Re: 0.9.8h failing to build with VS 2005

2008-05-29 Thread Josue Andrade Gomes
On Thu, May 29, 2008 at 2:40 PM, Mounir IDRASSI <[EMAIL PROTECTED]> wrote: > Hi, > > This is a bug that has been reported on openssl-dev. It's due to a bug in > the file x86ms.pl responsible for the generation of MASM assembly code. To > be corrected, the line 273 of this file containing "$extra" s

0.9.8h bug report

2008-05-29 Thread Tuan Nha
I complie 0.9.8h today and attempted to run onwin32 machine, but I have bug: openssl pkcs12 -export -in MyCert.pem -inkey MyKey.pem -out MyCert.p12 Loading 'screen' into random state - done Enter pass phrase for MyKey.pem: Enter Export Password: Verifying - Enter Export Password: O

Re: cert already in hash table

2008-05-29 Thread Mounir IDRASSI
Hi, The only thing I see in your code is that, inside the while block, you are not setting the CA variable to the next element of the list Gl_listeCA. Thus, at the second loop you will always get an error when calling X509_STORE_add_cert because CA->x509 is pointing to the same certificate as in t

cert already in hash table

2008-05-29 Thread Francis GASCHET
Sorry for the double ;-) Hello, I getting crazy ! In one application I insert CA certificates and CRLs in the X509_STORE. This store is included in the SSL_CTX. No problem. The certificate verification process during handshake runs like a charm. In a second application, I create an X509_STORE a

openssl-users@openssl.org

2008-05-29 Thread Francis GASCHET
Hello, I getting crazy ! In one application I insert CA certificates and CRLs in the X509_STORE. This store is included in the SSL_CTX. No problem. The certificate verification process during handshake runs like a charm. In a second application, I create an X509_STORE and try to insert my CA

Re: 0.9.8h failing to build with VS 2005

2008-05-29 Thread Mounir IDRASSI
Hi, This is a bug that has been reported on openssl-dev. It's due to a bug in the file x86ms.pl responsible for the generation of MASM assembly code. To be corrected, the line 273 of this file containing "$extra" should be removed. -- Mounir IDRASSI IDRIX http://www.idrix.fr ___

RE: Wider fallout from Debian issue?

2008-05-29 Thread Mikhail Kruk
Only against random attacks of course, if all attackers first check these keys, then removing them strengthens the algorithm against (non-random) brute-force attack. This said, the effort of explicitly avoiding these is probably wasted (unless one suspects one has a identically weak RNG). --

Re: No NID for SHA2 (was Re: unable to verify PKCS#7 objects signed with BC(CMS))

2008-05-29 Thread Victor Duchovni
On Wed, May 28, 2008 at 02:23:44PM -0500, [EMAIL PROTECTED] wrote: > On Tue, May 27, 2008 at 03:23:27PM -0500, [EMAIL PROTECTED] wrote: > > So a developer at my company is having a problem. > > > > When our business partner signs a data object using Bouncy Castle > > (PKCS#7 CMS), outputs PEM, an

Re: Operation not permitted on SSL_Write()

2008-05-29 Thread Ales Katona
Discard, while originally the problem was with a moving buffer, the later trouble I had were my own bugs (SMTP CRLF line break algorithm had problems). Ales __ OpenSSL Project http://www.openssl.

Re: Wider fallout from Debian issue?

2008-05-29 Thread Victor Duchovni
On Thu, May 29, 2008 at 09:48:38AM +0200, Steffen DETTMER wrote: > On the other hand, someone else could assume that all potentially > weak keys are regenerated and the concerned (boxes, > systems, admins, security professionals, ...) now are more > sensitive, carefully exchanged all keys against,

BIO_do_connect fails. Usage of socket, BIO socket and non-blocking I/O.

