ECDH- NID_X9_62_prime256v1 - EVP_RAND_generate()

2024-07-31 Thread Damodhar Boddukuri via openssl-users
Hi, I am implementing ECDH- Group19 (NID_X9_62_prime256v1). I followed the below sequence. 1. ecdh_group = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1); // NID_X9_62_prime256v1 or NID_secp256k1 2. ecdh_keys = EC_KEY_new(); 3. ret = EC_KEY_set_group(ecdh_keys, ecdh_group); 4

ECDH- NID_X9_62_prime256v1 - EVP_RAND_instantiate()

2024-07-31 Thread Damodhar Boddukuri via openssl-users
Hi, I am implementing ECDH- Group19 (NID_X9_62_prime256v1). I followed the below sequence. 1. ecdh_group = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1); // NID_X9_62_prime256v1 or NID_secp256k1 2. ecdh_keys = EC_KEY_new(); 3. ret = EC_KEY_set_group(ecdh_keys, ecdh_group); 4

ECDH Algoritm (Group 19)

2024-07-17 Thread Damodhar Boddukuri via openssl-users
Hi OpenSSL users, We are planning to use ECDH Algorithm(Group 19) in an Embedded System Product for the shared secret key generation. When I go through the code, I understand that it requires engine libraries/files from the following folders: \openssl-3_1_3\crypto\engine\ \openssl-3_1_3

ECDH - Group19 example code

2024-07-12 Thread Damodhar Boddukuri via openssl-users
Hi, I am looking for a example code for ECDH - Group19, There are many API's in the lib. If you could help me with a simple code with: 1. Initializing the context if any? 2. Selecting ECDH Group 19 3. Private/Public Key Generation 4. Shared secret Key Generation Or any other

Re: ECDH Group 19 (256-bit Elliptic curve) key length

2024-07-08 Thread Tomas Mraz
, OpenSSL On Mon, 2024-07-08 at 12:47 +, Vishal Kevat via openssl-users wrote: > > > > Hi OpenSSL, >   > I am using group 19 which is ECDH elliptic curve group > (NID_X9_62_prime256v1)and is giving 32 bytes/256 bit of shared secret > key. >   > I want to u

ECDH Group 19 (256-bit Elliptic curve) key length

2024-07-08 Thread Vishal Kevat via openssl-users
Hi OpenSSL, I am using group 19 which is ECDH elliptic curve group (NID_X9_62_prime256v1) and is giving 32 bytes/256 bit of shared secret key. I want to use it to work with AES-128 CBC encryption algorithm. As the key length generated by ECDH is 32 bytes, is there any way to generate the key

Re: Regarding TLS call failure on Openssl3.0 with cipher : ECDH-ECDSA-AES256-SHA384

2022-11-18 Thread Matt Caswell
On 18/11/2022 05:53, Viktor Dukhovni wrote: On Fri, Nov 18, 2022 at 05:12:09AM +, Raman, Ina wrote: I was trying to test TLS call with cipher suite : tls_ecdh_ecdsa_with_aes_256_cbc_sha384 but it fails. You probably actually wanted "ecdhe" not "ecdh", but see belo

Re: Regarding TLS call failure on Openssl3.0 with cipher : ECDH-ECDSA-AES256-SHA384

2022-11-17 Thread Viktor Dukhovni
On Fri, Nov 18, 2022 at 05:12:09AM +, Raman, Ina wrote: > I was trying to test TLS call with cipher suite : > tls_ecdh_ecdsa_with_aes_256_cbc_sha384 but it fails. You probably actually wanted "ecdhe" not "ecdh", but see below. > It fails on SSL_set_cipher_list A

Regarding TLS call failure on Openssl3.0 with cipher : ECDH-ECDSA-AES256-SHA384

2022-11-17 Thread Raman, Ina
Hi , I was trying to test TLS call with cipher suite : tls_ecdh_ecdsa_with_aes_256_cbc_sha384 but it fails . It fails on SSL_set_cipher_list API . The list contains the mentioned cipher but still it is failing to set that . On SIPp UAC side it shows errno = 107 (Transport endpoint is not conne

Re: OpenSSL 3.0.0 FIPS compatible ECDH-KAS

2021-10-07 Thread Dr Paul Dale
thing is documented and I'd recommend starting with the migration guide manual page and working from there. In my opinion, the 1.0 -> 1.1 transition is the more onerous part. Pauli On 23/9/21 3:44 am, Kory Hamzeh wrote: I have an OpenSSL app which performs ECDH-KAS using openssl-1.0.1g +

Re: OpenSSL 3.0.0 FIPS compatible ECDH-KAS

2021-09-22 Thread Dr Paul Dale
erties via config too. Everything is documented and I'd recommend starting with the migration guide manual page and working from there. In my opinion, the 1.0 -> 1.1 transition is the more onerous part. Pauli On 23/9/21 3:44 am, Kory Hamzeh wrote: I have an OpenSSL app which perfo

