Re: Either a bug or a misunderstanding or Spyders in the code

2006-10-13 Thread Eric S. Eberhard
Kyle, Thank you ... I thought I was missing something (actually the behavior told me what you told me, I just wanted to confirm it was correct). I won't actually use ECB, it was randomly selected from the test file ... A follow-up then ... if I have 37 bytes I would call Update twice and F

Re: Either a bug or a misunderstanding or Spyders in the code

2006-10-13 Thread Kyle Hamilton
OpenSSL does not store the plaintext size in block protocol usage. That's an application-layer issue. ECB mode, by the way, is REALLY discouraged. Padding doesn't come into play until the second-to-last and last blocks. You should get 16*(3 blocks of data +1 block for the EncryptFinal()) == 64

Either a bug or a misunderstanding or Spyders in the code

2006-10-13 Thread Eric S. Eberhard
I am trying to do encryption using the "evp" APIs. For testing I am using "AES-128-ECB" as the cypher. I have no problem encrypting and decrypting, rather I am having problems with the sizes of the buffers. My program is largely the same as evp_test.c function "test1" with the release /opens

Re: i have a question ragarding self-signed certificate

2006-10-13 Thread Max Pritikin
Recall that even the 'ca' certificate is ultimately self-signed. So your question is really about why some self-signed certificates are more trusted than others. In some fashion you could ask this question about any typical 'brand name' store. Why is Store-X trusted more than Store-Y? Sim

i have a question ragarding self-signed certificate

2006-10-13 Thread Chong Peng
guys: we all know that a ca-signed certificate can provide authentication because the ca is trustable, by using ca-signed certificate, one is saying "i am somebady because the ca says so". but it seems that a self-signed certificate _cannot_ provide any authentication at all, because by using s

RE: How to share SSL session when using CreateProcess/execv

2006-10-13 Thread David Schwartz
> Of course, it will be great to have a feature in OpenSSL > implementation iteslf that will enable SSL session handover / or > even session sharing between multiple related processes. Session sharing is pretty hard to do. Handover is not quite as hard. I think that would be a really great featur

Source for entropy on Windows platforms with CryptoAPI installed

2006-10-13 Thread Kyle Hamilton
It just occurred to me that the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed (type REG_BINARY) contains the latest seeded value from everything that CryptoAPI takes into account when generating its random seed. CryptoAPI permutes it with RC4 to come up with a pseudo-ran

Re: How to share SSL session when using CreateProcess/execv

2006-10-13 Thread Kyle Hamilton
The point of SSL is to provide (possibly) data integrity (detection of tampering and validation of the source of the data) and secrecy services /on the wire/. The endpoints have always been known to be points of concern as they must maintain the keys, both private and symmetric, in their memory s

RE: How to share SSL session when using CreateProcess/execv

2006-10-13 Thread urjit_gokhale
>> Since he's talking about a process that forks, there >> shouldn't be a problem. >> He just needs to create a shared mapping in the parent. After >> the 'fork', the address will still be the same. > >However if the program forks and calls exec* then this issue could >arise. The title of the th

Don Dhondt/US/BULL is out of the office.

2006-10-13 Thread Don . Dhondt
I will be out of the office starting 10/13/2006 and will not return until 10/23/2006. __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.

RE: How to share SSL session when using CreateProcess/execv

2006-10-13 Thread Mark
David, > > Agreed. If any object in shared memory contained a pointer to another > > object in shared memory this could cause a problem. You would have to > > ensure that the shared memory was mapped to the same address in all > > processes otherwise the pointers would not be valid. > Since he'

sslv3 alert handshake failure

2006-10-13 Thread IT Professional
I've generated ECC cert using openssl and was testing with the command:openssl s_client -connect localhost:443.Error was encountered:2028:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:.\ssl\s23_clnt.c:562: Anyone has a idea what the error could mean?I can't be su