2008-05-29 Thread Konrad Kleine
Hello, we are currently programming on an integration of OpenSSL into our existing Socket architecture. We have a problem with non-blocking connections. In our test scenario we coded a simple server and client that shall communicate encrypted via SSL. But for now we simply use an unencrypted "Soc

RE: SSL_ACCEPT...!!! failure

2008-05-29 Thread Ambarish Mitra
vinni rathore a écrit : > > hi, > > i am stuck with the error "Unable to get local issuer certificate" and > then "SSL3_GET_CLIENT_CERTIFICATE: peer certificate not return". > > I have created my own certificates using Openssl.exe . I have created > CACert.pem which is self signed CA certificate

Re: SSL_ACCEPT...!!! failure

2008-05-29 Thread Dominique Lohez
Hi vinni, As a hint i will reformulate how i understand your problem The server cannot accept the client certificate because it cannot check that the certificate have been issued by a trusted CA. This arise because the CA certificate is not available so the questios are 1) Is the CA ce

SSL_ACCEPT...!!! failure

2008-05-29 Thread vinni rathore
hi, i am stuck with the error "Unable to get local issuer certificate" and then "SSL3_GET_CLIENT_CERTIFICATE: peer certificate not return". I have created my own certificates using Openssl.exe . I have created CACert.pem which is self signed CA certificate and then two other certificates one is C

Re: Operation not permitted on SSL_Write()

2008-05-29 Thread Ales Katona
I've found out that it's related to how SSL_Write() expects the same buffer pointer after an SSL_ERROR_WANT_WRITE occurs. I also found out that this can be avoided by issuing a SSL_ctrl() which I tried, but now I get corrupted data from certain point. How EXACTLY is SSL_Write in non-blocking

0.9.8h failing to build with VS 2005

2008-05-29 Thread Josue Andrade Gomes
Hi all, Steps to reproduce: 1. Download and unpack openssl-0.9.8h.tar.gz 2. Open Visual Studio 2005 Command Prompt 3. ms\do_masm.bat 4. nmake -f ms\ntdll.mak Gives error: ml /Cp /coff /c /Cx /Focrypto\sha\asm\s1_win32.obj .\crypto\sha\asm\s1_win32.asm Microsoft (R) Macro Assembler Versi

Re: Wider fallout from Debian issue?

2008-05-29 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, May 28, 2008 at 21:10 -0400: > > > Only against random attacks of course, if all attackers > > > first check these keys, then removing them strengthens the > > > algorithm against (non-random) brute-force attack. This > > > said, the effort of explicitly avoiding the

Netscape/OpenSSL Cipher Forcing Bug

2008-05-29 Thread Sojanna . Mun
Hello, We're performing PCI audit security scan on our machines and this one vulnerability keeps coming back on our apache 2.2 server. I followed the solution is provided and changed the line ssl/ssl.h (0x0FFFL -> 0x0FFFL^SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG and also added the entire

No NID for SHA2 (was Re: unable to verify PKCS#7 objects signed with BC(CMS))

2008-05-29 Thread travis+ml-users
On Tue, May 27, 2008 at 03:23:27PM -0500, [EMAIL PROTECTED] wrote: > So a developer at my company is having a problem. > > When our business partner signs a data object using Bouncy Castle > (PKCS#7 CMS), outputs PEM, and we use OpenSSL and read it in, that > works fine, but when we try to get the

Re: Wider fallout from Debian issue?

2008-05-29 Thread Ger Hobbelt
On Wed, May 28, 2008 at 6:47 PM, Deane Sloan <[EMAIL PROTECTED]> wrote: > To tie this off - is it fair to say that the impact of say 2048bit RSA > SSL(etc) using a private key in the affected range is a valid > consideration/concern, however in combination with the likelihood > stated, the overall

Re: Library used for I/O operation

2008-05-29 Thread Ger Hobbelt
On Wed, May 28, 2008 at 12:24 PM, Silvia <[EMAIL PROTECTED]> wrote: > Hi, > I'm trying to test some algorithm with openssl comman line and oprofile. > Then, to separate the time used for the real cryptographic operation from > the time used for I/O operation, I need to know which library is used to