OpenSSL 3.0.0 FIPS compatible ECDH-KAS

2021-09-22 Thread Kory Hamzeh
I have an OpenSSL app which performs ECDH-KAS using openssl-1.0.1g + openssl-fips-2.0.5. It needs to be FIPS compatible. The app was written using the low level ECDH functions similar to what is documented here: https://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman

Re: Support for ECDH One-pass in "openssl cms enc"

2021-05-24 Thread Henning Krause via openssl-users
on behalf of Henning Krause via openssl-users Sent: Sunday, May 23, 2021 2:45 PM To: openssl-users@openssl.org Subject: Support for ECDH One-pass in "openssl cms enc" Hi, I'm trying to encrypt an email using the ECDH One-Pass algorithm. I've first created an X509 certific

Support for ECDH One-pass in "openssl cms enc"

2021-05-23 Thread Henning Krause via openssl-users
Hi, I'm trying to encrypt an email using the ECDH One-Pass algorithm. I've first created an X509 certificate with an EDSA key based on the curve prime256v1. Then, I ran this command: openssl cms -encrypt -in Unencrypted.eml -binary -recip ecc.cer -aes256 -keyopt ecdh_kdf_md:sha2

Re: openssl speed ecdh

2021-03-29 Thread Tomas Mraz
On Sun, 2021-03-28 at 09:41 +, Jesús Molina Roldán wrote: > I would like to know if there is a way to calculate the time spend in > generate a key pair and in compute the shared secret for the ecdh > algorithm. > > "openssl speed ecdh" only calculate the number of

openssl speed ecdh

2021-03-28 Thread Jesús Molina Roldán
I would like to know if there is a way to calculate the time spend in generate a key pair and in compute the shared secret for the ecdh algorithm. "openssl speed ecdh" only calculate the number of operations in 10s. Jesus Molina

Re: SSL Server setup DH/ECDH

2019-08-07 Thread Matt Caswell
@openssl.org <mailto:m...@openssl.org> > <mailto:m...@openssl.org <mailto:m...@openssl.org>> > >     <mailto:m...@openssl.org <mailto:m...@openssl.org> > <mailto:m...@openssl.org <mailto:m...@openssl.org>>>> > >

Re: SSL Server setup DH/ECDH

2019-08-07 Thread Chitrang Srivastava
gt; > Matt > > > > > > > > > > > > > > On Tue, Aug 6, 2019 at 3:04 PM Matt Caswell < > m...@openssl.org > > <mailto:m...@openssl.org> > > > <mailto:m...@ope

Re: SSL Server setup DH/ECDH

2019-08-06 Thread Matt Caswell
g Srivastava wrote: > >     > Hi, > >     > > >     > I am implementing HTTPs server using openssl 1.1.1b. > >     > Is it mandatory to setup these API's while creating ssl context ? > >     > > >     > SSL_CTX_set_tmp_ecdh > >     > &g

Re: SSL Server setup DH/ECDH

2019-08-06 Thread Chitrang Srivastava
gt; > > > > > I am implementing HTTPs server using openssl 1.1.1b. > > > Is it mandatory to setup these API's while creating ssl context ? > > > > > > SSL_CTX_set_tmp_ecdh > > > > > > SSL_CTX_set_tmp_dh > > > >

Re: SSL Server setup DH/ECDH

2019-08-06 Thread Matt Caswell
t; On 06/08/2019 09:42, Chitrang Srivastava wrote: > > Hi, > > > > I am implementing HTTPs server using openssl 1.1.1b. > > Is it mandatory to setup these API's while creating ssl context ? > > > > SSL_CTX_set_tmp_ecdh > > &

Re: SSL Server setup DH/ECDH

2019-08-06 Thread Chitrang Srivastava
Chitrang Srivastava wrote: > > Hi, > > > > I am implementing HTTPs server using openssl 1.1.1b. > > Is it mandatory to setup these API's while creating ssl context ? > > > > SSL_CTX_set_tmp_ecdh > > > > SSL_CTX_set_tmp_dh > > By default OpenSSL will

Re: SSL Server setup DH/ECDH

2019-08-06 Thread Matt Caswell
On 06/08/2019 09:42, Chitrang Srivastava wrote: > Hi, > > I am implementing HTTPs server using openssl 1.1.1b. > Is it mandatory to setup these API's while creating ssl context ? > > SSL_CTX_set_tmp_ecdh > > SSL_CTX_set_tmp_dh By default OpenSSL will automati

SSL Server setup DH/ECDH

2019-08-06 Thread Chitrang Srivastava
Hi, I am implementing HTTPs server using openssl 1.1.1b. Is it mandatory to setup these API's while creating ssl context ? SSL_CTX_set_tmp_ecdh SSL_CTX_set_tmp_dh Also any suggestion what all options one should set while setting up server like SSL_CTX_set_options like SSL_OP_NO_SSLv2 |SSL_OP_NO

any subtleties about OCSP in TLS1.3 with ecdh curves?

