[openssl-dev] [openssl.org #4432] [BUG] Building with "no-des" fails at crypto/cms/cms_kari.c

2016-06-23 Thread Rich Salz via RT
https://github.com/openssl/openssl/pull/872 Closing ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4432 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4432] [BUG] Building with "no-des" fails at crypto/cms/cms_kari.c

2016-03-15 Thread Tuyen Tran via RT
Thank you Jeremy. I have add a commit to handle no-aes as well. -- Tuyen Tran -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4432 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-

Re: [openssl-dev] [openssl.org #4432] [BUG] Building with "no-des" fails at crypto/cms/cms_kari.c

2016-03-15 Thread Jeremy Farrell via RT
On 15/03/2016 14:41, Tuyen Tran via RT wrote: > ../libcrypto.a(cms_kari.o): In function `cms_RecipientInfo_kari_encrypt': > cms_kari.c:(.text+0x647): undefined reference to `EVP_des_ede3_wrap' > > Using: > > $ uname -s -r -v -m -p -i -o > Linux 2.6.32-573.18.1.el6.x86_64 #1 SMP Wed Jan 6 11:20:49

[openssl-dev] [openssl.org #4432] [BUG] Building with "no-des" fails at crypto/cms/cms_kari.c

2016-03-15 Thread Tuyen Tran via RT
../libcrypto.a(cms_kari.o): In function `cms_RecipientInfo_kari_encrypt': cms_kari.c:(.text+0x647): undefined reference to `EVP_des_ede3_wrap' Using: $ uname -s -r -v -m -p -i -o Linux 2.6.32-573.18.1.el6.x86_64 #1 SMP Wed Jan 6 11:20:49 EST 2016 x86_64 x86_64 x86_64 GNU/Linux ~/sandbox/openssl-

Re: [openssl-dev] [openssl.org #4210] Compiler warning for Sparc T4 DES opcodes

2016-02-13 Thread Andy Polyakov via RT
> OpenSSL 1.1.0 Pre 1 > Platform: Sparc Solaris 10 > Compiler: GCC 4.9.3 > > Warnings: > > e_des.c: In function 'des_init_key': > e_des.c:239:29: warning: assignment from incompatible pointer type > dat->stream.cbc = enc ? des_t4_cbc_encrypt : > des_t4_cbc_decrypt; >

[openssl-dev] [openssl.org #4210] Compiler warning for Sparc T4 DES opcodes

2015-12-30 Thread Rainer Jung via RT
OpenSSL 1.1.0 Pre 1 Platform: Sparc Solaris 10 Compiler: GCC 4.9.3 Warnings: e_des.c: In function 'des_init_key': e_des.c:239:29: warning: assignment from incompatible pointer type dat->stream.cbc = enc ? des_t4_cbc_encrypt : des_t4_cbc_decrypt; ^ e_de

[openssl-dev] [openssl.org #3938] Website ciphers.html specifies DHE-RSA-DES-CBC3-SHA, OpenSSL needs EDH-RSA-DES-CBC3-SHA

2015-09-02 Thread Rich Salz via RT
We do now publish all manpage versions. If there's an error in a specific manpage, please create a new ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl

[openssl-dev] [openssl.org #3972] EVP documentation implicitly recommends the use of single-DES

2015-07-31 Thread Rich Salz via RT
fixed in master and 1.0.2, thanks. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3972] EVP documentation implicitly recommends the use of single-DES

2015-07-30 Thread Kaduk, Ben via RT
See https://github.com/openssl/openssl/pull/348 I was looking for something else but then saw this text about "normally supplied by a function such as EVP_des_cbc()"; we should not be misleading our users in such a fashion. -Ben ___ openssl-bugs-mod ma

Re: [openssl-dev] [openssl.org #3938] Website ciphers.html specifies DHE-RSA-DES-CBC3-SHA, OpenSSL needs EDH-RSA-DES-CBC3-SHA

2015-07-21 Thread Hubert Kario via RT
_3DES_EDE_CBC_SHA = { 0x00,0x16 }; > > > > From https://www.openssl.org/docs/apps/ciphers.html > > > > TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA > > > > From ‘openssl ciphers -V | grep 0x16’ > > > >0x00,0x1

Re: [openssl-dev] [openssl.org #3938] Website ciphers.html specifies DHE-RSA-DES-CBC3-SHA, OpenSSL needs EDH-RSA-DES-CBC3-SHA

