[openssl.org #3139] Bug in AES XTS implementation for Windows x64 (truncating pointer to IV)

2013-10-11 Thread Олег Кошельников via RT
File: openssl/crypto/aes/asm/bsaes-x86_64.pl Function: bsaes_xts_[en|de]crypt Commit: fa104be35e24f3fea895d55bb7042d6f4b2963e9 Pointer to IV is pulled to $arg6 (line 2109): mov0xa8(%rsp),$arg6# pull ivp However, for x64 $arg6 is defined as r11d (line 1155): my ($arg1,$arg2,$arg3,$

Re: Openssl generating 1024 bit keys when default_bits is set to 4096 bit

2013-10-11 Thread Jan Just Keijser
Hi Ralf, Ralf Skyper Kaiser wrote: Hi, OpenSSL 1.0.1e 11 Feb 2013 $ grep bits openssl.cnf default_bits= 4096 => Note that the default_bits are set to 4096. $ openssl req -config openssl.cnf -nodes -newkey rsa -keyout testkey.pem -keyform PEM -out testreq.pem -outform PEM Gener

To much fiddling to force openssl to use strong crypto.

2013-10-11 Thread Ralf Skyper Kaiser
Hi, I'm concerned that it takes quite a bit of fiddling to make openssl use strong crypto. It is not enough to just set default_md = sha512 under the [ ca ] section to force sha512 by default (this is the suggested way in most forums. It's wrong. It's sad to see how many admins believe that they

Openssl generating 1024 bit keys when default_bits is set to 4096 bit

2013-10-11 Thread Ralf Skyper Kaiser
Hi, OpenSSL 1.0.1e 11 Feb 2013 $ grep bits openssl.cnf default_bits= 4096 => Note that the default_bits are set to 4096. $ openssl req -config openssl.cnf -nodes -newkey rsa -keyout testkey.pem -keyform PEM -out testreq.pem -outform PEM Generating a 4096 bit RSA private key ..++