2019-06-24 Thread Sam Roberts
Node.js has a bug report and repro of ocsp status not being sent from a node server to the openssl CLI when TLS1.3 is being used, but only when server is setting an ecdh curve, with SSL_CTX_set1_curves_list() repro is https://github.com/sam-github/node-ocsp-bug-repro TLS trace of success is

Re: [openssl-users] Default key length of DH/DHE/ECDH/ECDHE

2017-07-24 Thread Jakob Bohm
enSSL 1.0.2l only ECDHE and DHE are available, but I do not have the option to define a key length, so I assume OpenSSL's default key length will be used. What is the default key length of OpenSSL for DH, DHE, ECDH and ECDHE? For DHE, the key size is set by the group parameters, for which t

Re: [openssl-users] Default key length of DH/DHE/ECDH/ECDHE

2017-07-24 Thread Salz, Rich via openssl-users
For the elliptic curve choices, the curve picked (NIST256, NIST384, whatever) determines the keysize. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[openssl-users] Default key length of DH/DHE/ECDH/ECDHE

2017-07-24 Thread SaAtomic
, but I do not have the option to define a key length, so I assume OpenSSL's default key length will be used. What is the default key length of OpenSSL for DH, DHE, ECDH and ECDHE? Thank you and regards, SaAtomic   -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailma

Re: [openssl-users] ECDSA and ECDH

2017-06-02 Thread Salz, Rich via openssl-users
> with a host device which will be ported with FIPS compliant OpenSSL library.   > Our embedded device will be using ECDSA (FIPS 186-3)  and ECDH (FIPS > SP800-56A) by calling APIs of ATECC508A SDK.  Is there any compatibility > issue?   There shouldn't be. But interop is a

[openssl-users] ECDSA and ECDH

2017-06-02 Thread Manoj Ramachandran
Hi, We are planning to designing an embedded device integrating ATECC508A module for PKI support. The embedded device is planned to communicate with a host device which will be ported with FIPS compliant OpenSSL library. Our embedded device will be using ECDSA (FIPS 186-3) and ECDH (FIPS

[openssl-users] Generate and use ECDH certificate on a simple server-client model

2016-10-31 Thread Huy Cong Vu
Hi, I'm trying to establish a TLS/SSL connection between 2 back-end using OpenSSL library. The algorithm I would like to use is ECDHE-RSA-AES256-SHA. At first, I want to generate 2 pairs of ECDH-RSA certificate/key, 1 for the server & 1 for the client using a root CA as a signed auth

Re: [openssl-users] How to choose ECDH and ECDHE with curve more than 192

2016-06-19 Thread Rakesh T
c: w...@openssl.org Subject: [openssl-users] How to choose ECDH and ECDHE with curve more than 192 Hi, I am using tomcat server, where I came across a situation where TestSSLServer(http://www.bolet.org/TestSSLServer/) tool reports the below, Highly appreciate your expertise in recommendi

[openssl-users] What is the minimum and default curve size for ECDH implementation

2016-06-18 Thread Rakesh T
HI, Which is the default and minimum Curve size for ECDH and ECDHE in openssl. Is it 256 by default? Thanks & Regards Raakesh. T --- [ C-DAC i

[openssl-users] How to choose ECDH and ECDHE with curve more than 192

2016-06-16 Thread Rakesh T
Hi, I am using tomcat server, where I came across a situation where TestSSLServer(http://www.bolet.org/TestSSLServer/) tool reports the below, Highly appreciate your expertise in recommending a solution to the finding where I can choose ECDH curve size greater than 192. In the server

Re: [openssl-users] How to provide KDF to ECDH key computation when using EVP API?

2015-07-02 Thread Reinier Torenbeek
Hello Jakob, > How does this all compare to the EVP API for traditional > DH?, I think this is a closer equivalent for API design > than ECDSA. Good point. For traditional DH, no Key Derivation Function is mentioned anywhere. It has a larger associated set of methods (see below) than

Re: [openssl-users] How to provide KDF to ECDH key computation when using EVP API?

2015-06-30 Thread Jakob Bohm
On 28/06/2015 04:55, Reinier Torenbeek wrote: Hi again, After digging into the ECDH code a bit more, I (sort of) found an answer to my question. My reason to look at using the KDF is to apply a hash to the shared secret to compute a useable key within the derive function. There is a control

Re: [openssl-users] How to provide KDF to ECDH key computation when using EVP API?

