Re: Fwd: openssl ECC/ECDSA question

2007-09-25 Thread Marek Marcola
Hello, > > Hello, > > > Oops, forgot to include the functions. These are: > > > > > > > > > i2d_ECDSA_SIG > > > > > > d2i_ECDSA_SIG > > This functions are implemented in file crypto/ecdsa/ecs_asn1.c. > > Proof (after compiling): > > $ nm crypto/ecdsa/ecs_asn1.o | grep -E 'i2d|d2i' > > 00a0

Re: Fwd: openssl ECC/ECDSA question

2007-09-25 Thread Dr. Stephen Henson
On Wed, Sep 26, 2007, Marek Marcola wrote: > Hello, > > Oops, forgot to include the functions. These are: > > > > > > i2d_ECDSA_SIG > > > > d2i_ECDSA_SIG > This functions are implemented in file crypto/ecdsa/ecs_asn1.c. > Proof (after compiling): > $ nm crypto/ecdsa/ecs_asn1.o | grep -E 'i2d|d

Re: Fwd: openssl ECC/ECDSA question

2007-09-25 Thread Marek Marcola
Hello, > Oops, forgot to include the functions. These are: > > > i2d_ECDSA_SIG > > d2i_ECDSA_SIG This functions are implemented in file crypto/ecdsa/ecs_asn1.c. Proof (after compiling): $ nm crypto/ecdsa/ecs_asn1.o | grep -E 'i2d|d2i' 00a0 T d2i_ECDSA_SIG 0060 T i2d_ECDSA_SIG Looking

RE: Safe signed certificate generation during server installation ?

2007-09-25 Thread David Schwartz
> > In this second step of verification, you can exchange public keys, > > certificates, challenges, responses, and so on. Each side can > > verify what it > > is talking to on the other side by whatever mechanism you want. > Ahh, yes, ok. But the result would not be SSL but > something-SSL-based

AW: via padlock support much slower in 0.9.8e than in 0.9.8d, why?

2007-09-25 Thread Buddy Butterfly
Hi, strange. What could be the reason then? I have 2 systems available for testing. C5 and C7. C5 runs Suse 9.3 (kernel 2.6.11) which shows the difference I have posted below. C7 runs Debian etch (kernel 2.6.18 type i686). On the C7 I see no difference between openssl version d and e but speed see

Re: via padlock support much slower in 0.9.8e than in 0.9.8d, why?

2007-09-25 Thread Harald Latzko
Hi! I cannot confirm these performance differences between 0.9.8d and 0.9.8e. My results on a Via CPU are: 0.9.8d == engine "padlock" set. Doing aes-256-cbc for 3s on 16 size blocks: 11906104 aes-256-cbc's in 3.00s Doing aes-256-cbc for 3s on 64 size blocks: 9088256 aes-256-cbc's in 2

Re: Run ssl application

2007-09-25 Thread Marek Marcola
Hello, > When I run ssl_server (after compiling ssl_server.c ), there is a > error below. Please help me to solve this error. > > [EMAIL PROTECTED] Codevidu]# ./sslserver 8000 > 3691:error:140A90A1:SSL routines:SSL_CTX_new:library has no > ciphers:ssl_lib.c:1424: > Aborted Did you initialize Op

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Steffen DETTMER
* Victor Duchovni wrote on Tue, Sep 25, 2007 at 11:40 -0400: > On Tue, Sep 25, 2007 at 05:20:28PM +0200, Steffen DETTMER wrote: > > creating a new TLS (version) standard/RFC > > Approximately correct, not a new TLS standard, the existing TLS 1.1 is > likely sufficient, rather a new standard cipher-

via padlock support much slower in 0.9.8e than in 0.9.8d, why?

2007-09-25 Thread Buddy Butterfly
With a VIA C5 board I get a huge difference in speed with engine padlock support (same machine same OS etc.). Where is the difference coming from. Are there any changes regarding buffering or block sizes? Look at this results: 0.9.8e: #./openssl speed -evp aes-256-cbc -engine padlock engine "pad

RE: EC Oddity

2007-09-25 Thread Bill Colvin
Thanks for the explanation as to why this is occurring. Bill -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson Sent: September 25, 2007 11:49 AM To: openssl-users@openssl.org Subject: Re: EC Oddity Some of the newer functions in OpenSSL

Re: EC Oddity

2007-09-25 Thread Dr. Stephen Henson
On Tue, Sep 25, 2007, Bill Colvin wrote: > I have been doing some EC test code with the Sept. 5 snapshot and have > observed something that I find a little odd. So I thought I would > mention it so someone could take a look to see if it is a bug or what is > supposed to occur. > > > > I have

Re: intermediate CA configuration

2007-09-25 Thread Dr. Stephen Henson
On Tue, Sep 25, 2007, Bynum, Don wrote: > Please send me your extensions file, CA cert/Key and the CSR you are > using for your intermediate. I am assuming that what you have so far is > for testing purposes. Otherwise, I would not ask for the CA key > (obviously). Send them to me as a zip file

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Victor Duchovni
On Tue, Sep 25, 2007 at 05:20:28PM +0200, Steffen DETTMER wrote: > > GSSAPI uses Keberos-5 KDCs for key management. > > Ahh, you mean creating a new TLS (version) standard/RFC, that is > using GSSAPI and is to be used e.g. inside large organizations > that already have some GSSAPI available (beca

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Steffen DETTMER
* Victor Duchovni wrote on Tue, Sep 25, 2007 at 09:27 -0400: > On Tue, Sep 25, 2007 at 11:58:45AM +0200, Steffen DETTMER wrote: > > > I would like to see GSSAPI support in TLS (so would Microsoft > > > and a few others). This addresses key management, without > > > requiring secondary protocols, an

EC Oddity

2007-09-25 Thread Bill Colvin
I have been doing some EC test code with the Sept. 5 snapshot and have observed something that I find a little odd. So I thought I would mention it so someone could take a look to see if it is a bug or what is supposed to occur. I have a PEM file with an EC private key. I want to create an ep

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Victor Duchovni
On Tue, Sep 25, 2007 at 11:58:45AM +0200, Steffen DETTMER wrote: > > No, the challenge is key management. TLS is just fine. > > What do you mean, `TLS is just fine'? TLS is a sound protocol, the problem is not the protocol, the problem is key management. > Doesn't it depend on the requirements

RE: intermediate CA configuration

2007-09-25 Thread Bynum, Don
Please send me your extensions file, CA cert/Key and the CSR you are using for your intermediate. I am assuming that what you have so far is for testing purposes. Otherwise, I would not ask for the CA key (obviously). Send them to me as a zip file and I'll take a look. Don. [EMAIL PROTECTED]

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Steffen DETTMER
* Victor Duchovni wrote on Mon, Sep 24, 2007 at 21:05 -0400: > > Whatever you want to call it. The point is, if the client > > can't validate the self-signed cert, you need some other way > > to make sure the server and client have opposite ends of the > > *same* SSL connection, rather than ends of

Re: Safe signed certificate generation during server installation ?

2007-09-25 Thread Steffen DETTMER
* David Schwartz wrote on Mon, Sep 24, 2007 at 07:42 -0700: > > Storing some fingerprint of a certificate or public key locally > > in some trusted place (such as a local file system) seems to be > > quite secure (should be the same level as having a CAs root > > certificate in a file), however, I'