[openssl-users] DTLS cipher suite support

2015-09-02 Thread Bryce Kahle
I would like to use openssl as a basic DTLS server from the command line using: openssl s_server -dtls1_2 The catch is I want to require the TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 cipher suite. It appears OpenSSL currently doesn’t support this cipher suite, even though it supports the both ECDHE_ECDSA

[openssl-users] using a random number file for generation of keys/certificates

2015-09-02 Thread Kevin Long
Hello, I’m using openssl to administer a root/intermediate CA and I use the certificates for a number of web servers and other applications. All of my users install my root CA certificate for trust. I’ve been asked to use a hardware random number generator to create the keys/certificates go

[openssl-users] Cleanup and changing the malloc routines

2015-09-02 Thread Salz, Rich
We are considering a big cleanup to the memory-allocation API's in the next release. Please take a look at the attached documentation, which describes *ALL* of the public functions, and let us know if it will cause a problem. Thanks. -- Senior Architect, Akamai Technologies IM: richs...@jabber.

Re: [openssl-users] Forcing the FIPS module to fail (no way)

2015-09-02 Thread Steve Marquess
On 09/02/2015 02:35 PM, Alberto Roman Linacero wrote: > Yep, I understand now. I thought that the whole binary file > application was signed, and not only the FIPS module part. An understandable assumption, see below. > I already did some tests (with that string and also in different parts > of t

Re: [openssl-users] Forcing the FIPS module to fail (no way)

2015-09-02 Thread Alberto Roman Linacero
Yep, I understand now. I thought that the whole binary file application was signed, and not only the FIPS module part. I already did some tests (with that string and also in different parts of the code that belongs to the fipscanister.o), and it -correctly- fails. server:~# export OPENSSL_FIPS=1

Re: [openssl-users] Forcing the FIPS module to fail (no way)

2015-09-02 Thread Dr. Stephen Henson
On Tue, Sep 01, 2015, Alberto Roman Linacero wrote: > So, it is possible in runtime to know if the FIPS module code has been > changed after compiling? I mean, after the openssl has been compiled > with the FIPS Object Module (./config fips & make & make install), the > 4 files in the FIPS Object

Re: [openssl-users] [EXTERNAL] Re: SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Dr. Stephen Henson
On Wed, Sep 02, 2015, Sands, Daniel wrote: > > Well at first sight that looks like an IMPLICIT tag which replaces > > the normal > > tag with the context specific value. It is not possible to determine > > the > > underlying type from the encoding itself as it has been replaced. So > > you need >

Re: [openssl-users] [EXTERNAL] Re: SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Sands, Daniel
> Well at first sight that looks like an IMPLICIT tag which replaces > the normal > tag with the context specific value. It is not possible to determine > the > underlying type from the encoding itself as it has been replaced. So > you need > the ASN.1 spec to see the appropriate type to use. > >

Re: [openssl-users] SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Dr. Stephen Henson
On Wed, Sep 02, 2015, Massimiliano Pala wrote: > Hi all, > > since someone asked, here's my solution (if someone knows of a > better one, please let me know). > > The problem that I tried to solve is how to parse the > CRYTPLIB-specific envelope for signatures. In particular, the > example repor

[openssl-users] SOLVED --- ASN.1: Parsing a 'context-specific' class (or app/private class)

2015-09-02 Thread Massimiliano Pala
Hi all, since someone asked, here's my solution (if someone knows of a better one, please let me know). The problem that I tried to solve is how to parse the CRYTPLIB-specific envelope for signatures. In particular, the example reported in my original e-mail was a DSA signature. The main iss