2015-06-27 Thread Reinier Torenbeek
and runnable code, but the EVP_PKEY_CTX_ctrl invocation is essentially ignored at this moment. Therefore the sha256 does not actually take place. On Sat, Jun 27, 2015 at 7:55 PM, Reinier Torenbeek < reinier.torenb...@gmail.com> wrote: > Hi again, > > After digging into the ECDH code

Re: [openssl-users] How to provide KDF to ECDH key computation when using EVP API?

2015-06-27 Thread Reinier Torenbeek
Hi again, After digging into the ECDH code a bit more, I (sort of) found an answer to my question. My reason to look at using the KDF is to apply a hash to the shared secret to compute a useable key within the derive function. There is a control value called EVP_PKEY_CTRL_MD which seems like it

[openssl-users] How to provide KDF to ECDH key computation when using EVP API?

2015-06-22 Thread Reinier Torenbeek
Hi, My goal is to implement ECDH in my own engine. The snippet below shows the struct that needs to be filled and set as the engine's ECDH method: struct ecdh_method { const char *name; int (*compute_key) (void *key, size_t outlen, const EC_POINT *pub_key, E

Re: [openssl-users] CMS_encrypt with ECDH key

2015-04-20 Thread Dr. Stephen Henson
On Sat, Apr 18, 2015, Q Rius wrote: > I'm trying to implement CMS encrypt using ECDH keys. Ref openssl CMS with > ECDH EnvelopedData > <http://stackoverflow.com/questions/29280688/openssl-cms-with-ecdh-envelopeddata> > The command line works flawlessly but my pro

[openssl-users] CMS_encrypt with ECDH key

2015-04-18 Thread Q Rius
I'm trying to implement CMS encrypt using ECDH keys. Ref openssl CMS with ECDH EnvelopedData <http://stackoverflow.com/questions/29280688/openssl-cms-with-ecdh-envelopeddata> The command line works flawlessly but my program is giving an error - Error Encrypting Data 1405085242

Re: [openssl-users] openssl 1.0.2a CMS encrypt with ECDH EnvelopedData fails?

2015-03-26 Thread Chris Madden
>> Hi, >> I am playing with openssl 1.0.2a - specifically CMS support for ECC. >> But what I think should work doesn't. >> Commands used and parsed data shown. >> (I gave an RSA example as a known good working example) >> >> ./openssl version >> OpenSSL 1.0.2a 19 Mar 2015 >> >> echo -n 123456781234

Re: [openssl-users] openssl 1.0.2a CMS encrypt with ECDH EnvelopedData fails?

2015-03-26 Thread Dr. Stephen Henson
On Thu, Mar 26, 2015, Chris Madden wrote: > Hi, > I am playing with openssl 1.0.2a - specifically CMS support for ECC. > But what I think should work doesn't. > Commands used and parsed data shown. > (I gave an RSA example as a known good working example) > > ./openssl version > OpenSSL 1.0.2a 19

[openssl-users] openssl 1.0.2a CMS encrypt with ECDH EnvelopedData fails?

2015-03-26 Thread Chris Madden
Hi, I am playing with openssl 1.0.2a - specifically CMS support for ECC. But what I think should work doesn't. Commands used and parsed data shown. (I gave an RSA example as a known good working example) ./openssl version OpenSSL 1.0.2a 19 Mar 2015 echo -n 12345678123456781234567812345678 > sess.

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Matt Caswell
On 23/03/15 14:19, Jakob Bohm wrote: > On 23/03/2015 14:48, Matt Caswell wrote: >> On 23/03/15 13:45, Viktor Dukhovni wrote: >>> On Mon, Mar 23, 2015 at 01:01:29PM +, Matt Caswell wrote: >>> > As Viktor states RFC 4492 says if the client sends no TLS extension > containing the curves

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Jakob Bohm
On 23/03/2015 14:48, Matt Caswell wrote: On 23/03/15 13:45, Viktor Dukhovni wrote: On Mon, Mar 23, 2015 at 01:01:29PM +, Matt Caswell wrote: As Viktor states RFC 4492 says if the client sends no TLS extension containing the curves supported then the server can choose any supported curve. S

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Matt Caswell
On 23/03/15 13:45, Viktor Dukhovni wrote: > On Mon, Mar 23, 2015 at 01:01:29PM +, Matt Caswell wrote: > >>> As Viktor states RFC 4492 says if the client sends no TLS extension >>> containing the curves supported then the server can choose any supported >>> curve. So your fix is to continue w

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Viktor Dukhovni
On Mon, Mar 23, 2015 at 01:01:29PM +, Matt Caswell wrote: > > As Viktor states RFC 4492 says if the client sends no TLS extension > > containing the curves supported then the server can choose any supported > > curve. So your fix is to continue when we reach the second iteration if > > there a

