Re: Help Required For Code Changes While Upgrading OpenSSL 1.0.1 to 3.0

2021-10-20 Thread Matt Caswell
On 20/10/2021 10:57, Kumar Mishra, Sanjeev wrote: Hi, I am upgrading the code from OpenSSL 1.0.1 to 3.0. I am getting following compilation errors. Could you please suggest appropriate changes for following- 1. X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE);   error

Help Required For Code Changes While Upgrading OpenSSL 1.0.1 to 3.0

2021-10-20 Thread Kumar Mishra, Sanjeev
Hi, I am upgrading the code from OpenSSL 1.0.1 to 3.0. I am getting following compilation errors. Could you please suggest appropriate changes for following- 1. X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE); error: 'X509err' was not declared in this scope 2.

Re: "DST Root CA X3" expiry workaround for OpenSSL 1.0.1, 1.0.0 and 0.9.8 client applications

2021-10-04 Thread Michael Richardson
I got a call on Thursday from my mom asking why Apple Mail couldn't SMTP deliver to my LE signed SMTP server. She forgot how to start teamviewer, so a Saturday morning trip to the small town she lives in later... and it she looks like a problem with anchors. On a brand new MacOS system from thi

Re: "DST Root CA X3" expiry workaround for OpenSSL 1.0.1, 1.0.0 and 0.9.8 client applications

2021-10-03 Thread Felipe Gasper
> On Oct 3, 2021, at 7:09 PM, Rob Stradling wrote: > > The "Old Let’s Encrypt Root Certificate Expiration and OpenSSL 1.0.2" blog > article [1] doesn't cover OpenSSL versions prior to 1.0.2, presumably because > they've been unsupported for a long time. However, no doubt there are still > s

"DST Root CA X3" expiry workaround for OpenSSL 1.0.1, 1.0.0 and 0.9.8 client applications

2021-10-03 Thread Rob Stradling
The "Old Let’s Encrypt Root Certificate Expiration and OpenSSL 1.0.2" blog article [1] doesn't cover OpenSSL versions prior to 1.0.2, presumably because they've been unsupported for a long time. However, no doubt there are still some users and applications that are stuck using even older versio

[openssl-users] OpenSSL 1.0.1 branch : setting Diffie Hellman Elliptic curve name via SSL_set_tmp_ecdh and EC_KEY_new_by_curve_name

2016-11-03 Thread Sreekanth Sukumaran
Hi All, In our project, we are currently supporting two branches of OpenSSL (1.0.1 and 1.0.2) Recently we had a requirement to enable elliptic curve Diffie Hellman, we see that in OpenSSL 1.0.2 branch, we can use the below function to enable ECDH /* Set automatic curve selection for server ssl

Re: [openssl-users] Increased memory consumption noticed when upgrading from openssl 1.0.1 to openssl 1.0.2

2016-03-21 Thread Andrew Payne
, Mar 21, 2016 at 3:04 AM, Matt Caswell wrote: > > > On 20/03/16 03:15, Andrew Payne wrote: > > Hello, > > > > My company is in the process of upgrading from openssl 1.0.1 to openssl > > 1.0.2. We noticed that when we use any version of openssl 1.0.2 we have > &g

Re: [openssl-users] Increased memory consumption noticed when upgrading from openssl 1.0.1 to openssl 1.0.2

2016-03-21 Thread Matt Caswell
On 20/03/16 03:15, Andrew Payne wrote: > Hello, > > My company is in the process of upgrading from openssl 1.0.1 to openssl > 1.0.2. We noticed that when we use any version of openssl 1.0.2 we have > an extremely high increase in memory usage. Around 15 or more gigs of >

[openssl-users] Increased memory consumption noticed when upgrading from openssl 1.0.1 to openssl 1.0.2

2016-03-19 Thread Andrew Payne
Hello, My company is in the process of upgrading from openssl 1.0.1 to openssl 1.0.2. We noticed that when we use any version of openssl 1.0.2 we have an extremely high increase in memory usage. Around 15 or more gigs of memory extra are consumed. My questions are as follows: Are there any

Re: [openssl-users] Getting a compilation error on openssl 1.0.1 branch

2016-02-20 Thread Bobby Philip
This was because one of my application makefiles wasnt updated to include the crypto/modes/ folder in its INCLUDES definition. On Thu, Feb 18, 2016 at 8:51 PM, Bobby Philip wrote: > Hi, > I am trying to compile openssl 1.0.1r for android and statically link to > my application. > I am getting

[openssl-users] Getting a compilation error on openssl 1.0.1 branch

2016-02-18 Thread Bobby Philip
Hi, I am trying to compile openssl 1.0.1r for android and statically link to my application. I am getting a compile error in the file https://github.com/openssl/openssl/blob/OpenSSL_1_0_1-stable/crypto/evp/e_aes.c at line 61 # include "modes_lcl.h" This modes_lcl.h is present at https://github.

