Re: [openssl-users] Engine NID_sha512

2018-11-19 Thread Christian Johansson
Wow - nothing like starting the day with a facepalm :-/ Huge thanks Dave!! Från: openssl-users på uppdrag av Dave Coombs Skickat: måndag, november 19, 2018 3:09 em Till: openssl-users@openssl.org Ämne: Re: [openssl-users] Engine NID_sha512 Hi, > if (!digest)

[openssl-users] openssl 1.1.1 opaque structures

2018-11-19 Thread priya p
Hi, In openssl-1.1.1, few structures have been made opaque like HMAC_CTX, EVP_CIPHER_CTX etc., There are new API to get and set those structure members. But to zeroize those structure members in place, I dont see any API. Eg : DH strcuture has members like pub_key, priv_key. To zeroize the priv_ke

Re: [openssl-users] Problem with x509_verify_certificate

2018-11-19 Thread Ken
Are you saying to test with "openssl s_client -connect ..."? I don't think I know how to interpret all of the output from that, but it looked to me like it was saying everything was okay when I tried it earlier (with no changes). I just tried it again with -CApath pointing to an empty directo

Re: [openssl-users] OpenSSL - Session Resumption on an On-going Connection

2018-11-19 Thread Viktor Dukhovni
On Mon, Nov 19, 2018 at 04:01:35PM +, Filipe Fernandes wrote: > I'm developing a specific SSL Server, in which it's supposed to have an > always-on socket connection. So, to be on the safe side, there's specific > needs that need to be filled on this implementation. One of the needs is > that

Re: [openssl-users] OpenSSL - Session Resumption on an On-going Connection

2018-11-19 Thread Salz, Rich via openssl-users
>My question: How can I make LibOpenSSL-1.0.2g to send a ServerHello to the >Client on demand? The socket should not close, nor perform a renegotiation. You have to shutdown and restart the TLS layer. You cannot send arbitrary ServerHello messages, it’s a protocol violation. -- openssl-users

[openssl-users] OpenSSL - Session Resumption on an On-going Connection

2018-11-19 Thread Filipe Fernandes
I'm developing a specific SSL Server, in which it's supposed to have an always-on socket connection. So, to be on the safe side, there's specific needs that need to be filled on this implementation. One of the needs is that the server must send a resumption request (ServerHello) to the client on a

Re: [openssl-users] Engine NID_sha512

2018-11-19 Thread Dave Coombs
Hi, > if (!digest) > { > static int > supported_nids[] = {NID_sha256, NID_sha384, NID_sha512, 0}; > *nids = > supported_ni

[openssl-users] Engine NID_sha512

2018-11-19 Thread Christian Johansson
Hello I’m trying to write an engine that implements message digest functions – specifically: sha256, sha384 and sha512. The first two work as expected, I can intercept calls to update() and final() but for sha512 it doesn’t work. From the below program output you can see that my digest_meths me