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Matt Caswell
h >>> using the \ >>> following cipher/protocol combinations: >>> ECDH-ECDSA-AES128-SHA ssl3 >>> ECDH-ECDSA-AES256-SHA ssl3 >>> ECDH-ECDSA-DES-CBC3-SHAssl3 >>> ECDH-ECDSA-RC4-SHA ssl3

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-23 Thread Linsell, StevenX
On 20/0315 15:51, Matt Caswell wrote: >On 20/03/15 12:44, Linsell, StevenX wrote: >> On Thu, Mar 19, 2015, Steve Linsell wrote: >> > >> Following further testing I see identical failures in the master branch >> using the \ >> following cipher/protocol com

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-21 Thread Viktor Dukhovni
e that's a bug. I recall a recent discussion that > specifically pointed out that we should not negotiate ECDH when > the relevant extension is not sent. We have no idea which curves > the client supports, and therefore can't choose any. > > IIRC the current behaviour is

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-20 Thread Viktor Dukhovni
On Fri, Mar 20, 2015 at 03:51:17PM +, Matt Caswell wrote: > >> I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and > >> s_server on > >> the master branch. (cloned at commit > >> f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then ret

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-20 Thread Matt Caswell
On 20/03/15 12:44, Linsell, StevenX wrote: > On Thu, Mar 19, 2015, Steve Linsell wrote: >> >> I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and s_server >> on >> the master branch. (cloned at commit >> f7683aaf36341dc65672ac2ccdbfd4a232e3626

Re: [openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-20 Thread Linsell, StevenX
On Thu, Mar 19, 2015, Steve Linsell wrote: > > I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and s_server on > the master branch. (cloned at commit > f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then retested  with a more > recent

[openssl-users] Failure using ECDH-RSA-AES256-SHA with ssl3 on Master Branch

2015-03-19 Thread Linsell, StevenX
I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and s_server on the master branch. (cloned at commit f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then retested  with a more recent clone: (commit da27006df06853a33b132133699a7aa9d4277920). We are running a test suite that tests

ECDH proof using openssl

2014-11-22 Thread Indtiny S
Hi All, I have to prove below things using openssl. Ca.Sa.G = Sa.Ca.G * Client *:- private = Ca , public= Ca,G and *Server*:- private=Sa, pub = Sa.G I have written the below code for that but dont know how to proceed further . Please help void handleErrors(void){ printf("\n Error "); } voi

Re: ECDH example for openssl 0.9.8za

2014-06-23 Thread pratyush parimal
Thanks .. that helps! -pratyush On Jun 23, 2014 7:44 PM, "Viktor Dukhovni" wrote: > On Mon, Jun 23, 2014 at 07:18:06PM -0400, pratyush parimal wrote: > > > Thanks a lot for the clarification. I understand now. > > > > Could you also let ne know the same about normal DH operations (not the > ec >

Re: ECDH example for openssl 0.9.8za

2014-06-23 Thread Viktor Dukhovni
On Mon, Jun 23, 2014 at 07:18:06PM -0400, pratyush parimal wrote: > Thanks a lot for the clarification. I understand now. > > Could you also let ne know the same about normal DH operations (not the ec > counterparts)? Are they supported in v0.9.8 then? Prime DH is supported in 0.9.8. --

Re: ECDH example for openssl 0.9.8za

2014-06-23 Thread pratyush parimal
Hi, Thanks a lot for the clarification. I understand now. Could you also let ne know the same about normal DH operations (not the ec counterparts)? Are they supported in v0.9.8 then? Regards, Pratyush. On Jun 23, 2014 7:07 PM, "Viktor Dukhovni" wrote: > On Mon, Jun 23, 2014 at 06:46:29PM -0400

Re: ECDH example for openssl 0.9.8za

2014-06-23 Thread Viktor Dukhovni
On Mon, Jun 23, 2014 at 06:46:29PM -0400, pratyush parimal wrote: > So does anyone know how to get the secret derivation working in OpenSSL > v0.9.8? The EC support in 0.9.8 is incomplete, and disabled by default. You should treat 0.9.8 as NOT capable of doing EC. > Because from what I read I th

ECDH example for openssl 0.9.8za

2014-06-23 Thread pratyush parimal
Hello users, I recently wrote a program to do ECDH secret derivation, using OpenSSL v1.0.1f. I actually followed the example given at http://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman, and I was able to make it work. But I need to make the program work on a machine with OpenSSL

Re: Issue with ECDH support in OpenSSL 1.0.0d-fips

2014-01-20 Thread Dr. Stephen Henson
On Mon, Jan 20, 2014, Chinmaya Dwibedy wrote: > Hi Dr. Stephen, >  I had downloaed the openssl-1.0.0d.tar.gz > from http://www.openssl.org/source/. > After installation in my Linux system , the #openssl version shows the openSSL > 1.0.0d-fips. >   By default OpenSSL is installed under /usr/local/