2015-07-14 Thread David Thompson via RT
/apps/ciphers.html > TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA > > From ‘openssl ciphers -V | grep 0x16’ > 0x00,0x16 - EDH-RSA-DES-CBC3-SHASSLv3 Kx=DH Au=RSA > Enc=3DES(168) Mac=SHA1 > > DHE-RSA-DES-CBC3-SHA (on the website) vs > EDH-RSA-DES-CBC3-SHA (ac

Re: [openssl-dev] [openssl.org #3938] Website ciphers.html specifies DHE-RSA-DES-CBC3-SHA, OpenSSL needs EDH-RSA-DES-CBC3-SHA

2015-07-14 Thread David Thompson
/apps/ciphers.html > TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA > > From ‘openssl ciphers -V | grep 0x16’ > 0x00,0x16 - EDH-RSA-DES-CBC3-SHASSLv3 Kx=DH Au=RSA > Enc=3DES(168) Mac=SHA1 > > DHE-RSA-DES-CBC3-SHA (on the website) vs > EDH-RSA-DES-CBC3-SHA (ac

[openssl-dev] [openssl.org #3938] Website ciphers.html specifies DHE-RSA-DES-CBC3-SHA, OpenSSL needs EDH-RSA-DES-CBC3-SHA

2015-07-11 Thread James A. T. Rice via RT
>From https://www.ietf.org/rfc/rfc4346.txt CipherSuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = { 0x00,0x16 }; >From https://www.openssl.org/docs/apps/ciphers.html TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA >From ‘openssl ciphers -V | grep 0x16’

[openssl-dev] [openssl.org #3893] Bug in openssl-1.0.2a when disabling DES

2015-06-02 Thread Osvaldo Calles via RT
Self-test report generated by 'make report' - testlog attached Application Details (name, version) - openssl-1.0.2a Problem Description ./Configure linux-x86_64 no-des make depend make ../libcrypto.a(cms_kari.o): In function `cms_RecipientInfo_kari_encrypt': cms_kari

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-04 Thread Ben Laurie
On 4 July 2014 15:20, Toralf Förster wrote: > On 07/04/2014 11:17 AM, Ben Laurie wrote: >> It'd be nice, btw, if someone would report the bug to cppcheck. > http://5.150.254.56:443/trac-cppcheck/ticket/5970#ticket Thanks. > > Thx >> >> On 4 July 2014 10:15, Ben Laurie wrote: >>> On 3 July 2014

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-04 Thread Toralf Förster
On 07/04/2014 11:17 AM, Ben Laurie wrote: > It'd be nice, btw, if someone would report the bug to cppcheck. http://5.150.254.56:443/trac-cppcheck/ticket/5970#ticket Thx > > On 4 July 2014 10:15, Ben Laurie wrote: >> On 3 July 2014 22:35, Kurt Roeckx wrote: >>> On Thu, Jul 03, 2014 at 09:28:47PM

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-04 Thread Otto Moerbeek
On Fri, Jul 04, 2014 at 08:38:23AM +0200, Kurt Roeckx wrote: > On Fri, Jul 04, 2014 at 08:21:15AM +0200, Otto Moerbeek wrote: > > On Thu, Jul 03, 2014 at 11:35:15PM +0200, Kurt Roeckx wrote: > > > > > On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: > > > > On 3 July 2014 20:06, Kurt R

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-04 Thread Ben Laurie
It'd be nice, btw, if someone would report the bug to cppcheck. On 4 July 2014 10:15, Ben Laurie wrote: > On 3 July 2014 22:35, Kurt Roeckx wrote: >> On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: >>> On 3 July 2014 20:06, Kurt Roeckx via RT wrote: >>> > On Thu, Jul 03, 2014 at 07:

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-04 Thread Ben Laurie
On 3 July 2014 22:35, Kurt Roeckx wrote: > On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: >> On 3 July 2014 20:06, Kurt Roeckx via RT wrote: >> > On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: >> >> I think cppcheck is right here in void DES_ofb64_encrypt(), l

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Kurt Roeckx
On Fri, Jul 04, 2014 at 08:21:15AM +0200, Otto Moerbeek wrote: > On Thu, Jul 03, 2014 at 11:35:15PM +0200, Kurt Roeckx wrote: > > > On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: > > > On 3 July 2014 20:06, Kurt Roeckx via RT wrote: > > > > On Thu, Jul 03, 2014 at 07:51:28PM +0200, T

