Re: [openssl-dev] [openssl-users] X509_verify() error - block type is not 01

2015-06-21 Thread Viktor Dukhovni
On Mon, Jun 22, 2015 at 08:57:08AM +0530, Nayna Jain wrote: > What will X509_verify() will verify if I pass it public key. It checks the signature of the certificate using the supplied key. > I mean does it check the private key with which certificate was signed, or > the public key which this c

Re: [openssl-dev] [openssl-users] X509_verify() error - block type is not 01

2015-06-21 Thread Nayna Jain
OK.. I think I understood this API wrongly then. What will X509_verify() will verify if I pass it public key. I mean in place of private key , if I try to match the public key than rather than doing keys comparision, will passing the public key to this API, help ? I mean does it check the priva

Re: [openssl-dev] [openssl-users] X509_verify() error - block type is not 01

2015-06-21 Thread Viktor Dukhovni
On Mon, Jun 22, 2015 at 07:56:37AM +0530, Nayna Jain wrote: > I want to match the certificate with the private key for whose public key > that certificate is provided. That's the subject key, and unless the certificate is self-signed, the X509_verify() function is not the right interface. You wa

Re: [openssl-dev] [openssl-users] X509_verify() error - block type is not 01

2015-06-21 Thread Nayna Jain
Thanks Victor, I want to match the certificate with the private key for whose public key that certificate is provided. If this verifies who signed the certificate, then how do I verify whether the certificate provided is for the private key which was generated, Thanks & Regards, Nayna Jain F

Re: [openssl-dev] [openssl-users] X509_verify() error - block type is not 01

2015-06-21 Thread Viktor Dukhovni
On Mon, Jun 22, 2015 at 04:12:29AM +0530, Nayna Jain wrote: > I am trying to verify X509 certificate against two private keys such that > atleast one of them it should match. What do you mean by "match"? Was either key used to sign the certificate, or is one of the keys the public key of the sub

Re: [openssl-dev] curve25519

2015-06-21 Thread Michael Sierchio
On Sun, Jun 21, 2015 at 3:00 PM, Salz, Rich wrote: Your analysis is incorrect for servers over the Internet, where the only > thing that an attacker can measure is time. Power and radiation require > close proximity and, often, physical intervention. Those are reasonable > attacks to have in th

[openssl-dev] X509_verify() error - block type is not 01

2015-06-21 Thread Nayna Jain
Hi, I am trying to verify X509 certificate against two private keys such that atleast one of them it should match. I used the API as X509_verify(x509, pkey) where pkey is of EVP_PKEY type However, for one of the private key it is failing with error "block type is not 01"// And this key is s

Re: [openssl-dev] curve25519

2015-06-21 Thread Pascal Cuoq
Dmitry Belyavsky wrote: > BTW, is there any tool for checking C code whether it is constant-time? Short answer: No tools that are useful for usable implementations of asymmetric cryptography, that I know of, but useful tools for confirming that symmetric cryptography designed for constant-tim

[openssl-dev] [openssl.org #3919] ssl.h uses ALL in its default cipher list

2015-06-21 Thread noloa...@gmail.com via RT
The following is from ssl.h, around line 285: /* * The following cipher list is used by default. It also is substituted when * an application-defined cipher list string starts with 'DEFAULT'. */ # define SSL_DEFAULT_CIPHER_LIST "ALL:!aNULL:!eNULL" Its 2015, and its probably

Re: [openssl-dev] curve25519

2015-06-21 Thread Salz, Rich
Your analysis is incorrect for servers over the Internet, where the only thing that an attacker can measure is time. Power and radiation require close proximity and, often, physical intervention. Those are reasonable attacks to have in the threat model, but comes after timing considerations.

Re: [openssl-dev] curve25519

2015-06-21 Thread Mehdi Sotoodeh
Does anyone have any comment on my reasoning regarding the constant time? Here is the text: Side Channel Security: -- This library uses multiple measures with the gaol of eliminating leakage of secret keys during cryptographic operations. Constant-time is one of these measures

[openssl-dev] [openssl.org #3917] Bug report -- potential memory leak

2015-06-21 Thread Rich Salz via RT
OpenSSL_1_0_2-stable 4475451 RT3917: add cleanup on an error path master 7fba840 RT3917: add cleanup on an error path Author: Rich Salz Date: Sun Jun 21 15:37:53 2015 -0400 RT3917: add cleanup on an error path Reviewed-by: Richard Levitte -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___

[openssl-dev] [openssl.org #3905] Bug report: segfault while cleaning up in libgost

2015-06-21 Thread Rich Salz via RT
Cherry-picked to 1.0.2 and 1.0.1; thanks. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2464] TLS-RSA-PSK support

2015-06-21 Thread Giuseppe D'Angelo via RT
Yet another version after some refactorings that landed in master. Please, pretty please, with sugar on top, could anyone review this code so that it can get merged? It's becoming a difficult exercise to keep track of upstream changes and adapt the patch every single time... Cheers, -- Giusep

Re: [openssl-dev] curve25519

2015-06-21 Thread Salz, Rich
> This high-key-bit leak is only saved by X25519's insistence on setting the > highest bit to 1 on every secret key. This is not a coincidence. Djb was the first, and is still one of the few, cryptographers who think about it from a full systems approach and design things so that proper implem

Re: [openssl-dev] curve25519

2015-06-21 Thread Samuel Neves
On 21-06-2015 18:10, Salz, Rich wrote: > The big thing is "avoid data-dependant jumps." For example, memcmp() always > runs the full length, almost any "if" statement needs careful scrutiny, and > so on. Case in point: https://github.com/msotoodeh/curve25519/blob/master/source/curve25519_dh.c

Re: [openssl-dev] curve25519

2015-06-21 Thread Viktor Dukhovni
On Sun, Jun 21, 2015 at 05:10:48PM +, Salz, Rich wrote: > The big thing is "avoid data-dependant jumps. Not only data-dependent branches, but also data-dependent memory access patterns. Both the sequence of instrucutions executed and the sequence of memory addresses accessed must not depend

Re: [openssl-dev] curve25519

2015-06-21 Thread Salz, Rich
> BTW, is there any tool for checking C code whether it is constant-time? I'm not aware of any. The body of information about it, for C, is slowly starting to emerge. There was some talk about an IETF draft on techniques, but I don't recall seeing it yet. The big thing is "avoid data-dependan

Re: [openssl-dev] curve25519

2015-06-21 Thread Mehdi Sotoodeh
Hi Aaron, Did you look at the text regarding side channel security on the front page? It is located towards the end of page and I think you missed it. My reasoning is the fact that the goal of constant time is not achievable by software only approaches. A lot depends on the underlying hardware. Th

Re: [openssl-dev] curve25519

2015-06-21 Thread Dmitry Belyavsky
Hello Rich, On Sun, Jun 21, 2015 at 7:54 PM, Salz, Rich wrote: > > > I really have to question the wisdom of adding implementations of > > Curve25519 and/or Ed25519 that are not completely constant- time. > > It's unlikely to happen. > > BTW, is there any tool for checking C code whether it is c

Re: [openssl-dev] curve25519

2015-06-21 Thread Salz, Rich
> I really have to question the wisdom of adding implementations of > Curve25519 and/or Ed25519 that are not completely constant- time. It's unlikely to happen. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/open

Re: [openssl-dev] curve25519

2015-06-21 Thread Aaron Jones
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 20/06/15 23:24, Mehdi Sotoodeh wrote: > [...] Major features of this library include: [...] * > Constant-time (partially) and blinding support for side channel > security. I really have to question the wisdom of adding implementations of Curve255