Re: [openssl-users] Question about stateOrProvince

2016-08-30 Thread Wim Lewis
On Aug 30, 2016, at 6:28 PM, Tim Boring wrote: > When creating a CSR, openssl displays the following > > > State or Province Name (full name) [Some-State]: > ... > And a couple lines up from that is a comment pointing to RFC 3280, which > defines the following: The original definition is from

Re: [openssl-users] Question about stateOrProvince

2016-08-30 Thread Salz, Rich
Perhaps one way to read it as state or full name if a province. Or just remove the "full name" part of the text, I suppose. -- Senior Architect, Akamai Technologies IM: richs...@jabber.at Twitter: RichSalz -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinf

[openssl-users] Question about stateOrProvince

2016-08-30 Thread Tim Boring
When creating a CSR, openssl displays the following State or Province Name (full name) [Some-State]: But, I can't find anywhere in the OpenSSL codebase that validates that the input is indeed a "full name"--e.g., that the input is "New York" instead of "NY". I've done this search in Github: ht

Re: [openssl-users] Setting an OCSP stapling response on a DTLS server result in crash

2016-08-30 Thread Matt Caswell
On 30/08/16 15:26, Matt Caswell wrote: > > > On 29/08/16 17:37, Julien Vermillard wrote: >> I patched s_server to send a fake OCSP content (4 bytes). >> I suppose the server will just push that to the client and the client >> should fail complaining it's not a correct OCSP response. >> But the

[openssl-users] Obtaining PKCS7 data length

2016-08-30 Thread David
Hi, I have some PKCS7 data which I can read like this with OpenSSL: $ openssl asn1parse -i -inform der -in data.dat 0:d=0 hl=4 l=16208 cons: SEQUENCE 4:d=1 hl=2 l=9 prim: OBJECT:pkcs7-signedData .. more .. I can load it in code like so: // buf contains the raw data, len the l

Re: [openssl-users] Setting an OCSP stapling response on a DTLS server result in crash

2016-08-30 Thread Julien Vermillard
Awesome thanks :) I'll try it. Yes I have the feeling I'm the first user of stapling with DTLS -- Julien Vermillard On Tue, Aug 30, 2016 at 4:26 PM, Matt Caswell wrote: > > > On 29/08/16 17:37, Julien Vermillard wrote: > > I patched s_server to send a fake OCSP content (4 bytes). > > I suppose

Re: [openssl-users] Setting an OCSP stapling response on a DTLS server result in crash

2016-08-30 Thread Matt Caswell
On 29/08/16 17:37, Julien Vermillard wrote: > I patched s_server to send a fake OCSP content (4 bytes). > I suppose the server will just push that to the client and the client > should fail complaining it's not a correct OCSP response. > But the server crash with: > ssl/statem/statem_dtls.c:127:

Re: [openssl-users] How to make EVP functions returns false

2016-08-30 Thread Matt Caswell
On 30/08/16 10:39, Jakob Bohm wrote: > Also note that on your list of functions, the functions whose > names do not contain "EVP" are not EVP calls, but traditional > OpenSSL/SSLeay crypto calls that are probably discontinued in > OpenSSL 1.1.0. No, all of those non-EVP calls are still available

Re: [openssl-users] How to make EVP functions returns false

2016-08-30 Thread Jakob Bohm
On 27/08/2016 20:32, Sugumar wrote: Can any one help me on this? Thanks. Some of the calls you mention can be made to fail if you can tell valgrind to simulate an out-of-memory (malloc fail) during the call. Some of the others fail only for invalid parameters or only under extremely rare condit