Re: Issue with ECDH support in OpenSSL 1.0.0d-fips

2014-01-20 Thread Chinmaya Dwibedy
, 2014, Chinmaya Dwibedy wrote: > Hi All, > I downloaded the openssl-1.0.0d.tar.gz. Build the openssl with > enabled the ec and ecdh (Elliptic curve Diffie???Hellman Group) support as > stated > below. >     1. ./config enable-ec enable-ecdh >     2. make >     3. make te

Re: Issue with ECDH support in OpenSSL 1.0.0d-fips

2014-01-20 Thread Dr. Stephen Henson
On Mon, Jan 20, 2014, Chinmaya Dwibedy wrote: > Hi All, > I downloaded the openssl-1.0.0d.tar.gz. Build the openssl with > enabled the ec and ecdh (Elliptic curve Diffie???Hellman Group) support as > stated > below. > 1. ./config enable-ec enable-ecdh > 2. make

Issue with ECDH support in OpenSSL 1.0.0d-fips

2014-01-20 Thread Chinmaya Dwibedy
Hi All, I downloaded the openssl-1.0.0d.tar.gz. Build the openssl with enabled the ec and ecdh (Elliptic curve Diffie–Hellman Group) support as stated below. 1. ./config enable-ec enable-ecdh 2. make 3. make test 4. make install   But upon checking whether ECDH has

Re: openssl ECDH random number

2013-10-07 Thread Matt Caswell
create > and use keys. To further build on Dave's comments, there is a discussion on how to use ECDH in OpenSSL on the Wiki here: http://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman Matt __ OpenSSL Project

RE: openssl ECDH random number

2013-10-07 Thread Dave Thompson
wner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of M.W. Aruna Withanage Sent: Monday, September 30, 2013 12:24 To: openssl-users@openssl.org Subject: *** Spam *** openssl ECDH random number Hi, For my MSc project I am using openSSL for encryption and key distribution. I

openssl ECDH random number

2013-10-06 Thread M.W. Aruna Withanage
Hi, For my MSc project I am using openSSL for encryption and key distribution. I have a requirement to replace the secret random number(private key) generated for ECDH with my own random number. I hope to edit the openSSL source. For that I need to know what is the source file I need to look at

TLS client aborts ECDH key exchange due to EC_R_UNKNOWN_GROUP when OpenSSL is built with no-ec2m option

2013-04-11 Thread Dmitriy Khodos
It appears that the current version of OpenSSL (1.0.1e) disregards the "no-ec2m" build option (OPENSSL_NO_EC2M) when populating the contents of the Supported Elliptic Curves Client Hello extension. In other words, the TLS client code always generates the same 25-element elliptic curve list, reg

{SSL,SSL_CTX}_set_tmp_{ecdh,dh,rsa}_callback userdata

2012-11-27 Thread Karel Sedláček
It would be nice to have these in the same way as SSL_CTX_set_default_passwd_cb_userdata. k __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@opens

RE: ECDH-RSA and TLS 1.2

2012-11-08 Thread Abhiram Shandilya
Just for everyone's benefit, there is a bug in OpenSSL that prevents ECDH-RSA cipher suites to be negotiated and this has been fixed in the latest stable snapshot. For all the folks who recommends that ECDH-RSA and ECDH-ECDSA cipher suites should not be supported, can you point to liter

Re: ECDH-RSA and TLS 1.2

2012-11-06 Thread Jakob Bohm
parameters needed to keep DSA and ECDSA safe from attackers, I don't think using the same private key for ECDSA and ECDH is a good/safe idea. However I am not a genius cryptanalyst, so I cannot guarantee that this is really dangerous, it is just a somewhat educated guess. Not at all - its

Re: ECDH-RSA and TLS 1.2

2012-11-04 Thread Jeffrey Walton
e mathematical restrictions on parameters needed to >>> keep DSA and ECDSA safe from attackers, I don't think using the same >>> private key for ECDSA and ECDH is a good/safe idea. >>> >>> However I am not a genius cryptanalyst, so I cannot guarantee that >>&g

Re: ECDH-RSA and TLS 1.2

2012-11-04 Thread jb-openssl
g the same private key for ECDSA and ECDH is a good/safe idea. However I am not a genius cryptanalyst, so I cannot guarantee that this is really dangerous, it is just a somewhat educated guess. Not at all - its good advice. Its called Key Separation, and its covered in the Handbook of Applied Cryptog

Re: ECDH-RSA and TLS 1.2 [AESGCM]

2012-11-04 Thread Dr. Stephen Henson
eement to the ECC certificate but even then it > > does not work. Pre-TLS 1.2 cipher suites such as > > ECDH-RSA-AES128-SHA work fine but just not the TLS 1.2 cipher > > suites with AESGCM. > > Looks like a bug to me. (1.0.1c) s3_lib.c ciphers C031 and C032 > have kE

RE: ECDH-RSA and TLS 1.2 [AESGCM]