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Otto Moerbeek
On Thu, Jul 03, 2014 at 11:35:15PM +0200, Kurt Roeckx wrote: > On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: > > On 3 July 2014 20:06, Kurt Roeckx via RT wrote: > > > On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf F?rster via RT wrote: > > >> I think cppcheck is right here in void

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Kurt Roeckx
On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: > On 3 July 2014 20:06, Kurt Roeckx via RT wrote: > > On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: > >> I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 > >> and 96, or ?: > >> > > The line

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Ben Laurie
On 3 July 2014 20:06, Kurt Roeckx via RT wrote: > On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: >> I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 >> and 96, or ?: >> > The line before that: > > dp=d; >> l2c(v0,dp);<--- Uninitialized

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Kurt Roeckx via RT
On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: > I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 > and 96, or ?: > The line before that: dp=d; > l2c(v0,dp);<--- Uninitialized variable: d > l2c(v1,dp);<--- Uninitialized variab

[openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Toralf Förster via RT
I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 and 96, or ?: l2c(v0,dp);<--- Uninitialized variable: d l2c(v1,dp);<--- Uninitialized variable: d while (l--) { if (n == 0) {

[openssl.org #3223] Cipher DHE-DSS-DES-CBC3-SHA does not exists

2014-06-28 Thread Stephen Henson via RT
On Fri Jan 10 09:53:26 2014, stefano.cata...@gmail.com wrote: > Hello, sorry for my poor english, i installed both 1.0.1e and 1.0.1f > version of openssl but in both versions the cipher > TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA > does not exists. > > I found only EDH-DSS-DES-CBC3-SHA s

naming inconsistency between 3DES-EDE-CBC and DES-CBC3 [Fwd: Re: [TLS] The risk of misconfiguration]

2014-05-13 Thread Daniel Kahn Gillmor
Hi OpenSSL folks-- In the message below, James Cloos points out that the OpenSSL ciphersuite string labels are not consistent with the grouping shorthand for DES and 3DES. This seems similar to the situation for DHE (EDH) and ECDHE (EECDH), which were known with incompatible/inconsistent terms

RE: [openssl.org #3223] Cipher DHE-DSS-DES-CBC3-SHA does not exists

2014-01-12 Thread Dave Thompson
ls [EC]DH_anon and 3DES differently in some cases and omits RSA for akRSA, and some noise words. There has been discussion of some changes to this coming. > I found only EDH-DSS-DES-CBC3-SHA so connections with explorer 8 and > cipher suite > That is indeed the OpenSSL name for the suite abov

[openssl.org #3223] Cipher DHE-DSS-DES-CBC3-SHA does not exists

2014-01-10 Thread stefano.cata...@gmail.com via RT
Hello, sorry for my poor english, i installed both 1.0.1e and 1.0.1f version of openssl but in both versions the cipher TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA does not exists. I found only EDH-DSS-DES-CBC3-SHA so connections with explorer 8 and cipher suite "-ALL:AESGCM:ECDH:DH:-SSLv3:-AES25

[PATCH 09/10] Replace EDH-RSA-DES-CBC-SHA, etc. with DHE-RSA-DES-CBC-SHA

2013-12-20 Thread Daniel Kahn Gillmor
HA, SSL_kDHE, SSL_aRSA, diff --git a/ssl/ssl3.h b/ssl/ssl3.h index 17dd50c..c94b3a4 100644 --- a/ssl/ssl3.h +++ b/ssl/ssl3.h @@ -214,6 +214,17 @@ extern "C" { #define SSL3_TXT_DH_RSA_DES_64_CBC_SHA "DH-RSA-DES-CBC-SHA" #define SSL3_TXT_DH_RSA_DES_192_CBC3_SH

Re: [PATCH 3/3] sparc: Add support for DES opcodes.

2013-03-31 Thread David Miller
From: Andy Polyakov Date: Sun, 31 Mar 2013 14:42:21 +0200 >> On a SPARC T4-2, first with crypto opcodes disabled: >> type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes >> des cbc 54342.76k 56258.03k 57101.95k 57558.36k 57636.18k >> des ede3 19990.29k 20679.25k 20837

Re: [PATCH 3/3] sparc: Add support for DES opcodes.

