Re: RFC 4130 checksum in SHA1

2008-06-20 Thread javierm
Just a note, I've found documents like http://ietfreport.isoc.org/all-ids/draft-ietf-ediint-compression-08.txt which in secction 2.1 says to calculate MIC on the original data that was signed as PER [AS1] (but 4130 is AS2) In section 7.3.1.3 of 4130, first paragraph in bullets it is said: For

Re: RFC 4130 checksum in SHA1

2008-06-20 Thread javierm
Thanks for the wait: Well, these are the steps followed Encrypted body with Mime headers.- body decrypted and multipart/signed message obtained Signature in binary, so processed with openssl pkcs7 to convert the binary signature to b64 (script in perl to extract that process it and put it ba

Re: DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
What version of the library are you using ? On Fri, Jun 20, 2008 at 9:01 PM, Siddhartha Chhabra < [EMAIL PROTECTED]> wrote: > I tried that but I think it has to do with the cast applied to the > functions as it says > > cannot convert parameter 1 from 'int (__cdecl *)(void)' to 'i2d_of_void > (__

Re: DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
I tried that but I think it has to do with the cast applied to the functions as it says cannot convert parameter 1 from 'int (__cdecl *)(void)' to 'i2d_of_void (__cdecl *)' This conversion requires a reinterpret_cast, a C-style cast or function-style cast cannot convert parameter 1 from '

RE: DSA signing and verification

2008-06-20 Thread Bill Colvin
Check your include statements. You might need either or both of: #include #include Bill From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Siddhartha Chhabra Sent: June 20, 2008 8:39 PM To: openssl-users@openssl.org Subject: Re: DSA signing

Re: DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
On trying the macros, it gives the following errors c:\se_simulation2\verificationserver\verifier\verifier\verifier.cpp(201) : error C2664: 'PEM_ASN1_write' : cannot convert parameter 1 from 'int (__cdecl *)(void)' to 'i2d_of_void (__cdecl *)' This conversion requires a reinterpret_cast, a

Re: DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
I will try the method that Bill just mentioned and hope that it works, Thanks again, but I would still like to know the problem with the way I am trying to do stuff. Thanks On Fri, Jun 20, 2008 at 4:58 PM, Siddhartha Chhabra < [EMAIL PROTECTED]> wrote: > Thanks for your quick replies, however, I

Re: DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
Thanks for your quick replies, however, I did not understand it clearly, I am very new to OpenSSL Here is what I am doing in my code dsa=DSA_generate_parameters(1024,seed,20,&counter,&h,cb,bio_err); DSA_generate_key(dsa) Now I have the keys generated. Now if I say SHA1(sigbuf,11,dgst); /

Re: RFC 4130 checksum in SHA1

2008-06-20 Thread javierm
Hi jkoehring: Thanks a lot for the help, (ah just noticed another reply from you on this question placed in another way, thanks). I tried that part too but did not get the expected checksum. Not that I doubt what you say, but perhaps I'm mistaken at some point. When I do the verify, the openss

RE: DSA signing and verification

2008-06-20 Thread Bill Colvin
I had a similar problem. I found I had to define my own macros for this as they were not in the OpenSSL set. #define PEM_write_DSAPublicKey(fp,x) \ PEM_ASN1_write((int (*)())i2d_DSAPublicKey,\ PEM_STRING_DSA_PUBLIC,fp,(char *)x,NULL,NULL,0,NULL,NULL) #define PEM_read_

Re: DSA signing and verification

2008-06-20 Thread javierm
Hi Siddhartha: It's never a problem, but the procedure is as follows: 1.- You sign with private key and certificate connected with that key 2.- If you then encrypt, you encrypt with the certificate of your counterpart or recepient When the recepient gets the encrypted block of data, he decrypts

DSA signing and verification

2008-06-20 Thread Siddhartha Chhabra
Hi all, I am trying to use DSA_sign and DSA_verify functions to generate a signature and verify it. If I do this in the same file, that is signing and then verifying using the public key, things go on smoothly. However, if I try to save the DSA structure, that is by saving each of the values other

Re: Server Authentication

2008-06-20 Thread AlokBhatnagar
Hello Patrick, Thanks for the detailed information. Regards Alok Bhatnagar - Original Message - From: "Patrick Patterson" <[EMAIL PROTECTED]> To: Sent: Friday, June 20, 2008 7:26 PM Subject: Re: Server Authentication > Hi Alok; > > On June 20, 2008 09:02:15 am AlokBhatnagar wrote: >

RFC 4130 checksum in SHA1

2008-06-20 Thread javierm
Can anyone help me with the procedure to calculate the message integrity check in this RFC? it's about calculating the sha1 checksum over a multipart message. This is the text in the RFC (http://www.ietf.org/rfc/rfc4130.txt), chapter 7.1, paragraph 8) The EC Interchange and the RFC 1767 MI

SSL + Compression

2008-06-20 Thread Ed W
Hi, there are some references which suggest that webservers and mail servers can ask the SSL layer to implement compression? I see some references to this scattered about the internet, but no notes on what is required to enable this? Can someone please shed some light? Is support required spe

Re: Given a certificate (PKC#7 format) how can you determine the root certificate file name

