Re: Avoiding a read that wants writeability (and vice versa) ...

2014-09-12 Thread Viktor Dukhovni
On Fri, Sep 12, 2014 at 11:42:51AM -0400, John Lane Schultz wrote: > In my full-duplex, non-blocking application, I'd like to avoid renegotiation > because my application doesn't need it and the complexity it seems to add. > > I was wondering, if neither side ever explicitly causes renegotiation

Re: Linking error on Soalris x86 and sparc using fips capable openssl 1.0.1h

2014-09-12 Thread Gaiseric Vandal
I hate compiling stuff on Solaris 10. The gcc version in /usr/sfw/bin is so old. And it uses the Solaris linker in /usr/ccs/bin if if you use /usr/sfw/bin/gmake instead of /usr/ccs/bin/make. Sometimes I can work around issues by renaming /usr/ccs/bin/ld and creating a symlink ld-> /usr

Avoiding a read that wants writeability (and vice versa) ...

2014-09-12 Thread John Lane Schultz
In my full-duplex, non-blocking application, I’d like to avoid renegotiation because my application doesn’t need it and the complexity it seems to add. I was wondering, if neither side ever explicitly causes renegotiation to occur (e.g. - SSL_renegotiate), is it still possible with existing vers

Re: cannot read PEM key file - no start line

2014-09-12 Thread Viktor Dukhovni
On Fri, Sep 12, 2014 at 04:31:13AM -0400, Dave Thompson wrote: > *If* you are now using a legacy-format encrypted private-key (and your > original > > error message suggested you might need some form of private key, which does > > necessarily mean legacy-format encrypted) yes 76 chars is a pr

RE: pkcs7_sign() / cms_sign() : using SHA256 hash

2014-09-12 Thread Salz, Rich
You are right, that the toplevel API doesn't have take a digest parameter. The only kind of signature you get is the "default" where default is defined per-key-type. We should probably have PKCS7_sign_ex() that took a "const EVP_MD*" parameter. It'd be trivial to do this. Same for CMS_sign.

pkcs7_sign() / cms_sign() : using SHA256 hash

2014-09-12 Thread Francis GASCHET
Hello, From the man page, it looks like signing packages always use SHA1, and there is no argument to pkcs7_sign and cms_sign functions which would allow to chose the algorithm. May be I missed something... Or is there some method to sign with another hsah algorithm ? Thanks in advance. Best

Linking error on Soalris x86 and sparc using fips capable openssl 1.0.1h

2014-09-12 Thread Mrunal Nerpawar
Hi All, While fips build on soalris, I am getting variour errors: Sun-Intel: FIPSLD_CC=gcc FIPSLD_LINK=g++ /unixhome/upg/Unix/SunOS/i386/OpenSource/ssl-1.0.1h/bin/fipsld -fPIC -shared -g -O2 -o libImpl.so.10.0.0 -lcrypto Text relocation remains referenced against sy

RE: cannot read PEM key file - no start line

2014-09-12 Thread Dave Thompson
*If* you are now using a legacy-format encrypted private-key (and your original error message suggested you might need some form of private key, which does necessarily mean legacy-format encrypted) yes 76 chars is a problem. The example(s) I saw earlier were certificates, where 76 chars works

RE: issuer_hash

2014-09-12 Thread Dave Thompson
-fingerprint is the hash of the whole cert. The question was hash of issuer name. If you’re satisfied with hash of the issuer name >as encoded<, which should not but can differ from the canonicalized form OpenSSL uses for lookup, you can: - use asn1parse to find the byte position of the issu