2013-03-31 Thread Andy Polyakov
On a SPARC T4-2, first with crypto opcodes disabled: type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes des cbc 54342.76k56258.03k57101.95k57558.36k57636.18k des ede3 19990.29k20679.25k20837.29k20877.31k20889.60k and

Re: [PATCH 1/3] des: On sparc, ensure CBC assembler gets DES_LONG aligned pointers.

2013-03-31 Thread Andy Polyakov
8192 bytes des cbc 39148.28k40071.83k40669.53k40685.80k40864.43k des ede3 14358.54k14528.02k14611.88k14632.96k14641.83k and with them: type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes des cbc 54334.03k

[PATCH 3/3] sparc: Add support for DES opcodes.

2012-09-22 Thread David Miller
The biggest trick here is providing the mechanism necessary to expand the key properly. The DES opcodes expect the expanded key to be in a different format than the generic openssl DES code does. So we use some include and CPP define trickey so that we can override the key expansion in the

[PATCH 2/3] des: Allow targets to override key setting operations.

2012-09-22 Thread David Miller
This will be used when supporting the sparc DES opcodes as they expect the key to be expanded differently. Signed-off-by: David S. Miller --- Configure | 10 +- crypto/des/Makefile |2 +- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/Configure b

[PATCH 1/3] des: On sparc, ensure CBC assembler gets DES_LONG aligned pointers.

2012-09-22 Thread David Miller
8192 bytes des cbc 39148.28k40071.83k40669.53k40685.80k40864.43k des ede3 14358.54k14528.02k14611.88k14632.96k14641.83k and with them: type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes des cbc 54334.03k56280.92k

[PATCH 0/3] Sparc DES crypto opcode support.

2012-09-22 Thread David Miller
DES took a little bit more work. It stems from a common issue in that the DES opcodes expect the expanded key to be in a different format from the one the generic DES code puts it in. Complicating things further, the fcrypt code cannot use the DES opcodes because it wants the rounds computed in

Triple-DES and RC2 Key Wrapping (rfc3217)

2009-02-23 Thread Maxim Masiutin
Hello All, The file \doc\standards.txt states that OpenSSL supports rfc3217 (Triple-DES and RC2 Key Wrapping), however, I was only able to find AES key wrapping (rfc3394) in \crypto\aes\aes_wrap.c, not Triple-DES or RC2 Key Wrapping. Could you please help me locate the functions that will

Re: DES/3DES in OpenSSL

2008-12-03 Thread Ger Hobbelt
AM, Nanavati, Sitanshu <[EMAIL PROTECTED]> wrote: > Hello, > > > > I am trying to override the DES/3DES in OpenSSL. The API > EVP_EncryptInit_ex() requires the name of the cipher. For DES, the closes I > found (in crypto/objects) is "DES-CBC". I didn't find fo

DES/3DES in OpenSSL

2008-12-01 Thread Nanavati, Sitanshu
Hello, I am trying to override the DES/3DES in OpenSSL. The API EVP_EncryptInit_ex() requires the name of the cipher. For DES, the closes I found (in crypto/objects) is "DES-CBC". I didn't find for 3DES - something like "3DES-CBC". The only match I see is &quo

DES/3DES override via engine

2008-11-20 Thread Nanavati, Sitanshu
Hello, How do I override/support DES(3DES) in a crypto engine? I checked the in-built engines and none of them support. Also, there is no DES method declaration in engine.h file. Any help/pointers would be appreciated. Thanks, -Sitanshu

need help:run des on mips32 and vxworks

2007-07-20 Thread zhangyao
hi,all i meet a problem.when i plant the DES to my voip gateway for the purpose of snmpv3 support, it shows decryption error. My gateway is running on vxworks and processor is mips32. i guess it should be something wrong with architecture concerned choice, such as big(little)endian? in

Re: Openssl's DES test fails on Solaris 64 bit

2007-05-19 Thread Andy Polyakov
. make[2]: Leaving directory `/tmp/build_openssl2425/openssl-0.9.8e' ../util/shlib_wrap.sh ./destest You blaim des, but can you confirm that other tests pass? test_des is first in the list... Try test/sha1test... make[1]: *** [test_des] Segmentation Fault (core dumped) 'cd test

Openssl's DES test fails on Solaris 64 bit

2007-05-07 Thread fredk2
nux (either 32 or 64). So the problem is limited to DES for only with "shared" flag and Solaris for 64-bit.. Did anyone experienced the same ? I tried to remove the DES_PTR information since the INSTALL says in the crypto/des directory: "For 64 bit computers, do not use the DES_P