RE: Upgrading from openssl-0.9.8/fips-1.2 to openssl-1.0.1/fips-2.0

2014-11-10 Thread Salz, Rich
> In openssl-1.0.1/fips-2.0 it is not possible to call the low-level APIs when > in FIPS 140-2 mode. Is there another alternative that I can use? E.g. some > API in the FIPS module? Sorry, no. -- Principal Security Engineer, Akamai Technologies IM: rs...@jabber.me Twitter:

Upgrading from openssl-0.9.8/fips-1.2 to openssl-1.0.1/fips-2.0

2014-11-10 Thread Roger No-Spam
Hi, I'm in the process of upgrading from openssl-0.9.8/fips-1.2 to openssl-1.0.1/fips-2.0. Our system can be built both with and without the fips module. Furthermore, it can be built in a limited feature set configuration (no fips). The limited feature set config only calls low-level op

Problem in build ing the openssl-1.0.1 in x86-64bit

2013-12-12 Thread Alagu Sakthi Gnanadhandapani - ERS, HCL Tech
Hi All, When we are trying to build the openssl-1.0.1 in x86-64 board we are facing the following error x86cpuid.s: Assembler messages: x86cpuid.s:8: Error: suffix or operands invalid for `push' x86cpuid.s:9: Error: suffix or operands invalid for `push' x86cpuid.s:10: Error: suffix o

Thread safety questions in OpenSSL 1.0.1

2013-06-21 Thread Jason Schultz
Back in November a question(and response) were posted regarding thread safety in the 1.0.1 branch of OpenSSL: http://www.mail-archive.com/openssl-users@openssl.org/msg69322.html In the response to the questions, the user states he removed the thread ID callback function and the call to CRYPTO

How to uses FIPS 2.0.1 with OpenSSL 1.0.1

2012-10-22 Thread Bhat, Jayalakshmi Manjunath
Hi All, I wanted to know the procedure and steps for cross compiling OpenSSL on Linux along with FIPS? Regards Jaya

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-06-20 Thread Ken Montagna
, but it is the same kernel as windows 7. I add the ENABLE-CAPIENG compile flag for capi to the make files Thomas J. Hruska wrote: > > On 3/23/2012 12:53 AM, jeremy hunt wrote: >> This posting is to help people to build OpenSSL 1.0.1 with Microsoft >> Visual Studio. It may also i

Re: [openssl-users] Question regarding renegotiation in openssl-1.0.1

2012-06-13 Thread Erwann Abalea
Why should it be different? -- Erwann ABALEA - gérontopropulsion prurigineuse: abus d'excès caractérisé par trop d'exagération (se fait quand on pousse mémé dans les orties) Le 13/06/2012 13:30, ankur dwivedi a écrit : Hi, I am observing that after doing a renegotiation, the new cipher i

Question regarding renegotiation in openssl-1.0.1

2012-06-13 Thread ankur dwivedi
Hi, I am observing that after doing a renegotiation, the new cipher is same as what was used while initial handshake. Is this a normal behavior ? -- Thanks Ankur Dwivedi

Query regarding renegotiation using -sess_out and -sess_in parameter in openssl-1.0.1

2012-06-06 Thread ankur dwivedi
Hi, I was trying the following on openssl 1.0.1.: On Server : # ./openssl s_server -state -msg On Client: # ./openssl s_client -cipher AES256-SHA -tls1_2 -state -msg -sess_out /tmp/sess The handshake went on successfully with the following output on client side: --- SSL handshake has read 1340

Re: C standard, was RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-06-05 Thread Zack Weinberg
On Tue, Jun 5, 2012 at 4:35 AM, Jakob Bohm wrote: > On 6/5/2012 6:19 AM, Zack Weinberg wrote: >> According to http://gcc.gnu.org/ml/gcc-patches/2011-03/msg00376.html the >> last widely-used platform that crashed on free(NULL) was SunOS 4, which >> "stopped being a reasonable portability target aro

Re: C standard, was RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-06-05 Thread Jakob Bohm
On 6/5/2012 6:19 AM, Zack Weinberg wrote: On 2012-06-04 8:10 PM, Dave Thompson wrote: From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm Having no current access to the C89 standard or its drafts, I am relying on the experience that many "C89" real world systems I have encountered di