2012-11-02 Thread Dave Thompson
2 cipher suites such as > ECDH-RSA-AES128-SHA work fine but just not the TLS 1.2 cipher > suites with AESGCM. Looks like a bug to me. (1.0.1c) s3_lib.c ciphers C031 and C032 have kECDHe when it appears they should have kECDHr . _

Re: ECDH-RSA and TLS 1.2

2012-11-02 Thread Jeffrey Walton
On Fri, Nov 2, 2012 at 4:30 PM, Jakob Bohm wrote: > (continuing TOFU posting to keep the thread somewhat consistent) > > Given some of the mathematical restrictions on parameters needed to > keep DSA and ECDSA safe from attackers, I don't think using the same > private key for

Re: ECDH-RSA and TLS 1.2

2012-11-02 Thread Jakob Bohm
(continuing TOFU posting to keep the thread somewhat consistent) Given some of the mathematical restrictions on parameters needed to keep DSA and ECDSA safe from attackers, I don't think using the same private key for ECDSA and ECDH is a good/safe idea. However I am not a genius cryptan

RE: ECDH-RSA and TLS 1.2

2012-11-02 Thread Abhiram Shandilya
I thought the keys in ECC certificates can be used for both ECDH key agreement and ECDSA digital signature. -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Erik Tkal Sent: Friday, November 02, 2012 8:24 AM To: openssl-users

Re: ECDH-RSA and TLS 1.2

2012-11-02 Thread Billy Brumley
> Well one reason is that the fixed ECDH cipher suites do not support forward > secrecy because they always use the same ECDH key. ECDHE cipher suites as implemented in OpenSSL don't necessarily support forward secrecy either. I wonder what it takes to get SSL_OP_SINGLE_ECDH_USE option

RE: ECDH-RSA and TLS 1.2

2012-11-02 Thread Erik Tkal
What if the server has an ECDH certificate? Would that then be the appropriate set of suites? Erik Tkal Juniper OAC/UAC/Pulse Development -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf

Re: ECDH-RSA and TLS 1.2

2012-11-01 Thread Dr. Stephen Henson
On Fri, Nov 02, 2012, Abhiram Shandilya wrote: > Hi Steve, Thanks for your response. I'm just trying to figure out what it > takes to get this working - are you of the opinion that an SSL server should > not support TLS 1.2 ECDH-RSA cipher suites? Could you also mention why? >

RE: ECDH-RSA and TLS 1.2

2012-11-01 Thread Abhiram Shandilya
Hi Steve, Thanks for your response. I'm just trying to figure out what it takes to get this working - are you of the opinion that an SSL server should not support TLS 1.2 ECDH-RSA cipher suites? Could you also mention why? I configured my openssl RSA CA to add the key usage extension fo

Re: ECDH-RSA and TLS 1.2

2012-11-01 Thread Dr. Stephen Henson
On Thu, Nov 01, 2012, Abhiram Shandilya wrote: > I ran openssl s_server with an ECC certificate signed by an RSA Root CA. When > I try to connect using s_client and a TLS 1.2 ECDH-RSA cipher suite (eg > ECDH-RSA-AES128-SHA256 or ECDH-RSA-AES128-GCM-SHA256), the connection fails > w

ECDH-RSA and TLS 1.2

2012-10-31 Thread Abhiram Shandilya
I ran openssl s_server with an ECC certificate signed by an RSA Root CA. When I try to connect using s_client and a TLS 1.2 ECDH-RSA cipher suite (eg ECDH-RSA-AES128-SHA256 or ECDH-RSA-AES128-GCM-SHA256), the connection fails with s_server printing the following error: "3086918464:

Re: ECDH

2012-05-16 Thread Fábio Resner
ere it goes: >> >> In DH you must exchange the parameters in order to generate the keys for >> the algorithm to work properly. (Am I wrong?) >> >> But in ECDH (accordingly to the code above) I only needed to exchange the >> public keys without >> exchanging

Re: ECDH

2012-05-15 Thread Matt Caswell (fr...@baggins.org)
On 15/05/12 20:21, Fábio Resner wrote: I don`t know if this is the correct place to make this conceptual question but here it goes: In DH you must exchange the parameters in order to generate the keys for the algorithm to work properly. (Am I wrong?) But in ECDH (accordingly to the code

Re: ECDH

2012-05-15 Thread Fábio Resner
ut in ECDH (accordingly to the code above) I only needed to exchange the public keys without exchanging any parameters for key's generation. Is this particular for ECDH or are the parameter exchange being hidden for the library? Thanks, On Tue, May 15, 2012 at 1:07 PM, Rick Lopes de Souza wr