[Patch] crypto/des/spr.h

2007-03-27 Thread Gisle Vanem
This file lacks a header-guard. It's needed since it is included multiple times in crypto/des/des_opts.c (via des_enc.c). Patch: --- orig/crypto/des/spr.h 2002-03-04 18:01:16 +0100 +++ crypto/des/spr.h2007-03-19 18:32:56 +0100 @@ -56,6 +56,9 @@ * [including the GNU Public Li

[openssl.org #1475] TYPO in crypto/des/INSTALL

2007-02-06 Thread Jan Pechanec via RT
hi, there is a misspelled word "relevent" in crypto/des/INSTALL, should be "relevant". It's the last version 0.9.8d. There is also a missing fullstop in the same sentence. Jan. -- Jan Pechanec _

RE: [openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-05-09 Thread Frédéric Donnat
- Block Ciph regards, Fred -Original Message- From: Frédéric Donnat Sent: Thu 5/4/2006 5:04 PM To: openssl-dev@openssl.org; [EMAIL PROTECTED] Cc: openssl-dev@openssl.org Subject:RE: [openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

RE: [openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-05-04 Thread Frédéric Donnat
s Larsch via RT [mailto:[EMAIL PROTECTED] Sent: Thu 4/20/2006 3:44 PM To: [EMAIL PROTECTED] Cc: openssl-dev@openssl.org Subject:Re: [openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source Michael McDougall wrote: > diff -ur openssl-SNAP-20

Re: [openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-04-20 Thread Nils Larsch via RT
Michael McDougall wrote: > diff -ur openssl-SNAP-20060415/crypto/aes/aes_cfb.c > openssl-SNAP-20060415.changed/crypto/aes/aes_cfb.c > --- openssl-SNAP-20060415/crypto/aes/aes_cfb.c2004-12-30 > 06:00:14.0 -0500 > +++ openssl-SNAP-20060415.changed/crypto/aes/aes_cfb.c2006-

[openssl.org #1318] [PATCH] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-04-18 Thread Michael McDougall
(re-sending from since the first message seems to be dropped, maybe because I sent from an email account that wasn't subscribed.) Kyle Hamilaton wrote: > OpenSSL's site has already been notified to the US authorities as the > repository for the project. This means that US citizens may submit >

Re: [openssl.org #1318] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-04-16 Thread Kyle Hamilton
ROTECTED]> wrote: > > AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source file. > > To reproduce, run the following commands: > > echo I Love OpenSSL so much. > test.txt > > openssl enc -in test.txt -out test.encssl -K > 0123456789abcdef0123456789abcdef -

[openssl.org #1318] AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source

2006-04-16 Thread Michael McDougall via RT
AES-CFB1 and DES-CFB1 mode only encrypts 1/8th of the source file. To reproduce, run the following commands: echo I Love OpenSSL so much. > test.txt openssl enc -in test.txt -out test.encssl -K 0123456789abcdef0123456789abcdef -iv openssl enc -in test.encssl

Adding Random bytes in DES & Triple-DES?

2006-02-03 Thread Joe Gluck
Hey, If I don't feed some random bytes (as data to encrypt - not as IV) to the Triple-DES, is that a weakness? I think I should add at least 1 block size of random bytes (64 bit - 8 bytes), to make sure that one-repeated character padding will not be added in the first block. Thanks,

[openssl.org #1271] bug report: "openssl speed des -engine ..." does not work as expected

2006-01-20 Thread Manfred Gnirss via RT
Hello, An update of the documentation is fine for me, as this helps. Thank you very much. Kind regards, Manfred Gnirss TMCC Technical Sales Support, eMail: [EMAIL PROTECTED] __ OpenSSL Project ht

[openssl.org #1271] bug report: "openssl speed des -engine ..." does not work as expected

2006-01-19 Thread Stephen Henson via RT
[EMAIL PROTECTED] - Thu Jan 19 14:28:37 2006]: > Therefore I assume, that there is an error. I would appreciate if > a) either, the documentation would reflect the behavior of the code, > b) or, the speed would use the engine if requested. (This would be > solution, which I prefer). > Is there a

[openssl.org #1271] bug report: "openssl speed des -engine ..." does not work as expected