Re: C standard, was RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-06-05 Thread Zack Weinberg
On 2012-06-04 8:10 PM, Dave Thompson wrote: From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm Having no current access to the C89 standard or its drafts, I am relying on the experience that many "C89" real world systems I have encountered did not tolerate free(NULL). In contrast all

C standard, was RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-06-04 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm > Sent: Tuesday, 29 May, 2012 03:34 > On 5/27/2012 2:29 AM, Jeremy Farrell wrote: > > Note that when considering portability, C99 is not yet > fully implemented everywhere, so when I say "ANSI C" > without qualification, I generally

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-30 Thread Jakob Bohm
On 5/29/2012 8:56 PM, Jeremy Farrell wrote: From: Jakob Bohm [mailto:jb-open...@wisemo.com] Sent: Tuesday, May 29, 2012 8:34 AM On 5/27/2012 2:29 AM, Jeremy Farrell wrote: From: Jakob Bohm [mailto:jb-open...@wisemo.com] On 5/25/2012 5:30 PM, Ken Goldman wrote: On 5/25/2012 3:33 AM, Jakob Bohm w

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-29 Thread Jeremy Farrell
> From: Jakob Bohm [mailto:jb-open...@wisemo.com] > Sent: Tuesday, May 29, 2012 8:34 AM > On 5/27/2012 2:29 AM, Jeremy Farrell wrote: > >> From: Jakob Bohm [mailto:jb-open...@wisemo.com] > >> On 5/25/2012 5:30 PM, Ken Goldman wrote: > >>> On 5/25/2012 3:33 AM, Jakob Bohm wrote: > >>> > ANSI C

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-29 Thread Kenneth Goldman
> From: Jakob Bohm > Which version of the ANSI Spec, and where did you get a copy? > > I have to rely on secondary sources and experience using various > implementations that claim conformance. I generally refer to Plauger's "The Standard C Library", where he quotes the spec with commentary an

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-29 Thread Jakob Bohm
On 5/27/2012 2:29 AM, Jeremy Farrell wrote: From: Jakob Bohm [mailto:jb-open...@wisemo.com] On 5/25/2012 5:30 PM, Ken Goldman wrote: On 5/25/2012 3:33 AM, Jakob Bohm wrote: ANSI C and POSIX free() is NOT required to handle free(NULL) as a NOP. I checked reputable sources (Plauger, Harbison an

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-28 Thread Steffen DETTMER
Hi all, > Which version of the ANSI Spec, and where did you get a copy? > > I have to rely on secondary sources and experience using > various implementations that claim conformance. Wikipedia http://en.wikipedia.org/wiki/ANSI_C is used to have a link to a recent draft (free of charge) which is

C standard, was RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-28 Thread Dave Thompson
(somewhat offtopic) > From: owner-openssl-us...@openssl.org On Behalf Of Jeremy Farrell > Sent: Saturday, 26 May, 2012 20:29 > > From: Jakob Bohm [mailto:jb-open...@wisemo.com] > > Which version of the ANSI Spec, and where did you get a copy? > > I quoted from C99 in a recent message; can't re

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-26 Thread Jeremy Farrell
> From: Jakob Bohm [mailto:jb-open...@wisemo.com] > On 5/25/2012 5:30 PM, Ken Goldman wrote: > > On 5/25/2012 3:33 AM, Jakob Bohm wrote: > > > >> ANSI C and POSIX free() is NOT required to handle free(NULL) > >> as a NOP. > > > > I checked reputable sources (Plauger, Harbison and Steele, the ANSI >

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-26 Thread Jim Segrave
On 05/26/2012 12:28 PM, Jakob Bohm wrote: > On 5/25/2012 5:30 PM, Ken Goldman wrote: >> On 5/25/2012 3:33 AM, Jakob Bohm wrote: >> >>> ANSI C and POSIX free() is NOT required to handle free(NULL) >>> as a NOP. >> >> I checked reputable sources (Plauger, Harbison and Steele, the ANSI >> spec, and th

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-26 Thread Richard Levitte
In message on Fri, 25 May 2012 11:39:05 -0400, Jeffrey Walton said: noloader> Perhaps I'm looking at the wrong free function (or I'm not noloader> reading/deducing correct behavior), but it looks like a double free to noloader> me: noloader> noloader> void CRYPTO_free(void *str) noloader> { no

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-26 Thread Jakob Bohm
On 5/25/2012 5:30 PM, Ken Goldman wrote: On 5/25/2012 3:33 AM, Jakob Bohm wrote: ANSI C and POSIX free() is NOT required to handle free(NULL) as a NOP. I checked reputable sources (Plauger, Harbison and Steele, the ANSI spec, and the IEEE POSIX spec). All agree that (e.g. ANSI) "If ptr is

