Re: Library used for I/O operation

2008-05-29 Thread Ger Hobbelt
On Wed, May 28, 2008 at 12:24 PM, Silvia [EMAIL PROTECTED] wrote: Hi, I'm trying to test some algorithm with openssl comman line and oprofile. Then, to separate the time used for the real cryptographic operation from the time used for I/O operation, I need to know which library is used to

Re: Wider fallout from Debian issue?

2008-05-29 Thread Ger Hobbelt
On Wed, May 28, 2008 at 6:47 PM, Deane Sloan [EMAIL PROTECTED] wrote: To tie this off - is it fair to say that the impact of say 2048bit RSA SSL(etc) using a private key in the affected range is a valid consideration/concern, however in combination with the likelihood stated, the overall risk

No NID for SHA2 (was Re: unable to verify PKCS#7 objects signed with BC(CMS))

2008-05-29 Thread travis+ml-users
On Tue, May 27, 2008 at 03:23:27PM -0500, [EMAIL PROTECTED] wrote: So a developer at my company is having a problem. When our business partner signs a data object using Bouncy Castle (PKCS#7 CMS), outputs PEM, and we use OpenSSL and read it in, that works fine, but when we try to get the

Netscape/OpenSSL Cipher Forcing Bug

2008-05-29 Thread Sojanna . Mun
Hello, We're performing PCI audit security scan on our machines and this one vulnerability keeps coming back on our apache 2.2 server. I followed the solution is provided and changed the line ssl/ssl.h (0x0FFFL - 0x0FFFL^SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG and also added the entire

Re: Wider fallout from Debian issue?

2008-05-29 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, May 28, 2008 at 21:10 -0400: Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is

0.9.8h failing to build with VS 2005

2008-05-29 Thread Josue Andrade Gomes
Hi all, Steps to reproduce: 1. Download and unpack openssl-0.9.8h.tar.gz 2. Open Visual Studio 2005 Command Prompt 3. ms\do_masm.bat 4. nmake -f ms\ntdll.mak Gives error: ml /Cp /coff /c /Cx /Focrypto\sha\asm\s1_win32.obj .\crypto\sha\asm\s1_win32.asm Microsoft (R) Macro Assembler

Re: Operation not permitted on SSL_Write()

2008-05-29 Thread Ales Katona
I've found out that it's related to how SSL_Write() expects the same buffer pointer after an SSL_ERROR_WANT_WRITE occurs. I also found out that this can be avoided by issuing a SSL_ctrl() which I tried, but now I get corrupted data from certain point. How EXACTLY is SSL_Write in non-blocking

SSL_ACCEPT...!!! failure

2008-05-29 Thread vinni rathore
hi, i am stuck with the error Unable to get local issuer certificate and then SSL3_GET_CLIENT_CERTIFICATE: peer certificate not return. I have created my own certificates using Openssl.exe . I have created CACert.pem which is self signed CA certificate and then two other certificates one is

Re: SSL_ACCEPT...!!! failure

2008-05-29 Thread Dominique Lohez
Hi vinni, As a hint i will reformulate how i understand your problem The server cannot accept the client certificate because it cannot check that the certificate have been issued by a trusted CA. This arise because the CA certificate is not available so the questios are 1) Is the CA

RE: SSL_ACCEPT...!!! failure

2008-05-29 Thread Ambarish Mitra
vinni rathore a écrit : hi, i am stuck with the error Unable to get local issuer certificate and then SSL3_GET_CLIENT_CERTIFICATE: peer certificate not return. I have created my own certificates using Openssl.exe . I have created CACert.pem which is self signed CA certificate and then

BIO_do_connect fails. Usage of socket, BIO socket and non-blocking I/O.

2008-05-29 Thread Konrad Kleine
Hello, we are currently programming on an integration of OpenSSL into our existing Socket architecture. We have a problem with non-blocking connections. In our test scenario we coded a simple server and client that shall communicate encrypted via SSL. But for now we simply use an unencrypted

Re: Wider fallout from Debian issue?

2008-05-29 Thread Victor Duchovni
On Thu, May 29, 2008 at 09:48:38AM +0200, Steffen DETTMER wrote: On the other hand, someone else could assume that all potentially weak keys are regenerated and the concerned (boxes, systems, admins, security professionals, ...) now are more sensitive, carefully exchanged all keys against,

Re: Operation not permitted on SSL_Write()

2008-05-29 Thread Ales Katona
Discard, while originally the problem was with a moving buffer, the later trouble I had were my own bugs (SMTP CRLF line break algorithm had problems). Ales __ OpenSSL Project

Re: No NID for SHA2 (was Re: unable to verify PKCS#7 objects signed with BC(CMS))

2008-05-29 Thread Victor Duchovni
On Wed, May 28, 2008 at 02:23:44PM -0500, [EMAIL PROTECTED] wrote: On Tue, May 27, 2008 at 03:23:27PM -0500, [EMAIL PROTECTED] wrote: So a developer at my company is having a problem. When our business partner signs a data object using Bouncy Castle (PKCS#7 CMS), outputs PEM, and we use

RE: Wider fallout from Debian issue?

2008-05-29 Thread Mikhail Kruk
Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is probably wasted (unless one suspects one has a identically weak RNG). --

Re: 0.9.8h failing to build with VS 2005

2008-05-29 Thread Mounir IDRASSI
Hi, This is a bug that has been reported on openssl-dev. It's due to a bug in the file x86ms.pl responsible for the generation of MASM assembly code. To be corrected, the line 273 of this file containing $extra should be removed. -- Mounir IDRASSI IDRIX http://www.idrix.fr

openssl-users@openssl.org

2008-05-29 Thread Francis GASCHET
Hello, I getting crazy ! In one application I insert CA certificates and CRLs in the X509_STORE. This store is included in the SSL_CTX. No problem. The certificate verification process during handshake runs like a charm. In a second application, I create an X509_STORE and try to insert my

cert already in hash table

2008-05-29 Thread Francis GASCHET
Sorry for the double ;-) Hello, I getting crazy ! In one application I insert CA certificates and CRLs in the X509_STORE. This store is included in the SSL_CTX. No problem. The certificate verification process during handshake runs like a charm. In a second application, I create an X509_STORE

Re: cert already in hash table

2008-05-29 Thread Mounir IDRASSI
Hi, The only thing I see in your code is that, inside the while block, you are not setting the CA variable to the next element of the list Gl_listeCA. Thus, at the second loop you will always get an error when calling X509_STORE_add_cert because CA-x509 is pointing to the same certificate as in

0.9.8h bug report

2008-05-29 Thread Tuan Nha
I complie 0.9.8h today and attempted to run onwin32 machine, but I have bug: openssl pkcs12 -export -in MyCert.pem -inkey MyKey.pem -out MyCert.p12 Loading 'screen' into random state - done Enter pass phrase for MyKey.pem: Enter Export Password: Verifying - Enter Export Password: