f666a560042 in SSL_accept (s=0x1082180) at ssl_lib.c:940 #10 0x7f669731b0fb in GsSslState::SSL_accept (this=0x7f669800fd20 SslState, ssl=0x1082180) at /export/ghana1/users/bretlb/trunk/src/sslsocket.c:528 Thanks in advance for any help given, Norm Green

Re: Hang during SSL /connect - accept

2014-09-08 Thread Norm Green
ssl3_ctx_callback_ctrl} (gdb) On 9/8/14 14:21, Viktor Dukhovni wrote: On Mon, Sep 08, 2014 at 11:45:59AM -0700, Norm Green wrote: Were are occasionally seeing hangs when establishing an SSL connection with OpenSSL 1.0.1i. This connection uses SRP and both the server and the client sockets are in blocking

Re: Hang during SSL /connect - accept

2014-09-08 Thread Norm Green
, Viktor Dukhovni wrote: On Mon, Sep 08, 2014 at 03:10:47PM -0700, Norm Green wrote: I will try to capture traffic in the next run. Looking at the commit history after 1.0.1i, I think you want: commit 30fbe92c78981a417718bcbf25d295d16c5b7ed9 Author: Dr. Stephen Henson st...@openssl.org Date

Re: Hang during SSL /connect - accept

2014-09-08 Thread Norm Green
)) return 2; cpk = ssl_get_server_send_pkey(s); if (!cpk) Norm On 9/8/2014 7:10 PM, Viktor Dukhovni wrote: On Mon, Sep 08, 2014 at 05:41:13PM -0700, Norm Green wrote: Thanks Viktor. I did get some fixes (via this list) from

Re: 1.0.1i breaks SRP

2014-08-08 Thread Norm Green
, Aug 07, 2014, Norm Green wrote: Any idea where to begin debugging this? Any and all help is appreciated. The cause is incorrect handling of new SRP authentication type which was added to correct a bug where SRP authentication was incorrectly classified as NULL authhentication. A temporary

Re: 1.0.1i breaks SRP

2014-08-08 Thread Norm Green
Then what would you suggest? SRP is completely broken for us with 1.0.1i Norm On 8/8/14, 11:51, Matt Caswell wrote: On 08/08/14 19:33, Norm Green wrote: Hello Steve, Reverting the below commit is necessary but not sufficient. There are also references to aSRP in s3_clnt.c and ssl_lib.c

Re: 1.0.1i breaks SRP

2014-08-08 Thread Norm Green
Hi Steve, That patch works! We will go with that one instead of rolling back the commit mentioned in your previous message. Thanks very much for your help!!! Norm On 8/8/14, 12:25, Dr. Stephen Henson wrote: On Fri, Aug 08, 2014, Norm Green wrote: Then what would you suggest? SRP

1.0.1i breaks SRP

2014-08-07 Thread Norm Green
complaint after line 31 on the server side is clearly bogus. Any idea where to begin debugging this? Any and all help is appreciated. Norm Green Server Side: [ 1] SSL call: SSL_load_error_strings with args: NONE (nothing returned) [ 2] SSL call: ERR_load_crypto_strings with args: NONE

Re: 1.0.1i breaks SRP

2014-08-07 Thread Norm Green
Thanks for tracking it down so fast Steve. I will revert the mods in that commit and try it again tomorrow. Norm On 8/7/2014 7:21 PM, Dr. Stephen Henson wrote: On Thu, Aug 07, 2014, Norm Green wrote: Any idea where to begin debugging this? Any and all help is appreciated. The cause

SRP problem in OpenSSL 1.0.1 beta

2012-01-10 Thread Norm Green
, which seems like a poor assumption. I'm still fairly new to SSL and SRP and am grateful for any and all help. Norm Green VMware, Inc. Here is the error I get on the client: SSL_connect() failed, rc=0. resultCode=1 (SSL_ERROR_SSL) 0xfd7fffdf83a0 0xfd7fffdf839c 0xfd7fffdf8390

SRP problem in OpenSSL 1.0.1 beta

2012-01-10 Thread Norm Green
, which seems like a poor assumption. Is there some better way to determine that SRP authenication has failed? I'm still fairly new to SSL and SRP and am grateful for any and all help. Norm Green VMware, Inc. Here is the error I get on the client: SSL_connect() failed, rc=0. resultCode=1

Re: OpenSSL 1.0.1 example with SRP

2011-10-27 Thread Norm Green
To: openssl-users@openssl.org Sent: Wednesday, October 26, 2011 11:46:32 PM Subject: Re: OpenSSL 1.0.1 example with SRP On Wed, Oct 26, 2011 at 10:28 PM, Norm Green no...@vmware.com wrote: Is there no one that can help me get a simple SRP test case working?  Or should I conclude SRP is broken

Re: OpenSSL 1.0.1 example with SRP

2011-10-27 Thread Norm Green
:35 AM Subject: Re: OpenSSL 1.0.1 example with SRP On Thu, Oct 27, 2011, Norm Green wrote: The best I can tell, the snapshot is broken. At this point, I wouldn't be surprised. Update: I made some (major) changes to my example code based on the SRP code in ssltest.c. Mainly, I

Re: OpenSSL 1.0.1 example with SRP

2011-10-26 Thread Norm Green
identity hint: None SRP username: None Start Time: 1319681979 Timeout : 7200 (sec) Verify return code: 0 (ok) --- - Original Message - From: Norm Green no...@vmware.com To: openssl-users@openssl.org Sent: Tuesday, October 25, 2011 6:58:12 AM Subject: Re: OpenSSL 1.0.1

Re: OpenSSL 1.0.1 example with SRP

2011-10-25 Thread Norm Green
(sec) Verify return code: 0 (ok) --- - Original Message - From: Peter Sylvester peter.sylves...@gmail.com To: openssl-users@openssl.org Sent: Tuesday, October 25, 2011 3:18:39 AM Subject: Re: OpenSSL 1.0.1 example with SRP On 10/25/2011 05:15 AM, Norm Green wrote: Hello Experts

OpenSSL 1.0.1 example with SRP

2011-10-24 Thread Norm Green
Can anyone point me the right direction so I can get a simple SRP example to work? Thanks for any help, Norm Green VMware, Inc. __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: OpenSSL 1.0.1 example with SRP

2011-10-24 Thread Norm Green
Hi Jeff, Was OPENSSL_NO_SRP defined when you built? I'm 99.9% sure it wasn't, otherwise the compiler would have barfed on my call to SSL_CTX_SRP_CTX_init() Thomas Wu's patches can be found in RT. The latest appears to be http://rt.openssl.org/Ticket/Display.html?id=2523user=guestpass=guest.