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Jeremy Farrell
> From: Jakob Bohm [mailto:jb-open...@wisemo.com] > > On 5/25/2012 12:30 AM, Richard Levitte wrote: > > > > sudarshan.t.raghavan> I am assuming the default > > sudarshan.t.raghavan> free routine ignores a NULL argument > > > > Your assumption is correct, OpenSSL expects the same semantics as > >

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Steffen DETTMER
Hi all! > > If the library crashes on free(NULL), you're just making > > people like me do this everywhere: > > > > if (ptr != NULL) free (ptr); ok, if you have a test case "free (NULL)", agreed ;-) Seems not all platforms conform to the "free(NULL) is a no-op". I understand your example, thanks

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Ken Goldman
On 5/25/2012 11:41 AM, Carter Browne wrote: That's not the normal library behavior. My typical design pattern is: void *ptr = NULL; do stuff which may in some branches allocate the pointer free(ptr); If the library crashes on free(NULL), you're just making people like me do this everywhere:

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Ken Goldman
On 5/25/2012 12:09 PM, Jeffrey Walton wrote: My typical design pattern is: void *ptr = NULL; do stuff which may in some branches allocate the pointer free(ptr); This is very old, and has not evolved as security needs have changed (forgive me if I read too much into it). For example, the ret

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Jeffrey Walton
On Fri, May 25, 2012 at 11:25 AM, Ken Goldman wrote: > On 5/25/2012 11:03 AM, Steffen DETTMER wrote: >> >> I think crashing with NULL is quite good: a must-not-happen situation >> leads to a defined dead of SIGSEGVs, at least for platforms supporting >> that, typically with good aid for debuggin (

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Sudarshan Raghavan
ot; wrote: > Hi all! > > * Jeffrey Walton Sent: Friday, May 25, 2012 4:39 PM > > On Fri, May 25, 2012 at 7:25 AM, Sudarshan Raghavan > > wrote: > > > Ok, I can fix the custom free to take care of this. > > > But, why is th

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Carter Browne
On 5/25/2012 11:25 AM, Ken Goldman wrote: > On 5/25/2012 11:03 AM, Steffen DETTMER wrote: >> >> I think crashing with NULL is quite good: a must-not-happen situation >> leads to a defined dead of SIGSEGVs, at least for platforms supporting >> that, typically with good aid for debuggin (like core fi

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Jeffrey Walton
On Thu, May 24, 2012 at 8:16 AM, Sudarshan Raghavan wrote: > Hi, > > I am using CRYPTO_set_mem_functions to use our own custom memory > routines in a non blocking proxy implementation. This was working fine > in 0.9.8 and 1.0.0 but with 1.0.1c I can see that the custom free > routine is being invo

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Ken Goldman
On 5/25/2012 3:33 AM, Jakob Bohm wrote: ANSI C and POSIX free() is NOT required to handle free(NULL) as a NOP. I checked reputable sources (Plauger, Harbison and Steele, the ANSI spec, and the IEEE POSIX spec). All agree that (e.g. ANSI) "If ptr is a null pointer, no action occurs." ___

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Ken Goldman
On 5/25/2012 11:03 AM, Steffen DETTMER wrote: I think crashing with NULL is quite good: a must-not-happen situation leads to a defined dead of SIGSEGVs, at least for platforms supporting that, typically with good aid for debuggin (like core files or halting debuggers providing a backtrace). Mayb

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Steffen DETTMER
Hi all! * Jeffrey Walton Sent: Friday, May 25, 2012 4:39 PM > On Fri, May 25, 2012 at 7:25 AM, Sudarshan Raghavan > wrote: > > Ok, I can fix the custom free to take care of this. > > But, why is this happening in openssl 1.0.1 and not in 1.0.0 o

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Jeffrey Walton
On Fri, May 25, 2012 at 7:25 AM, Sudarshan Raghavan wrote: > Ok, I can fix the custom free to take care of this. But, why is this > happening in openssl 1.0.1 and not in 1.0.0 or 0.9.8? I think the question to ask is why your code or library routines are not validating parameters before ope

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Richard Levitte
In message <4fbf35d0.3020...@wisemo.com> on Fri, 25 May 2012 09:33:36 +0200, Jakob Bohm said: jb-openssl> On 5/25/2012 12:30 AM, Richard Levitte wrote: jb-openssl> > In jb-openssl> > message jb-openssl> > on Thu, 24 May 2012 17:46:49 +0530, Sudarshan jb-openssl> > Raghavan said: jb-openssl> > j

