Re: openssl interop with bouncy castle

2006-12-15 Thread Kaushalye Kapuruge
Marek Marcola wrote: Hello, As an addition to my previous mail, I can decrypt the data that are encrypted by my application. (It's a WS-Security Implementation). But it is not inter-operable with the WSS4J. WSS4J uses bouncy castle crypto package. The reason is that they use ISO 10126

Re: openssl interop with bouncy castle

2006-12-15 Thread Marek Marcola
Hello, For encryption I can disable the padding in openssl and fill the data up to a multiplication of a block size as per http://www.w3.org/TR/xmlenc-core. The spec says a way to pad the block (section : Padding). So in the decryption process I have to check the last byte to get the pad

how to use the shared key through ECDH_compute_key method

2006-12-15 Thread shakal
Hi all, I'm a new user trying to use the EC_DH benefits on key sharing. But I'm having some problems to understand how it works... First, in(ecdhtest.c), aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1); it generates the following key in both sides Alice and Bob key Alice =

ECDSA: using the same EC_KEY to sign and verify...

2006-12-15 Thread shakal
Hi all, here I come again. I'm testing the ECDSAtest.c approach to make my own test and I saw one thing that I don't really know if it's right. I'm sorry about taking your time, but I'm really trying to learn EC! 01 int main() { 02 const char message[] = abc; 03 unsigned char digest[20]; 04

Re: ECDSA: using the same EC_KEY to sign and verify...

2006-12-15 Thread Nils Larsch
[EMAIL PROTECTED] wrote: Hi all, here I come again. I'm testing the ECDSAtest.c approach to make my own test and I saw one thing that I don't really know if it's right. I'm sorry about taking your time, but I'm really trying to learn EC! 01 int main() { 02 const char message[] = abc; 03

Re: how to use the shared key through ECDH_compute_key method

2006-12-15 Thread Nils Larsch
[EMAIL PROTECTED] wrote: Hi all, I'm a new user trying to use the EC_DH benefits on key sharing. But I'm having some problems to understand how it works... First, in(ecdhtest.c), aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1); it generates the following key in both

Re: how to use the shared key through ECDH_compute_key method

2006-12-15 Thread shakal
Nils, thanks. That's what I though, but I've looked rc5 up in the /crypto/rc5/rc5*.{h,c} files, and I don't know how to suply this key, 'cause it generates its key by its own, i.e, through RC5_32_set_key method. Is there another way to use this shared key(or one part of it) from EC_DH, in the rc5

Re: [EMAIL PROTECTED]: Bug report]

2006-12-15 Thread Kyle Hamilton
It's best if you tag your in/out files with '.pem', '.csr', '.crt'. I realize that UNIX doesn't deal with file extensions, but it goes a LONG way to help with debugging. Do you have a file called ./private/ca-key.pem? It is looking for the CA's private key, which is located in the same file as

Re: [EMAIL PROTECTED]: Bug report]

2006-12-15 Thread Kyle Hamilton
What are the contents of your openssl.cnf? Are you using precisely the same configuration you were using with earlier versions of openssl? If you have the ability to use an older version of openssl with the same configuration file, does it currently work? -Kyle H On 12/15/06, Alex [EMAIL

Re: [EMAIL PROTECTED]: Bug report]

2006-12-15 Thread Kyle Hamilton
I'm trying to retrace your steps to figure out where the bug could be (and honestly, the diagnostics are not that helpful). However, there is one more thing that I would like you to check: Is the file ./ca-cert.pem in place, and does it contain a certificate? If it does not have the text