2006-01-19 Thread Manfred Gnirss via RT
the "man" pages for openssl, nor the openssl speed command itself [EMAIL PROTECTED]:~> time openssl speed xxx Error: bad option or value Available values: md2 mdc2 md4 md5 hmac sha1 rmd160 rc2-cbc bf-cbc des-cbc des-ede3 aes-12

[openssl.org #1271] AutoReply: bug report: "openssl speed des -engine ..." does not work as expected

2006-01-15 Thread Manfred Gnirss via RT
27; are in 1000s of bytes per second processed. type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes aes-128-cbc 22281.76k24300.42k 25061.63k25213.95k 25266.86k DES with hardware support: [EMAIL PROTECTED]:~> time openssl speed -evp des-cbc -engine ibmca engin

[openssl.org #1271] bug report: "openssl speed des -engine ..." does not work as expected

2006-01-14 Thread Stephen Henson via RT
[EMAIL PROTECTED] - Sat Jan 14 19:07:25 2006]: > Hello, > I intend to use >openssl speed des -engine ibmca > and >openssl speed aes -engine ibmca > to show the influence of hardware accelaration on a mainframe, by comparing > the results with >openssl speed

[openssl.org #1271] bug report: "openssl speed des -engine ..." does not work as expected

2006-01-14 Thread Manfred Gnirss via RT
Hello, I intend to use openssl speed des -engine ibmca and openssl speed aes -engine ibmca to show the influence of hardware accelaration on a mainframe, by comparing the results with openssl speed des and with openssl speed aes Unfortunately openssl speed des -engine ibmca and

[openssl.org #1201] [PATCH] Wrong DES cipher-type descriptions in enc man page

2005-09-13 Thread Mark James via RT
Hi, The man page for enc has two errors which together give the impression that OpenSSL does not support Triple DES in ECB mode. Description of des-ede should be "Two key triple DES EDE in ECB mode" rather than "Alias for des-ede". Description of des-ede3 should be "Th

Re: crypt/des/dx86-out.s fails on NetBSD

2005-06-20 Thread Andy Polyakov
2. See ./config script line 663 and below and speculate why do you think it doesn't recognize your system as ELF? Maybe shared libraries reside in /shlib? Hmm, file(1) doesn't follow symlinks by default. How about to use -L option? % file /usr/lib/libc.so.12.129 /usr/lib/libc.so.12.129: symb

Re: crypt/des/dx86-out.s fails on NetBSD

2005-06-15 Thread GOTOU Yuuzou
In message <[EMAIL PROTECTED]>, `Andy Polyakov <[EMAIL PROTECTED]>' wrote: > >>2. See ./config script line 663 and below and speculate why do you think > >>it doesn't recognize your system as ELF? Maybe shared libraries reside > >>in /shlib? > > > > Hmm, file(1) doesn't follow symlinks by defau

Re: crypt/des/dx86-out.s fails on NetBSD

2005-06-15 Thread Andy Polyakov
2. See ./config script line 663 and below and speculate why do you think it doesn't recognize your system as ELF? Maybe shared libraries reside in /shlib? Hmm, file(1) doesn't follow symlinks by default. How about to use -L option? % file /usr/lib/libc.so.12.129 /usr/lib/libc.so.12.129: s

Re: crypt/des/dx86-out.s fails on NetBSD

2005-06-15 Thread GOTOU Yuuzou
Hi, In message <[EMAIL PROTECTED]>, `Andy Polyakov <[EMAIL PROTECTED]>' wrote: > > Target: BSD-x86 > > Configured with: ... --target=i386--netbsdelf > > Apparently it fails to recognize your target as ELF. > > 1. Verify that you can build if you configure with './Configure > BSD-x8

Re: crypt/des/dx86-out.s fails on NetBSD

2005-06-15 Thread Andy Polyakov
cyrpt/des/dx86-out.s makes some errors in build process. For now, I can only attach a summary of make report. Please let me know if you need more information. > gcc -I.. -I../.. -I../../include -DOPENSSL_THREADS -pthread -D_THREAD_SAFE -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_END

crypt/des/dx86-out.s fails on NetBSD

2005-06-14 Thread GOTOU Yuuzou
Hi, cyrpt/des/dx86-out.s makes some errors in build process. For now, I can only attach a summary of make report. Please let me know if you need more information. -- gotoyuzo % make report ... making all in crypto/des... gcc -I.. -I../.. -I../../include -DOPENSSL_THREADS -pthread