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Sudarshan Raghavan
I can see this code in s3_lib.c if (ctx->srp_ctx.login != NULL) OPENSSL_free(ctx->srp_ctx.login); while tls_srp.c does not have the NULL check before calling free. I added the NULL check in tls_srp.c and I am not seeing the crash anymore. Is this the fix or

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Sudarshan Raghavan
I enabled debug symbols in openssl and this is what I am seeing #3 0x0828bd74 in CUSTOM_FREE (oldMem=0x0) at ssl_mem.c:34 #4 0xb758e160 in CRYPTO_free (str=0x0) at mem.c:397 #5 0xb773520c in SSL_SRP_CTX_free (s=0xb3e4f300) at tls_srp.c:102 #6 0xb77091c0 in ssl3_free (s=0xb3e4f300) at s3_lib.c

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Sudarshan Raghavan
Ok, I can fix the custom free to take care of this. But, why is this happening in openssl 1.0.1 and not in 1.0.0 or 0.9.8? Is there is a document or resource in the web that explains what is expected from the custom alloc, realloc and free routines? Regards, Sudarshan On Fri, May 25, 2012 at 4

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Jakob Bohm
On 5/25/2012 12:30 AM, Richard Levitte wrote: In message on Thu, 24 May 2012 17:46:49 +0530, Sudarshan Raghavan said: sudarshan.t.raghavan> Hi, sudarshan.t.raghavan> sudarshan.t.raghavan> I am using CRYPTO_set_mem_functions to use our own custom memory sudarshan.t.raghavan> routines in a

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-24 Thread Richard Levitte
In message on Thu, 24 May 2012 17:46:49 +0530, Sudarshan Raghavan said: sudarshan.t.raghavan> Hi, sudarshan.t.raghavan> sudarshan.t.raghavan> I am using CRYPTO_set_mem_functions to use our own custom memory sudarshan.t.raghavan> routines in a non blocking proxy implementation. This was work

Re: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-24 Thread Dr. Stephen Henson
On Thu, May 24, 2012, Sudarshan Raghavan wrote: > Hi, > > I am using CRYPTO_set_mem_functions to use our own custom memory > routines in a non blocking proxy implementation. This was working fine > in 0.9.8 and 1.0.0 but with 1.0.1c I can see that the custom free > routine is being invoked with a

Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-24 Thread Sudarshan Raghavan
Hi, I am using CRYPTO_set_mem_functions to use our own custom memory routines in a non blocking proxy implementation. This was working fine in 0.9.8 and 1.0.0 but with 1.0.1c I can see that the custom free routine is being invoked with a NULL argument after calling SSL_free and this results in the

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-29 Thread Matt Caswell (fr...@baggins.org)
On 29/04/12 05:23, MauMau wrote: Q2: Is AES-XTS slower than AES-CBC? Does AES-NI speed up AES-XTS like AES-CBC? Yes it is slower because there is an additional encryption operation on the "tweak". I think AES-NI speeds up the implementation of the underlying AES cipher, and therefore would be

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-28 Thread MauMau
From: This code is only relevant if the EVP_CIPH_CUSTOM_IV flag is not set. If it is set it is ignored. XTS sets this flag in e_aes.c: #define XTS_FLAGS(EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_CUSTOM_IV \ | EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CTRL_INIT) Oh, I see. As you say,

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-25 Thread Matt Caswell (fr...@baggins.org)
On 25/04/12 15:03, MauMau wrote: Q1: Is AES-XTS officially supported by OpenSSL 1.0.1? I'm wondering if XTS is still an experimental feature in OpenSSL, because the file "Changes" in the OpenSSL 1.0.1 tarball does not refer to XTS. Well 1.0.1 is the latest stable version,

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-25 Thread MauMau
enSSL 1.0.1? I'm wondering if XTS is still an experimental feature in OpenSSL, because the file "Changes" in the OpenSSL 1.0.1 tarball does not refer to XTS. Please look at crypt/evp/evp_enc.c. The below code fragment in EVP_CipherInit_ex() does not appear to have

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-24 Thread Matt Caswell (fr...@baggins.org)
On 23/04/12 13:16, MauMau wrote: Apart from that, let me go back to my original question 4 in my first mail. Q4: Do I have to call EVP_EncryptInit_ex/EVP_DecryptInit_ex for each block/record? I'm concerned about the overhead of those functions. For exa

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread Edward Ned Harvey
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of MauMau > > But folks here gave me suggestions that different IVs should be used for > each 4KB block. I think I should do that, and I'd like to follow those > precious advice. > > (However, I'm wonde

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread MauMau
From: I believe this will reeuse the same IV for block2 that it uses for block1. It will appear to work but is a really bad idea and will lead to major security problems. From: "Jeffrey Walton" You should have a look at Microsft's paper by Neils Ferguson on Bitlocker's design and implementat