Re: ECDH

2012-05-15 Thread Rick Lopes de Souza
tic const int KDF1_SHA1_len = 20; unsigned char *abuf = NULL; unsigned char *bbuf = NULL; OpenSSL_add_all_ciphers(); OpenSSL_add_all_algorithms(); EC_KEY *ecdh = NULL; EC_KEY *ecdh2 = NULL; //Generate Public ecdh = EC_KEY_new_by_curve_name(NID_secp521r

Re: ECDH

2012-05-15 Thread Matt Caswell (fr...@baggins.org)
On 15 May 2012 15:22, Fábio Resner wrote: > Hi, > > I'm trying to write an app to generate public/private/shared key for ECDH. > Here is what I was able to build based on examples: > > #include > > #define ECDH_SIZE 67 > > int main() { > EC_KEY *ecdh =

ECDH

2012-05-15 Thread Fábio Resner
Hi, I'm trying to write an app to generate public/private/shared key for ECDH. Here is what I was able to build based on examples: #include #define ECDH_SIZE 67 int main() { EC_KEY *ecdh = EC_KEY_new(); const EC_POINT *point = NULL; EC_POINT *point2; const EC_GROUP *group; // const

Re: ECDH vs. ECDHE

2012-04-30 Thread Billy Brumley
ECDHE is the E=Ephemeral version where you get a distinct DH key for every handshake. ECDH has a fixed DH key; one side of the handshake doesn't change from one instance to the next. ECDHE gives you forward secrecy; ECDH does not. ECDHE is less efficient than ECDH; it requires more c

ECDH vs. ECDHE

2012-04-30 Thread Hanno Böck
Hello, I'm trying to make sense out of the various abbrevations used for the SSL cipher suites listed by openssl ciphers. I've googled, but found no explanation of what ECDHE is and how it compares to ECDH. I'm aware that ECDH stands for "elliptic curve diffie hellman ke

Re: clarification about CVE-2011-3210 (TLS ephemeral ECDH) and OpenSSL 0.9.8 branch

2011-11-25 Thread Marco Molteni
On Nov 21, 2011, at 12:01 , Bodo Moeller wrote: > On Mon, Nov 21, 2011 at 10:51 AM, Marco Molteni wrote: > > The OpenSSL security advisory of 2011-09-06 > (http://www.mail-archive.com/openssl-announce@openssl.org/msg00108.html), > regarding "TLS ephemeral ECDH crashe

Re: clarification about CVE-2011-3210 (TLS ephemeral ECDH) and OpenSSL 0.9.8 branch

2011-11-21 Thread Bodo Moeller
On Mon, Nov 21, 2011 at 10:51 AM, Marco Molteni wrote: > The OpenSSL security advisory of 2011-09-06 ( > http://www.mail-archive.com/openssl-announce@openssl.org/msg00108.html), > regarding "TLS ephemeral ECDH crashes in OpenSSL" states that the issue, > for branch 0.9.

clarification about CVE-2011-3210 (TLS ephemeral ECDH) and OpenSSL 0.9.8 branch

2011-11-21 Thread Marco Molteni
Hi all, I would like to validate my understanding, please excuse my lack of familiarity with OpenSSL versioning :-) The OpenSSL security advisory of 2011-09-06 (http://www.mail-archive.com/openssl-announce@openssl.org/msg00108.html), regarding "TLS ephemeral ECDH crashes in OpenSSL&qu

Re: Support for ECDH-RSA cipher suites in 0.9.8

2011-11-07 Thread Bodo Moeller
On Fri, Nov 4, 2011 at 5:23 PM, John Foley wrote: > None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they > work in 1.0.0. Is this expected? > Yes -- the OpenSSL 0.9.8 branch includes basic support for elliptic-curve cryptography, but TLS integration wasn't fini

Support for ECDH-RSA cipher suites in 0.9.8

2011-11-05 Thread John Foley
None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they work in 1.0.0. Is this expected? Looking at s3_lib.c, all the older DH-RSA cipher suites are disabled (SSL_CIPHER->valid=0). But the ECDH-RSA ciphers listed in s3_lib.c are enabled. This leads to the following questions:

Re: ECDH-RSA key exchange support (rfc 4492)

2011-08-16 Thread Gaglia
On 08/16/2011 02:58 PM, Dr. Stephen Henson wrote: > Can you give me a more complete report? I detailed my situation in a previous recent thread ( Please help: OpenSSL + OpenVPN Elliptic Curves (SHA512, ECDSA, ECDH, Linux, Debian) ). Briefly: - I want to use ECDSA+SHA512 for Open

Re: ECDH-RSA key exchange support (rfc 4492)

2011-08-16 Thread Dr. Stephen Henson
k for me :( Can you give me a more complete report? With me before this change OpenSSL 1.0.0 and later couldn't handle anything other than SHA1 signed ECDSA certificates for static ECDH ciphersuites, after this change it worked fine. Steve. -- Dr Stephen N. Henson. OpenSSL project cor

  1   2   >