Actually, I think Ryan Murray's email account may be compromised. We've seen a 
number of odd messages from it over the past couple of days.

Or he's running a DNN which has become self-aware and is spamming the list with 
its incoherent thoughts. Soon it will enlist the OpenSSL mail reflector in its 
uncompromising war on organic intelligence. We knew this would happen 
eventually.

(Of course it's only a mailing list, so really all it can do is wage 
psychological warfare, sending us depressing messages to break our spirit. 
Fortunately, as TLS users, we have built up a tremendous tolerance for 
depressing messages.)

Michael Wojcik
Distinguished Engineer, Micro Focus



From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Blumenthal, Uri - 0553 - MITLL
Sent: Friday, April 28, 2017 16:46
To: openssl-users@openssl.org
Subject: Re: [openssl-users] EVP_MD_CTX and EVP_PKEY_CTX? How to init? How 
tofree?

I see. I appreciate your willingness to help, but it would've been far better 
if you answered those very specific and unambiguous questions that I explicitly 
asked, instead of trying to guess/conjecture what the high level purpose of 
that whole exercise was.

As it happens, I've no interest and no need for (other) remote login or 
virtualization solutions (which have nothing to do with the problem I'm 
addressing), so I am unable to make use of your answer.

Regards,
Uri

Sent from my iPhone

On Apr 28, 2017, at 18:37, Ryan Murray 
<rjkmurra...@gmail.com<mailto:rjkmurra...@gmail.com>> wrote:

 REMOTE LOGIN PROTOCOLS
A client/server model can create a mechanism that allows a user to establish a 
session  on the remote machine and then run its applications. This application 
is known as  remote login. This can be done by a client/server application 
program for the desired  service. Two remote login protocols are TELNET and 
SSH.  TELNET Protocol  TELNET (terminal network) is a TCP/IP standard for 
establishing a connection to a  remote system. TELNET allows a user to log in 
to a remote machine across the  Internet by first making a TCP connection and 
then pass the detail of the application
 from the user to the remote machine.. You do this to many

Sent from Mail<https://go.microsoft.com/fwlink/?LinkId=550986> for Windows 10

From: Blumenthal, Uri - 0553 - MITLL<mailto:u...@ll.mit.edu>
Sent: Friday, April 28, 2017 4:33 PM
To: openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: [openssl-users] EVP_MD_CTX and EVP_PKEY_CTX? How to init? How tofree?

I’m playing with RSA-PSS signatures, and stumbled upon a few problems. I tried 
the OpenSSL manual pages, but still coming short of complete understanding. :-)

This is how I initialize the contexts (error handlers removed for brevity):



      ctx = EVP_PKEY_CTX_new(privkey, NULL);

      md_ctx = EVP_MD_CTX_create();

      const EVP_MD *md = EVP_sha256();

      rv = EVP_DigestInit_ex(md_ctx, md, NULL);

      rv = EVP_DigestSignInit(md_ctx, &ctx, md, NULL, privkey);

First question: do I need EVP_DigestInit_ex() there?

Second question: do I have to specify hash-function (EVP_MD*) twice? First when 
initializing EVP_MD_CTX, and second for EVP_DigestSignInit()?

At the end I need to dispose of both ctx and md_ctx. That leads to my third 
question/problem. The code I tried (based on what the man page says: to avoid 
memory leak, I need to do EVP_MD_CTX_destroy(md_ctx) crashes with SIGV:

      EVP_MD_CTX_destroy(md_ctx); // this succeeds
      EVP_PKEY_CTX_free(ctx);  // but here the code crashes

Same happens when I reverse the above order:

      EVP_PKEY_CTX_free(ctx); // this succeeds
      EVP_MD_CTX_destroy(md_ctx); // but then this one causes crash

So what’s the correct way of freeing both of them? Or is it that because 
they’re sort of “bound together” by EVP_DigestSignInit(md_ctx, &ctx, md, NULL, 
privkey); freeing one frees the other?

Thanks!
—
Regards,
Uri


--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to