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread Matt Caswell (fr...@baggins.org)
On 23 April 2012 13:16, MauMau wrote: > /* encrypt first block */ > EVP_EncryptUpdate(&enc_ctx, block1, &outlen, block1, 4096); > /* encrypt second block */ > EVP_EncryptInit_ex(&enc_ctx, NULL, NULL, NULL, NULL); > EVP_EncryptUpdate(&enc_ctx, block2, &outlen, block2, 4096); I believe this will r

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread Jeffrey Walton
On Mon, Apr 23, 2012 at 8:16 AM, MauMau wrote: > Hello, > > > Thanks a lot for your valuable advice. I'm looking into the CBC with IVs > based on block numbers, CTR, and XTS. I'm refering to the pages below: > > Block cipher modes of operation > http://en.wikipedia.org/wiki/Block_cipher_mode > > D

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-23 Thread MauMau
Hello, Thanks a lot for your valuable advice. I'm looking into the CBC with IVs based on block numbers, CTR, and XTS. I'm refering to the pages below: Block cipher modes of operation http://en.wikipedia.org/wiki/Block_cipher_mode Disk encryption theory http://en.wikipedia.org/wiki/Disk_encry

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-21 Thread Jeffrey Walton
On Wed, Apr 18, 2012 at 9:04 AM, Edward Ned Harvey wrote: >> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- >> us...@openssl.org] On Behalf Of Jeffrey Walton >> >> On Tue, Apr 17, 2012 at 9:47 PM, Edward Ned Harvey >> wrote: >> >> From: owner-openssl-us...@openssl.org [mailto:owner-

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-18 Thread Edward Ned Harvey
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Jeffrey Walton > > On Tue, Apr 17, 2012 at 9:47 PM, Edward Ned Harvey > wrote: > >> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > >> us...@openssl.org] On Behalf Of Ken Goldman > >> >

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Jeffrey Walton
On Tue, Apr 17, 2012 at 9:47 PM, Edward Ned Harvey wrote: >> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- >> us...@openssl.org] On Behalf Of Ken Goldman >> >> The standard answer:  If this is a real security project, hire an >> expert.  If you design your own crypto algorithm, you

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Jeffrey Walton
On Tue, Apr 17, 2012 at 7:59 AM, Edward Ned Harvey wrote: >> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- >> us...@openssl.org] On Behalf Of Edward Ned Harvey >> >> attacker doesn't know is your key and your plaintext.  There is only one >> solution.  You must use a second key.  Us

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Edward Ned Harvey
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Ken Goldman > > The standard answer: If this is a real security project, hire an > expert. If you design your own crypto algorithm, you will get it wrong. Or, if you're pretty confident you know how

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Edward Ned Harvey
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Ken Goldman > > The standard answer: If this is a real security project, hire an > expert. If you design your own crypto algorithm, you will get it wrong. > > If this is just for fun, to learn about

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Matt Caswell (fr...@baggins.org)
On 17/04/12 15:31, MauMau wrote: Hello, Edward, Jakob, Ken, Thanks for lots of ideas and information. I'll investigate Edward's block-number-based iv and Ken's CTR mode. Let me consult you if I get stuck again. I'll consider some way to eliminate the need to call EVP_EncryptInit_ex/EVP_Decryp

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread MauMau
Hello, Edward, Jakob, Ken, Thanks for lots of ideas and information. I'll investigate Edward's block-number-based iv and Ken's CTR mode. Let me consult you if I get stuck again. I'll consider some way to eliminate the need to call EVP_EncryptInit_ex/EVP_DecryptInit_ex for each block/record.

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Ken Goldman
The standard answer: If this is a real security project, hire an expert. If you design your own crypto algorithm, you will get it wrong. If this is just for fun, to learn about openssl, CTR mode will give you random access. On 4/16/2012 6:41 PM, MauMau wrote: As for Q4, yes, decrypting bl

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Jakob Bohm
On 4/17/2012 1:59 PM, Edward Ned Harvey wrote: From: owner-openssl-us...@openssl.org [mailto:owner-openssl- us...@openssl.org] On Behalf Of Edward Ned Harvey attacker doesn't know is your key and your plaintext. There is only one solution. You must use a second key. Use your first key to encr

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-17 Thread Edward Ned Harvey
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Edward Ned Harvey > > attacker doesn't know is your key and your plaintext. There is only one > solution. You must use a second key. Use your first key to encrypt the > second key (so an attacker ca

RE: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-16 Thread Edward Ned Harvey
> From: Edward Ned Harvey > > I can't think of anything wrong with using the block number as the > IV, and then use ECB. Oh yeah. I can think of something wrong with that. If an attacker knows the block number, and they have some intelligent guess about the plaintext, then they might be able to