Re: RE : using DES hardware with openssl

2004-07-02 Thread Michal Ludvig
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ioannis Liverezas told me that: > I 've studied the engine API and the zencod code and I began coding > using zencod as an example. > I 'm not sure if this is the way that things work, but if I 'm right, > each time the engine needs for example > to e

RE : RE : using DES hardware with openssl

2004-06-29 Thread Frédéric Donnat
annis Liverezas [mailto:[EMAIL PROTECTED] Envoyé : mardi 29 juin 2004 15:45 À : Frédéric Donnat; [EMAIL PROTECTED] Objet : RE : using DES hardware with openssl Thanx to all for your help. I 've studied the engine API and the zencod code and I began coding using zencod as an example. I '

RE : using DES hardware with openssl

2004-06-29 Thread Ioannis Liverezas
Thanx to all for your help. I 've studied the engine API and the zencod code and I began coding using zencod as an example. I 'm not sure if this is the way that things work, but if I 'm right, each time the engine needs for example to encrypt or decrypt a data buffer, it has to open and close th

RE : using DES hardware with openssl

2004-06-25 Thread Frédéric Donnat
D] De la part de Ioannis Liverezas Envoyé : vendredi 25 juin 2004 12:11 À : [EMAIL PROTECTED] Objet : using DES hardware with openssl Hi everybody. I want to use a DES ECB/CBC encryption/decryption hardware with openssl. I 've already built a linux driver that writes to and reads from the d

Re: using DES hardware with openssl

2004-06-25 Thread Dr. Stephen Henson
On Fri, Jun 25, 2004, Ioannis Liverezas wrote: > Hi everybody. > > I want to use a DES ECB/CBC encryption/decryption hardware with openssl. > I 've already built a linux driver that writes to and reads from the device, > and also provides device control, such as setting the k

using DES hardware with openssl

2004-06-25 Thread Ioannis Liverezas
Hi everybody. I want to use a DES ECB/CBC encryption/decryption hardware with openssl. I 've already built a linux driver that writes to and reads from the device, and also provides device control, such as setting the keys, ecb or cbc mode, initialization vector for cbc. The driver is teste

Re: [openssl.org #700] PKCS7 Des key parity

2004-05-05 Thread Robin Ehrlich via RT
> I've checked in a fix to OpenSSL 0.9.8-dev let me know of any problems. > > Steve. Thank you very much for the fix. I have tested the fix and the fix corrects the problem I reported very nicely. __ OpenSSL Project

[openssl.org #700] PKCS7 Des key parity

2004-03-28 Thread Stephen Henson via RT
[EMAIL PROTECTED] - Sat Sep 27 20:42:33 2003]: > I have an application using the OpenSSL S/MIME interface. When I >generate an encryptred message using DES, the DES key generated >does not have odd parity. The key is generated in >pk7_doit.c:PKCS7_dataInit by callin

Re: [CVS] OpenSSL: openssl/crypto/des/ cfb64ede.c cfb_enc.c openssl/crypto...

2004-01-29 Thread Richard Levitte - VMS Whacker
te: 27-Jan-2004 22:47:36 appro> Branch: HEAD Handle: 2004012721473500 appro> appro> Modified files: appro> openssl/crypto/des cfb64ede.c cfb_enc.c appro> openssl/crypto/evp e_des.c e_des3.c appro> appro> Log: appro> CFB DES syn

Multiple processes + engine DES/SHA

2003-10-31 Thread Kent Yoder
Hi, In stress testing the latest ibmca engine, I've come across errors when running multiple server applications (each statically linked to openssl) on the same box. The client machine is running openssl (software only), connecting to a server running w/ engine patch acceleratin

[openssl.org #715] openssl-0.9.7c's crypto/des/cfb_enc.c needs to include e_os.h

2003-10-01 Thread Richard Levitte via RT
That patch was good enough for me. Applied. Thanks. Ticket resolved. [guest - Wed Oct 1 21:20:29 2003]: > openssl 0.9.7c fails to build under SunOS 4.1.4 because memmove is > missing. This is addressed by a define in e_os.h but cfb_enc.c does > not manage to include it. > > The appended pat

[openssl.org #715] openssl-0.9.7c's crypto/des/cfb_enc.c needs to include e_os.h

2003-10-01 Thread via RT
openssl 0.9.7c fails to build under SunOS 4.1.4 because memmove is missing. This is addressed by a define in e_os.h but cfb_enc.c does not manage to include it. The appended patch fixes the problem but probably isn't the "right" way. Craig

