[openssl-users] SSE Version Of BIGNUM

2015-05-12 Thread Tom Marchand
Does anybody know of a version of BIGNUM that is SSE enabled allowing simultaneous operations on multiple BIGNUMs? ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] RES: RES: Testing OpenSSL based solution

2015-05-12 Thread Marcus Vinicius do Nascimento
I did some quick research and found this: http://en.wikipedia.org/wiki/Digital_Signature_Algorithm If my understanding is correct, the public key is (p, q, g, y). The private key would be x, such that y = g^x mod p. Is there some way to generate both public and private keys using OpenSSL, bas

Re: [openssl-users] [openssl-dev] Replacing RFC2712 (was Re: Kerberos)

2015-05-12 Thread Nico Williams
I should add that I prefer a protocol that optimizes the GSS round trips over one that doesn't, though that means using SPNEGO for negotiation (when negotiation is desired). ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/li

[openssl-users] RES: Testing OpenSSL based solution

2015-05-12 Thread Marcus Vinicius do Nascimento
Thanks for both answers. I tried using Y as the public key, but ssl seems not to accept that. Here is the error scenario: >From the FIP file: [mod = 1024] P = fda5442483ccf7a12399d6c13d56ff882d689524f1885fcb7424e26da2d200a1657b631dcc74 c73ecbd89fe42cc554b7062835c73d7203161e09742392

Re: [openssl-users] Testing OpenSSL based solution

2015-05-12 Thread Nico Williams
On Tue, May 12, 2015 at 06:10:39PM +, Salz, Rich wrote: > You can't easily have test vectors for DSA signatures since they > include a random. Any test vector would have to include the random, > and any API would have to be able to accept the random as part of the > "sign" API. Verification s

Re: [openssl-users] [openssl-dev] Replacing RFC2712 (was Re: Kerberos)

2015-05-12 Thread Nico Williams
On Tue, May 12, 2015 at 08:23:34PM +0200, Jakob Bohm wrote: > How about the following simplifications for the new > extension, lets call it "GSS-2" (at least in this e-mail). > > 1. GSS (including SASL/GS2) is always done via the SPNego > GSS mechanism, which provides standard handling of > mecha

[openssl-users] FIPS mode and AES_set_encrypt_key/AES_set_decrypt_key

2015-05-12 Thread David Weidenkopf
Can anyone shed light on why these APIs are disabled in FIPS mode? They involve operations that must be implemented within the boundary of the FIPS crypto module? It seems like disabling them is intended to prevent mistakes from developers trying to write their own AES mode implementations? Thank

Re: [openssl-users] Testing OpenSSL based solution

2015-05-12 Thread Salz, Rich
> What Mr. Salz refers to by "Verification should be okay" is probably this: Yes and Mr. Salz greatly appreciates Mr. Bohm's elaboration. :) Lest the humor be misunderstood: yes, you're right, thanks for explaining. ___ openssl-users mailing list To u

Re: [openssl-users] Testing OpenSSL based solution

2015-05-12 Thread Jakob Bohm
On 12/05/2015 20:10, Salz, Rich wrote: You can't easily have test vectors for DSA signatures since they include a random. Any test vector would have to include the random, and any API would have to be able to accept the random as part of the "sign" API. Verification should be okay. What M

Re: [openssl-users] [openssl-dev] Replacing RFC2712 (was Re: Kerberos)

2015-05-12 Thread Jakob Bohm
On 11/05/2015 20:52, Nico Williams wrote: On Mon, May 11, 2015 at 04:42:49PM +, Viktor Dukhovni wrote: On Mon, May 11, 2015 at 11:25:33AM -0500, Nico Williams wrote: - If you don't want to depend on server certs, use anon-(EC)DH ciphersuites. Clients and servers must reject[*] T

Re: [openssl-users] Testing OpenSSL based solution

2015-05-12 Thread Salz, Rich
You can't easily have test vectors for DSA signatures since they include a random. Any test vector would have to include the random, and any API would have to be able to accept the random as part of the "sign" API. Verification should be okay. ___ o

[openssl-users] Testing OpenSSL based solution

2015-05-12 Thread Marcus Vinicius do Nascimento
I'm working on a C++ security library solution that uses openssl internally. It offers Sign/Verify, Digest and Encrypt/Decrypt as its features (please check available methods below). I'm using FIPS 2.0 test vectors to validate my library, but I'm having a bit of trouble with that. Testing

Re: [openssl-users] How do I uninitialize OpenSSL properly?

2015-05-12 Thread Jakob Bohm
(Top posting to keep thread consistent). It is also worth noting that if OpenSSL is used in a plugin, which is unloaded (along with OpenSSL) and later reloaded long before the container process is unloaded, then "things that are only allocated once per OpenSSL library lifetime" become very real m

Re: [openssl-users] x509_config nameConstraints

2015-05-12 Thread Ben Humpert
I love that when it happens :) 2015-05-12 16:56 GMT+02:00 Ben Humpert : > Ok, after plenty of testing and some googling: the name constraints > extension is ... improvable. I ran plenty of tests but it looks like > that the extension is not very well implemented in todays browsers. > > I have atta

Re: [openssl-users] x509_config nameConstraints

2015-05-12 Thread Ben Humpert
Ok, after plenty of testing and some googling: the name constraints extension is ... improvable. I ran plenty of tests but it looks like that the extension is not very well implemented in todays browsers. I have attached three txt files (DOS format) with the settings and results of each test run.

Re: [openssl-users] Stand alone AES-CTR module

2015-05-12 Thread Sec_Aficionado
Mike, I agree that only security experts should implement production ciphers. But as Lewis pointed out, the OP's stated intention is to create a demo from scratch. This is what I think is worth doing and only for private distribution. Publishing that demo or distributing it widely would be unwi