RE: About the encrypted premaster length.

2012-08-22 Thread Tayade, Nilesh
> -Original Message- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Dave Thompson > Sent: Thursday, August 23, 2012 2:31 AM > To: openssl-users@openssl.org > Subject: RE: About the encrypted premaster length. > > > From: owner-openssl-us...

Tables for handling various non-blocking I/O errors

2012-08-22 Thread James Marshall
For my own benefit and that of others, I made a page at http://jmarshall.com/stuff/handling-nbio-errors-in-openssl.html listing various error conditions after SSL_accept(), SSL_connect(), SSL_read(), SSL_write(), and SSL_shutdown(), all on *non-blocking* sockets. The tables show what to do after t

RE: About the encrypted premaster length.

2012-08-22 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Tayade, Nilesh > Sent: Wednesday, 22 August, 2012 16:13 > The 'Client Key Exchange' packet carries the encrypted > premaster. I am working on utility for decrypting the data > and supported cipher suites are RC4_128_MD5 and RC4_128_SHA. > Onl

About the encrypted premaster length.

2012-08-22 Thread Tayade, Nilesh
Hi, The 'Client Key Exchange' packet carries the encrypted premaster. I am working on utility for decrypting the data and supported cipher suites are RC4_128_MD5 and RC4_128_SHA. I observed that the encrypted premaster length varies in the 'Client key exchange' packet. Sometimes it is 128bytes

AES-CMAC-128 equivalent to EVP_aes_128_cbc sent to CMAC?

2012-08-22 Thread Cassie Helms
Hi folks, Thanks for your help with previous questions. I have a new one, which should hopefully be quick: In implementing AES-CMAC-128 over a message, I assumed it would be equivalent in OpenSSL to hand the EVP_aes_128_cbc() EVP_CIPHER to CMAC, as I did not see a regular AES-128 EVP_CIPHER availb

Generation ECDHE parameters

2012-08-22 Thread Varma Dantuluri
Hi We are in the process of adding support for ECDSA-ECDHE cipher suites and hence ECDSA certificates to our server. Right now, the server does the following: 1) Assign the ECDSA certificate to the SSL_CTX. 2) Set the callback for ECDH parameter generation using SSL_CTX_set_tmp_ecdh_callback. I

Re: What exactly does the -binary switch do when creating s/mime output?

2012-08-22 Thread Wim Lewis
On 21 Aug 2012, at 2:39 PM, Bart W Jenkins wrote: > Given: > > openssl smime -binary -sign -passin "pass:SomePassword" -signer cert.pem > -inkey key.pem -in Document.txt -out Document.txt.sig -outform DER > > What *exactly* is done to the s/mime text to create a "binary" file? Are you asking a

Re: Deadlock in multi-threaded OpenSSL FIPS 2.0

2012-08-22 Thread Dr. Stephen Henson
On Wed, Aug 22, 2012, Seiichi Tatsukawa wrote: > We are seeing the deadlock in FIPS 2.0. (1.0.1c + fips-2.0 and using > AES256-SHA256 if that matters.) DRBG's auto reseeding (after 2^24 operations) > causes it. Here is the simplified backtrace. > > fips_drbg_bytes() > CRYPTO_w_lock(CRYPTO_LOCK

Entropy for OpenSSL

2012-08-22 Thread Charles Mills
I'm looking at https://groups.google.com/forum/?fromgroups#!topic/mailing.openssl.users/j8O bkLf6xgs Do I interpret it correctly as saying that assuming I do not have some clever source of entropy of my own, that I should just "do nothing" and let OpenSSL do what it decides is best? In other wor

Deadlock in RAND_poll's Heap32First/Heap32Next call

2012-08-22 Thread sandeep kiran p
Hi all, We (and a couple of others) had faced this issue on Windows 7 and Windows 2008 systems. We raised the issue with MS and very recently they released a hotfix to address the problem in Ntdll.dll. If you ever face the issue, please install the hotfix from http://support.microsoft.com/kb/27193

Re: Using variable length Blowfish key with command line

2012-08-22 Thread Dr. Stephen Henson
On Tue, Aug 21, 2012, Nathan McCrina wrote: > On 08/21/12 23:04, Dave Thompson wrote: > >>From: owner-openssl-us...@openssl.org On Behalf Of Nathan McCrina > >>Sent: Tuesday, 21 August, 2012 21:31 > > > >Not in commandline; in library it's fine. > >See http://marc.info/?l=openssl-users&m=134463726

RE: OpenSSL DES generates '\n' in encrypted code

2012-08-22 Thread Charles Mills
We are beating this to death but one problem is that the encoded string is not an exact number even of *bits* (except for favorable values of 'n'). I don't know what is so fascinating about this problem but I was thinking about it again this morning. There may be 94 *possible* characters but any g

Deadlock in multi-threaded OpenSSL FIPS 2.0

2012-08-22 Thread Seiichi Tatsukawa
We are seeing the deadlock in FIPS 2.0. (1.0.1c + fips-2.0 and using AES256-SHA256 if that matters.) DRBG's auto reseeding (after 2^24 operations) causes it. Here is the simplified backtrace. fips_drbg_bytes() CRYPTO_w_lock(CRYPTO_LOCK_RAND) FIPS_drbg_generate() drbg_reseed() fips_get_ent

What exactly does the -binary switch do when creating s/mime output?

2012-08-22 Thread Bart W Jenkins
Given: openssl smime -binary -sign -passin "pass:SomePassword" -signer cert.pem -inkey key.pem -in Document.txt -out Document.txt.sig -outform DER What *exactly* is done to the s/mime text to create a "binary" file? I'm trying to do the equivalent in Java using BouncyCastle and just can't get