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-16 Thread MauMau
Hello, Stephen, Thomas, From: "Thomas BERNARD" To my understanding : With ECB, the order in which the blocks are crypted/decrypted doesn't matter. With CBC and most block modes, it DOES matter ! So if block 1 is encrypted first it MUST be decrypted first. /* decrypt second block */ EVP_Decrypt

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-16 Thread Dr. Stephen Henson
On Mon, Apr 16, 2012, MauMau wrote: > Hello > > Q1: Is AES-NI automatically utilized on the processors that have the > capability? Do I have to do anything (e.g. specify some engine in > openssl.conf)? > In OpenSSL 1.0.1 it is automatically supported provided you use the

Re: Please tell me about encryption API of OpenSSL 1.0.1

2012-04-16 Thread Thomas BERNARD
> /* one-time initialization */ > ERR_load_crypto_strings(); > OpenSSL_add_all_algorithms(); > EVP_CIPHER_CTX_init(&enc_ctx); > EVP_CIPHER_CTX_init(&dec_ctx); > EVP_EncryptInit_ex(&enc_ctx, EVP_aes_256_cbc(), NULL, key, iv); > EVP_CIPHER_CTX_set_padding(&enc_ctx, 0); > EVP_DecryptInit_ex(&dec_ctx,

Please tell me about encryption API of OpenSSL 1.0.1

2012-04-16 Thread MauMau
Hello I'm new to OpenSSL and this is my first post here. Please let me ask you a few questions about the symmetric encryption API (EVP_) of OpenSSL 1.0.1. I'm developing an application which encrypts+writes and reads+decrypts data to/from files. It has the following re

Support for AES-XTS in openssl 1.0.1

2012-04-06 Thread pkumarn
Hi, I am asked to explore AES-XTS for one of the task. When i was going though Openssl 1.0.1, i found the below EVP interface EVP_aes_256_xts() but looks like it needs FIPS mode . Apart from this, i also found other API but to me they could only support 128 bits. My requirement is 512 bit key

Re: SRP in OpenSSL 1.0.1

2012-04-04 Thread Peter Sylvester
On 04/04/2012 11:01 AM, Christian Weber wrote: Dear users and developers, we just read through some of the code examples for SRP usage. Concerning the necessary callbacks we wonder why in s_server.c the verifier parametrization is being delayed. Within apps/s_server.c we can find the comment:

SRP in OpenSSL 1.0.1

2012-04-04 Thread Christian Weber
Dear users and developers, we just read through some of the code examples for SRP usage. Concerning the necessary callbacks we wonder why in s_server.c the verifier parametrization is being delayed. Within apps/s_server.c we can find the comment: "When the callback is called for a new connect

openssl 1.0.1 and FIPS 140-2

2012-04-02 Thread Roger No-Spam
Hi, I would like to have a look at the new FIPS 140-2 module. From what I've been able to find out, it is targeting openssl-1.0.1. I've downloaded openssl-1.0.1 and a fips snapshot (openssl-fips-2.0-test-20120331.tar.gz). Is there a how-to or similar description of how to configure

Re: OpenSSL 1.0.1 handshake timeout

2012-03-28 Thread Dr. Stephen Henson
ngrading to OpenSSL 1.0.0 solved the problem. > >> I'm not sure how to determine if it's a bug, an Arch Linux package > >> issue, or a problem with the service providers server? > >> > >> I tested using Python and Ruby (multiple versions): > >> &

Re: OpenSSL 1.0.1 handshake timeout

2012-03-28 Thread James Earl
ow to determine if it's a bug, an Arch Linux package >> issue, or a problem with the service providers server? >> >> I tested using Python and Ruby (multiple versions): >> >> With OpenSSL 1.0.1-1 under Arch Linux, this times out: >> >> python >>

Re: OpenSSL 1.0.1 handshake timeout

2012-03-28 Thread Dr. Stephen Henson
oblem with the service providers server? > > I tested using Python and Ruby (multiple versions): > > With OpenSSL 1.0.1-1 under Arch Linux, this times out: > > python > >>> import requests > >>> r = requests.get('https://esqa.moneris.com', timeout=5) &

Re: OpenSSL 1.0.1 handshake timeout

2012-03-28 Thread Marek . Marcola
ssl-us...@openssl.org > > 03/28/2012 06:03 PM > > Please respond to > openssl-users@openssl.org > > To > > openssl-users@openssl.org > > cc > > Subject > > OpenSSL 1.0.1 handshake timeout > > I recently had a timeout issue with a service pro

