Re: Why 2 DLL's for building OpenSSL
On Mon, 2010-07-05 at 12:54 +0200, Deckers, Rob wrote: Is there a special reason why 2 DLL's? Could it be combined in just one DLL? one is crypto, with all the crypto stuffs, the other is ssl, with the SSL/TLS implementation. I assume they are separated because you could build applications on top of crypto, without needing ssl. As far as I know there is no method to build a single dll, but I'm not an expert in Windows programming (read: I don't know if there are generic methods to merge two dlls in one). Best, -- Emanuele Cesena emanuele.ces...@gmail.com Il corpo non ha ideali smime.p7s Description: S/MIME cryptographic signature
Re: ECDSA Encryption
On Thu, 2009-07-23 at 09:07 -0400, Bram Cymet wrote: Is it possible to use openssl to do ecdsa encryption/decryption and if so how? Or can someone recommend a linux command line tool that would? ECDSA is Elliptic Curve Digital **Signature** Algorithm, hence you can only sign/verify with this algorithm. ECDH is Elliptic Curve Diffie Hellman and can be used to share a secret key between two parties. ECIES is Integrated Encryption Scheme which mix EC and AES, but it is not implemented in OpenSSL. More details on these algorithms on wikipedia ;) In conclusion, with ECDSA you can only sign/verify, you may encrypt mixing ECDH to generate keys and AES to do symmetric encryption (even at command line: look at ecparam, ecdh, enc), or you may use ECIES but you need a different library. bye! -- Emanuele Cesena emanuele.ces...@gmail.com Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
Re: How to create a non exportable private key certificate using openssl
On Wed, 2009-07-15 at 13:25 +0200, Dr. Stephen Henson wrote: A possibility would be to use a PKCS#11 soft-token which wont export keys. I'm not aware of any such thing but it could be done. It would need to encrypt it's key database in such a way that it would only work on one PC. I suggest using opencryptoki (pkcs11 software device) with TPM. Use a TPM non-migratable key. bye! -- Emanuele Cesena emanuele.ces...@gmail.com Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
Re: RFC 4680 implementation
Hi, On Tue, 2009-04-14 at 02:16 -0700, nhack wrote: I want to know if there is any library that provides support for the RFC 4680, I have found this http://tlsext-general.blogspot.com/ but my problem with this library is that the client can send the supplemental data only after the server done state, and i need that data after the server hello done state. nice to see someone is interested in our work ;-) BTW, we have a newer version of the code, with a slightly better interface, if you need. Unfortunately what you ask is not RFC-4680 compliant: the client SupplementalData message MUST be send after the ServerDone. You could take from our library and modify your own libssl to add a client message after the ServerHello, but personally I think this is more tricky (in fact in TLS there are no client's messages between ServerHello and ServerDone)... Could you explain in more details why do you really need a message between the ServerHello and ServerDone? Best regards, -- Emanuele Cesena emanuele.ces...@gmail.com http://ecesena.dyndns.org Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
Re: ECC
On Sat, 2009-02-07 at 21:57 +0100, Z wrote: OpenSSL can encrypt with ECC? no. Not directly, at least. OpenSSL has support for ECC, but only ECDSA (signature scheme) and ECDH (key agreement protocol) are implemented. You should implement ECIES or ECElGamal or whatever you like for encryption. Any example? for ECC, check apps/ec* bye! -- Emanuele Cesena emanuele.ces...@gmail.com http://ecesena.dyndns.org Il corpo non ha ideali smime.p7s Description: S/MIME cryptographic signature
Re: Client side certificate for using in SSL connection
On Thu, 2009-02-05 at 17:01 +0300, mb0 wrote: 1. can it be self-signed root certificate? it can be either a root certificate or a certificate signed by a CA. The certificate structure is the same, the meaning is different. When the server receive the certificate, it has to verify it. If it is self-signed, it must have a copy of that certificate stored somewhere. So, if you plan to have many clients, you should copy all their certificates somewhere in the server storage... this does not scale. A better approach is to create a CA, save only its certificate on the server, and let any client have a certificate issued by that CA. 2. what options of openssl must i use so that Internet Explorer could import it? already replied. 3. if no client certificate is used, how SSL handshake happens? what certificate/private ey is used on the client side? TLS/SSL support server authentication or mutual (i.e. client+server) authentication. With server only authentication, client and server agree on a pre-master secret (which is symmetric key), then they compute and validate a master secret, from which application keys are derived (for encrypting/hmac-ing the record layer messages). If client authentication is required, the client additionally digitally signs (asymmetric crypto) a particular piece of data. Almost nothing changes in the agreement of the pre-master secret. So, if you don't use client auth, no client private key is used. bye! -- Emanuele Cesena emanuele.ces...@gmail.com http://ecesena.dyndns.org Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
Re: ECDSA signature verification
On Mon, 2009-01-19 at 11:22 +, Young, Alistair wrote: * is it possible to define our own curves (rather than using one of the predefined curves)? if you want to play with your EC, check crypto/ec/ectest.c if you want to add a new curve to openssl, have a look at crypto/ec/ec_curve.c, crypto/objects/object.txt I opened a thread in openssl-dev: Adding an EC to OpenSSL. * how configurable is the hashing step? I see that there are parameters like -ecdsa-with-SHA1 - can arbitrary hashing functions be used? there is only sha1. You have to add more EVP, I think... OpenSSL 0.9.9 is required for public-key EVP. * where can I find some good (= simple!) documentation on using OpenSSL for this task. I've not had much luck finding anything relevant in the man page. source code? ECDSA has also doxygen comments :-) bye! -- Emanuele Cesena emanuele.ces...@gmail.com http://ecesena.dyndns.org Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
RE: ECDSA signature verification
On Fri, 2009-01-23 at 10:13 +, Young, Alistair wrote: We really need to use the FIPS version of OpenSSL, so updating the code isn't a possiblity. ah ok, so maybe you can just skip EVP. bye! -- Emanuele Cesena emanuele.ces...@gmail.com http://ecesena.dyndns.org Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager majord...@openssl.org
[BUG] openssl speed and EVP engine
Good morning, I found openssl speed does not use any EVP engine I try to set up. It works correctly, e.g., with RSA engines. I'm using OpenSSL 0.9.8g 19 Oct 2007, but the bug (?) seems to apply to other 0.9.8 versions too. Regards -- Emanuele Cesena [EMAIL PROTECTED] http://ecesena.dyndns.org Il corpo non ha ideali __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]