Re: About RC4 decryption.

2011-11-02 Thread nilesh
Hi, On Thursday 03 November 2011 04:12 AM, Dave Thompson wrote: [..] For SSL/TLS protocol, set by client as encryption key, set by server as decryption key key_block[49..64] - server Write key set by server as encryption key, set by client as decryption key 32..47 and 48..63 (off by 1) IF fo

RE: Help in Generating Chained ROOT Certificate

2011-11-02 Thread Mr.Rout
Thanks Dave. Probably i have not understood the things properly. After surfing through Google i got confused. Actually I am doing TLS Client Testing which authenticate the Server(www.https.com in my example). Steps I followed to achieve this: 1) Created a Self signed Certificate where Issuer &

RE: Problems with AES-CFB1

2011-11-02 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Michael S. Zick > Sent: Tuesday, 01 November, 2011 09:15 > On Mon October 31 2011, Dave Thompson wrote: > > compiled without error, and gave the symptom reported -- > > because CRYPTO_cfb128_1_encrypt treats the length as bits > > > > My cop

RE: Help in Generating Chained ROOT Certificate

2011-11-02 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Mr.Rout > Sent: Monday, 31 October, 2011 13:43 > I am newbie to Openssl. I am confused about Chained ROOT > certificates? > Could someone please guide me the step by step approach for generating > Chained ROOT certificate? > > e.g. My Server

RE: About RC4 decryption.

2011-11-02 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of re.est > Sent: Tuesday, 01 November, 2011 10:22 > > I am a newbie in the cryptography area and learning by writing some > > test code. > > I have setup the apache server and capturing packets using > wireshark. > > I have a query specific to R

RE: Using OpenSSL 0.9.8 issue between version k and r with Application

2011-11-02 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of evansda > Sent: Tuesday, 01 November, 2011 11:43 > My customer(Government) wants to block use of SSLv2 with the > INN server due > to security vulnerabilities. I recompiled the INNews source Good for them (and you), although several years la

Re: Invalid slot number: 0

2011-11-02 Thread Jakob Bohm
On 11/2/2011 8:41 PM, SiSt wrote: Where is the error message invalid slot number coming from? From the carddriver? Anything to do with Multipart/Singlepart sign. It used to work with previous driver. openssl> req -config /etc/ssl/openssl.cnf -x509 -engine pkcs11 -new -key id_1 -keyform engine -o

Invalid slot number: 0

2011-11-02 Thread SiSt
Where is the error message invalid slot number coming from? From the carddriver? Anything to do with Multipart/Singlepart sign. It used to work with previous driver. openssl> req -config /etc/ssl/openssl.cnf -x509 -engine pkcs11 -new -key id_1 -keyform engine -out req.pem -text -subj "/CN=Name Nam

RE: FW: FIPS validation and TLS 1.2

2011-11-02 Thread Bin Lu
Then is it correct to consider the code for FIPS 2.0 validation(in terms of the cryptographic algorithms, not including the FIPS specific stuff, such as CAVP/CMVP testing etc) is a subset of the FIPS capable OpenSSL? The issue for us is that we need to use additional features in the FIPS capabl

RE: Using certificate and private key from Windows cert store with OpenSSL

2011-11-02 Thread Andrejs Å trumfs
Hi! I searched a bit around and came up with this. I used v1.0.0.5 OpenSSL Dlls, but if you compile 0.9 with engine enabled, it should work. function UsePKeyFromCapi(const ASSLCtx: PSSL_CTX; const ACert: PCCERT_CONTEXT): Boolean; var CapiEngine: PENGINE; EngStatus: Integer; ProvLen, ContN

RE: SSL_get_shutdown() returns 3

2011-11-02 Thread dave.mclellan
Hi Jeff.DOH! I was staring right into the face of two bits on, and didn't even see it. thanks. -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Jeffrey Walton Sent: Tuesday, November 01, 2011 8:02 AM To: openssl-users

Re: openssl-1.0.1-stable-SNAP-20110927

2011-11-02 Thread Jeffrey Walton
On Mon, Oct 31, 2011 at 3:01 PM, Guilherme G. Rafare wrote: > Hi, how can I unsubscribe to the list and stop receiving emails? http://www.openssl.org/support/community.html Check your SPAM folder for the confirmation emails. I recently noticed Google swallowed nine separate unsubscribe conformati

Re: recommendations for encrypting a document on a distributed CD?