OpenSSL 1.0.1 handshake timeout

2012-03-28 Thread James Earl
n and Ruby (multiple versions): With OpenSSL 1.0.1-1 under Arch Linux, this times out: python >>> import requests >>> r = requests.get('https://esqa.moneris.com', timeout=5) With OpenSSL 1.0.0 under Arch Linux, it works. OpenSSL 1.0.1 does work however connecting to o

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-27 Thread Lou Picciano
From: "Jeffrey Walton" To: openssl-users@openssl.org Sent: Tuesday, March 27, 2012 9:49:58 PM Subject: Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio. On Sun, Mar 25, 2012 at 7:31 PM, jeremy hunt wrote: > Thomas J. Hruska wrote: >> >> On 3

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-27 Thread Jeffrey Walton
On Sun, Mar 25, 2012 at 7:31 PM, jeremy hunt wrote: > Thomas J. Hruska wrote: >> >> On 3/23/2012 12:53 AM, jeremy hunt wrote: >>> >>> This posting is to help people to build OpenSSL 1.0.1 with Microsoft >>> Visual Studio. It may also indicate a req

RE: OpenSSL 1.0.1 and TLSv1.2

2012-03-26 Thread KUTILEK Martin
M", I still miss 8 out of the 24 available ciphers. Martin -Message d'origine- De : owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] De la part de Dr. Stephen Henson Envoyé : lundi 26 mars 2012 18:25 À : openssl-users@openssl.org Objet : Re: OpenSSL 1.0.

Re: OpenSSL 1.0.1 and TLSv1.2

2012-03-26 Thread Dr. Stephen Henson
On Mon, Mar 26, 2012, KUTILEK Martin wrote: > Hi, > > I am doing some testing with openssl 1.0.1 and I am trying to find the > proper syntax to display only TLSv1.1+ ciphers. > > When I look in ./ssl/ssl.h, I see > #define SSL_TXT_TLSV1_2 "TLSv1.2" >

OpenSSL 1.0.1 and TLSv1.2

2012-03-26 Thread KUTILEK Martin
Hi, I am doing some testing with openssl 1.0.1 and I am trying to find the proper syntax to display only TLSv1.1+ ciphers. When I look in ./ssl/ssl.h, I see #define SSL_TXT_TLSV1_2 "TLSv1.2" but what ever I try, I always get: Error in cipher list error:14

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-26 Thread jeremy hunt
Thomas J. Hruska wrote: On 3/23/2012 12:53 AM, jeremy hunt wrote: This posting is to help people to build OpenSSL 1.0.1 with Microsoft Visual Studio. It may also indicate a required change to the build instructions for Microsoft Visual Studio. Summary: -- I found I needed to install

RE: OpenSSL 1.0.1 libraries have "1.0.0" in the names

2012-03-24 Thread dave.mclellan
iday, March 23, 2012 5:01 PM To: openssl-users@openssl.org Subject: RE: OpenSSL 1.0.1 libraries have "1.0.0" in the names opensslv.h From: dave.mclel...@emc.com [mailto:dave.mclel...@emc.com] Sent: Thursday, March 22, 2012 8:43 PM To: openssl-users@openssl.org Subject: OpenSSL 1.0.1 libra

RE: OpenSSL 1.0.1 libraries have "1.0.0" in the names

2012-03-23 Thread Jeremy Farrell
opensslv.h From: dave.mclel...@emc.com [mailto:dave.mclel...@emc.com] Sent: Thursday, March 22, 2012 8:43 PM To: openssl-users@openssl.org Subject: OpenSSL 1.0.1 libraries have "1.0.0" in the names I'm seeing "1.0.0" used in the library (.so) names for cryp

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-23 Thread Thomas J. Hruska
On 3/23/2012 12:53 AM, jeremy hunt wrote: This posting is to help people to build OpenSSL 1.0.1 with Microsoft Visual Studio. It may also indicate a required change to the build instructions for Microsoft Visual Studio. Summary: -- I found I needed to install the Windows SDK and

Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-23 Thread jeremy hunt
This posting is to help people to build OpenSSL 1.0.1 with Microsoft Visual Studio. It may also indicate a required change to the build instructions for Microsoft Visual Studio. Summary: -- I found I needed to install the Windows SDK and manually configure my build environment to

OpenSSL 1.0.1 libraries have "1.0.0" in the names

2012-03-23 Thread dave.mclellan
I'm seeing "1.0.0" used in the library (.so) names for crypto and ssl versions. I expected to see 1.0.1, consistent with the 0.9.X stream, where the version number agrees with version in the library name (as referenced in the link of the openssl executable for example). Can someone help me un

  1   2   >