2008-06-20 Thread Victor Duchovni
On Thu, Jun 19, 2008 at 11:31:39PM -0700, Sendroiu Eugen wrote: > If the files are stored locally in a directory, > then you can specify to the CTX the hash directory ( > X509_STORE_load_locations(store,hashdir,rootfile) ), but you need to > name your certificate file(s) with the hash of the subje

Re: Server Authentication

2008-06-20 Thread Kyle Hamilton
I do have to point out, no CA pays Mozilla to be in Firefox's database. What the CA pays for is the auditing required to pass Mozilla's criteria for inclusion in the database. That said, my personal opinion is that the CA model is broken from the start, and I am pushing for a way to opt out of Mo

Re: Server Authentication

2008-06-20 Thread Sendroiu Eugen
As I said you usually can't. For instance Firefox has a database with certificates from many trust anchors ( they pay to be in that database), so when wants to validate a certificate it asks the db about it. If you have an HTTPS server which has a self-signed certificate that isn't in Firefox's db

Re: Server Authentication

2008-06-20 Thread AlokBhatnagar
Hello Sendroiu, Thats what i was asking How can i get the certificates of CAs i turst? Regards Alok Bhatnagar - Original Message - From: Sendroiu Eugen To: openssl-users@openssl.org Sent: Friday, June 20, 2008 7:12 PM Subject: Re: Server Authentication From what

Re: Server Authentication

2008-06-20 Thread Patrick Patterson
Hi Alok; On June 20, 2008 09:02:15 am AlokBhatnagar wrote: > Thanks david, > > I know that the domain name should be same as the common name in server > certificate which is sent by the server to the client. > > As I know, The SSL client verifies the server's certificate against the CA > certifica

Strange openssl server problems - help sought

2008-06-20 Thread Jim Segrave
I am seeing some strange behaviour with openssl, versions 0.9.8e, f, g and h on a Gentoo Linux 2.6.22 machine Intel Core2 (amd64 architecture). Following some googling with gentoo, I have built each version with and without enable-tlsext. The problem that I am seeing is that an openssl server, us

Re: Server Authentication

2008-06-20 Thread Sendroiu Eugen
>From what I understand, you need the trust anchors certificate( eg Verisign ) so that you can check the server's certificate against the probably self-signed Verisign certificate. It is supposed that you have already have the certificates of CAs you trust. If your question is how to find online

Re: Server Authentication

2008-06-20 Thread AlokBhatnagar
Thanks david, I know that the domain name should be same as the common name in server certificate which is sent by the server to the client. As I know, The SSL client verifies the server's certificate against the CA certificate loaded in the client. Suppose i trust Verisign CA. So my client must

Re: Encryption/Decryption

2008-06-20 Thread AlokBhatnagar
Thanks Urjit. Regards Alok Bhatnagar MicroWorld Technologies Inc, - Original Message - From: Urjit Gokhale To: openssl-users@openssl.org Sent: Friday, June 20, 2008 5:23 PM Subject: Re: Encryption/Decryption These functions do perform the encryption / decryption along w

RE: Server Authentication

2008-06-20 Thread David Schwartz
> So i want to know how will my client authenticate the server > since i don't have the server's root certificate? > Thanks in Advance.. > Regards > Alok Bhatnagar That is completely application-dependent. The answer will depend on what makes the legitimate server different from an imposter. Y

Re: Encryption/Decryption

2008-06-20 Thread Urjit Gokhale
These functions do perform the encryption / decryption along with some other functionality. So you don't have to encrypt the message before you pass the buffer to SSL_write, or decrypt the data in the buffer you use with SSL_read. - Original Message - From: AlokBhatnagar To: openssl

Encryption/Decryption

2008-06-20 Thread AlokBhatnagar
Hi, Do SSL_Write() and SSL_Read() functions perform the encryption and decryption respectively or we need to do it before calling these functions? Regards Alok Bhatnagar Subscribe to MicroWorld's free security newsl

Problems linking

2008-06-20 Thread Hamilton Temple
Hello all, I am trying to statically compile omniORB-4.1.2 over MinGW (mingw32-gcc-3.4.5, mingw32-make-3.81). I compiled flawlessly openssl-0.9.8h using the above mentioned configuration. When the linking process on the ORB source code reaches SSL code I obtain the following errors: g++.exe: adva

Re: Server Authentication

2008-06-20 Thread Kyle Hamilton
Your client needs to have a certificate issued by a CA that the server trusts, and the server must request client authentication by name-of-CA-that-it-will-accept. The client can then provide its certificate (it knows which one based on the requested issuer name) and prove ownership of the private

Server Authentication

2008-06-20 Thread AlokBhatnagar
Hi, I have created my test client and server application. For that i also created a Root CA Certificate and using that certificate i created client and server certificates. Using those certificates the handshaking has been done between the client and server and they are communicating properly.

RE: Cannot install via Cygwin

2008-06-20 Thread Dave Thompson
> From: [EMAIL PROTECTED] On Behalf Of Eric > Chamberlain > Sent: Wednesday, 18 June, 2008 15:26 > > I am trying to build and install openssl via Cygwin. I followed the > instructions and I only hit a bump when I attempt > > make install > > During which I get a boatload of errors. T