2011-11-02 Thread Jonas Schnelli
> PGP? Hi I would look at the openPGP specs. http://en.m.wikipedia.org/wiki/OpenPGP#OpenPGP I think you can solve your projects requirements with GnuPG. If you like to "weld" it better with you software project, you might look at Gpgme (http://www.gnupg.org/related_software/gpgme/). It's basi

About openssl versions mismatch - aes256 decryption.

2011-11-02 Thread nilesh
Hi, I am testing a dummy code for AES256_SHA decryption. Please see the attached server private key and the C code. The same code works for "OpenSSL 0.9.8r" and "OpenSSL 0.9.8k". But it produces junk after decryption on machine with OpenSSL version "OpenSSL 1.0.0b". Could someone please comm

Re: recommendations for encrypting a document on a distributed CD?

2011-11-02 Thread Jakob Bohm
This is a classic FAQ (it is in the very old crypto FAQ), but I will give a more detailed explanation of the standard answer. This is impossible! Once you give any user a password to the file, then he can secretly share it with other people with the same CD (because nothing on the CD can be diff

RE: How to build a FIPS-capable OpenSSL on Ubuntu Linux from the latest snapshots?

2011-11-02 Thread Jack D. Pond
Bill, This may help - I just did the same using latest Ubuntu Release Jack D. Pond "It's not hard to meet expenses, they're everywhere." -- sudo apt-get build-essential # if you haven't already wget http://www.openssl.org/source/openssl-fips-1.2.3.tar.gz.sha1 wget http://www.openssl

Re: recommendations for encrypting a document on a distributed CD?

2011-11-02 Thread Michael S. Zick
On Wed November 2 2011, Joe Flowers wrote: > PGP? > Password protected PDF? Mike > > > On Wed, Nov 2, 2011 at 8:27 AM, Joe Flowers wrote: > > > Hello Everyone, > > > > I would like recommendations and suggestions for encrypting a document on > > a distributed CD. I would like someone to be ab

Re: recommendations for encrypting a document on a distributed CD?

2011-11-02 Thread Joe Flowers
PGP? On Wed, Nov 2, 2011 at 8:27 AM, Joe Flowers wrote: > Hello Everyone, > > I would like recommendations and suggestions for encrypting a document on > a distributed CD. I would like someone to be able to open and read the > document only if they have a "password" or secret string or other(?)

recommendations for encrypting a document on a distributed CD?

2011-11-02 Thread Joe Flowers
Hello Everyone, I would like recommendations and suggestions for encrypting a document on a distributed CD. I would like someone to be able to open and read the document only if they have a "password" or secret string or other(?). I understand there is a limit to how secure this really is, but I w

Re: FW: FIPS validation and TLS 1.2

2011-11-02 Thread Dr. Stephen Henson
On Tue, Nov 01, 2011, William A. Rowe Jr. wrote: > On 11/1/2011 8:35 PM, Bin Lu wrote: > > > > Do you have an answer for my question below? Is the fips-2.0-test code > > branched off from a > > FIPS-capable version? Which version is it based on if yes? > > AIUI, fipscanister doesn't include TLS

Re: Problems with AES-CFB1

2011-11-02 Thread Ananthasayanan Kandiah
Yep, that solved it! That makes sense. Thankyou so much! On Wed, Nov 2, 2011 at 12:08 AM, re.est wrote: > Hello, > > I added *8 in length for both encrypt/decrypt call to make it bit length. > AES_cfb1_encrypt(data, ciphertext, length*8, &key, iv, &num, > AES_ENCRYPT); > > As you can see,

New SSL scanner based on OpenSSL+ Python + ctypes

2011-11-02 Thread Nabla C0d3
Hi there, We just released an SSL scanner we've been working on for a while. It's written in Python and based on OpenSSL. Long story short, in order to scan for "newer" issues (like insecure renegotiation), I needed access to OpenSSL APIs that aren't exposed by M2Crypto or PyOpenSSL and direct ac