Re: Cross-compilation problem FIPS enabled openssl

2013-03-18 Thread T J
I suspect you need a export FIPS_SIG=/util/incore which embeds the signature in libcrypto. On 18/03/13 17:16, Abhijit Ray Chaudhury wrote: Hello, I am trying to cross compile FIPS compliant openssl module (openssl-fips-ecp-2.0.2.tar.gz) for linux armv4 pratform : I have used following script t

RE: libcrypto.a linking problem?

2013-03-18 Thread Floodeenjr, Thomas
Hello, Are you linking with libdl.so? (-ldl) -Tom Thomas Floodeen, Jr. Mentor Graphics BSD 720.494.1133 -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of zero modulo Sent: Sunday, March 17, 2013 10:33 PM To: openssl-users@o

Re: Diffie algorithm in openssl: and Java

2013-03-18 Thread Matt Caswell
On 18 March 2013 21:44, Matt Caswell wrote: > However, you are correct that the DH computation does not use q, although > I do not > > know whether JCE requires it to be specified (not having used JCE). > > One other point on this - X9.42 describes an optional validation procedure which does use

Re: Diffie algorithm in openssl: and Java

2013-03-18 Thread Matt Caswell
On 18 March 2013 21:02, Dave Thompson wrote: > >I also just noticed that in your JSON sample there is only one > >prime number provided. There are in fact two required: p and q. > > No. *DSA* uses p,q,g. DH requires p,g which effectively determines > q, but DH computation doesn't use q and standa

SSL_OP_NO_TLSv1_1 doesn't seem to disable TLS 1.1 and above protocols on Openssl 1.0.1e

2013-03-18 Thread Santhosh Kokala
Hi, The application I am working on should not support TLS 1.1 and above protocols. I am using SSL_CTX_set_options( ctx, SSL_OP_NO_TLSv1_1); to disable the same after creating the SSL context. But it doesn't seem to disable the TLS1.1 and TLS1.2 protocols Code Snippet: SSL_CTX *c = SSL_CTX_new

RE: Diffie algorithm in openssl: and Java

2013-03-18 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of Matt Caswell >Sent: Monday, 18 March, 2013 09:17 >On 18 March 2013 12:15, azhar jodatti wrote: >2) Is this sample from the *same* key exchange? The parameters are >different which are obviously going to cause it to fail. >When I run both progr

RE: Diffie algorithm in openssl: and Java

2013-03-18 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of azhar jodatti >Sent: Saturday, 16 March, 2013 14:00 >I am working on application which has android and iPhone client. >Both the client talk to my server which is written in JAVA. I am >using JCE implementation of DH algorithm and X509Encodedkey

Re: openssl-user - UTF8 characters in configuration file

2013-03-18 Thread rasmussj
Viktor and others, thanks for the tips. I found that by using OpenSSL 1.0.1e I've been able to create the UTF8 format fields, such as: 71:d=5 hl=2 l= 3 prim: OBJECT:commonName 76:d=5 hl=2 l= 6 prim: UTF8STRING:Róót However, creating the subjectAltName is not follo

Re: Diffie algorithm in openssl: and Java

2013-03-18 Thread Matt Caswell
On 18 March 2013 15:05, azhar jodatti wrote: > > I also just noticed that in your JSON sample there is only one prime > number provided. There are in fact two required: p and q. > well, I think other prime number is g and not q. other prime number is > base generator i.e g in above JSON sample. >

Fwd: Diffie algorithm in openssl: and Java

2013-03-18 Thread azhar jodatti
On 18 March 2013 12:15, azhar jodatti wrote: > 2) Is this sample from the *same* key exchange? The parameters are > different which are obviously going to cause it to fail. > When I run both programs it calculates the params (p,g,pk) every time on > execution . that's the reason both key values a

Re: [openssl-users] Validation error on generated csr

2013-03-18 Thread Tim Tassonis
Hi Stephen Thanks a lot, that did the trick, the verify now returns ok. Kind regards Tim On 03/18/2013 02:26 PM, Dr. Stephen Henson wrote: On Mon, Mar 18, 2013, Tim Tassonis wrote: Hi Erwann What you have to do it hash your data, prepare an X509_SIG object, set its "algor" to SHA1 (with

Re: [openssl-users] Validation error on generated csr

2013-03-18 Thread Dr. Stephen Henson
On Mon, Mar 18, 2013, Tim Tassonis wrote: > Hi Erwann > > > What you have to do it hash your data, prepare an X509_SIG object, set > > its "algor" to SHA1 (with NULL parameters), and fill the "digest" part > > with your hash result. Then transform it into DER, and sign it with > > CKM_RSA_PKCS me

Re: possible Bug in OpenSSL - rfc 3161 - TSA service

2013-03-18 Thread Dragan Spasic
Hello kapetr, I have successfully time-stamped with TSA server "https://www.postsignum.cz/DEMOTSA/TSS_user/"; (u: demoTSA, p: demoTSA2010), using 2 Time-stamp clients: 1. Adobe Reader 10.1.3 2. Serbian Post Time-stamp client: http://www.ca.posta.rs/download/Time-Stamp%20klijent%20aplikacija%20Post

libcrypto.a linking problem?

2013-03-18 Thread zero modulo
I'm unable to build Git 1.8.1.3 with libcrypto. I've compiled and built OpenSSL with the same LDFLAGS and CPPFLAGS as below. I also have a `/etc/ld.so.conf.d/sandbox.conf` file which loads `/sandbox/builds/lib` as a library path for LD_LIBRARY_PATH. $ uname -a Linux kosuna 3.5.0-17-generic #28-Ubu

Re: Diffie algorithm in openssl: and Java

2013-03-18 Thread Matt Caswell
On 18 March 2013 12:15, azhar jodatti wrote: > 2) Is this sample from the *same* key exchange? The parameters are > different which are obviously going to cause it to fail. > When I run both programs it calculates the params (p,g,pk) every time on > execution . that's the reason both key values a

Re: [openssl-users] Validation error on generated csr

2013-03-18 Thread Tim Tassonis
Hi Erwann > What you have to do it hash your data, prepare an X509_SIG object, set > its "algor" to SHA1 (with NULL parameters), and fill the "digest" part > with your hash result. Then transform it into DER, and sign it with > CKM_RSA_PKCS mechanism. Thanks a lot for the explanation. However,

Re: Diffie algorithm in openssl: and Java

2013-03-18 Thread azhar jodatti
​1) The C version is in hex while the java version is in decimal. Is this intentional? When you are reading in the values are reading them correctly (i.e. as hex or as decimal as required) Yes. it was intentional. I am taking care of this. 2) Is this sample from the *same* key exchange? The paramet