[openssl.org #700] PKCS7 Des key parity

2003-09-27 Thread Robin Ehrlich via RT
I have an application using the OpenSSL S/MIME interface. When I generate an encryptred message using DES, the DES key generated does not have odd parity. The key is generated in pk7_doit.c:PKCS7_dataInit by calling RAND_bytes(). In testing interoperability with the NIST S/MIME test center

Re: PKCS7 Des key parity

2003-09-26 Thread Dr. Stephen Henson
On Fri, Sep 26, 2003, Robin Ehrlich wrote: > I have an application using the OpenSSL S/MIME interface. When I generate an > encryptred message using DES, the DES key generated does not have odd > parity. The key is generated in pk7_doit.c:PKCS7_dataInit by calling > RAND_bytes(). >

PKCS7 Des key parity

2003-09-26 Thread Robin Ehrlich
I have an application using the OpenSSL S/MIME interface. When I generate an encryptred message using DES, the DES key generated does not have odd parity.  The key is generated in pk7_doit.c:PKCS7_dataInit by calling RAND_bytes().   In testing interoperability with the NIST S/MIME test

How to Add new Mode to DES and AES

2003-07-24 Thread Ng Siak Hooi
/progs.pl ./crypto/evp/e_des.c ./crypto/evp/evp.h ./crypto/objects/obj_mac.num ./crypto/objects/objects.txt ./crypto/evp/evp_enc.c ./crypto/des/Makefile and added ./crypto/des/ectr_enc.c file (my implementation of counter mode, modified version) and it works. Now I just downloaded openssl-0.9.7b, and I

DES/CBC question

2003-03-13 Thread Ken Ho
Hi,   I am developing a cipher encryption tool in c++ using your openssl-crypto library.   The result encrypted string is passed to another system for decryption and vice versa, in which the cipher encryption tool was developed in Java, cipher algorithm is DES, mode is CBC, PKCS 5 padding

[openssl.org #524] DES/CBC question

2003-03-01 Thread [EMAIL PROTECTED] via RT
ry. The result encrypted string is passed to another system for decryption and vice versa, in which the cipher encryption tool was developed in Java, cipher algorithm is DES, mode is CBC, PKCS 5 padding. I tried both functions DES_ncbc_encrypt() and DES_cbc_encrypt() in lib crypto/des for encrypt

[openssl.org #523] Question about DES/CBC Cipher

2003-02-28 Thread via RT
library. The result encrypted string is passed to another system for decryption and vice versa, in which the cipher encryption tool was developed in Java, cipher algorithm is DES, mode is CBC, PKCS 5 padding. I tried both functions DES_ncbc_encrypt() and DES_cbc_encrypt() in lib crypto/des for

DES CBC Initial Vector Parameter Problem

2003-02-17 Thread Ken Ho
Hi,   I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear text, by using CBC mode with IV preset to 8 bytes of 0x00. When the encrypted text was decrypted back to plain text, the first 8 bytes are bad text.  I believe there are something to do with the IV parameter, or I cal

[openssl.org #504] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread Richard Levitte via RT
In other words, this is a user error. This ticket is now resolved. [[EMAIL PROTECTED] - Sat Feb 15 01:53:26 2003]: > In message <[EMAIL PROTECTED]> on Fri, 14 Feb > 2003 21:18:45 +0100 (MET), " via RT" <[EMAIL PROTECTED]> said: > > rt> > rt> Hi, > rt> > rt> I'm using the latest (0.9.7) Crypto

Re: [openssl.org #504] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread Richard Levitte - VMS Whacker via RT
In message <[EMAIL PROTECTED]> on Fri, 14 Feb 2003 21:18:45 +0100 (MET), " via RT" <[EMAIL PROTECTED]> said: rt> rt> Hi, rt> rt> I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear rt> text, by using CBC mode with IV preset to 8 bytes of 0x00. rt> When the encrypted text was

Re: [openssl.org #504] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread Richard Levitte - VMS Whacker
In message <[EMAIL PROTECTED]> on Fri, 14 Feb 2003 21:18:45 +0100 (MET), " via RT" <[EMAIL PROTECTED]> said: rt> rt> Hi, rt> rt> I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear rt> text, by using CBC mode with IV preset to 8 bytes of 0x00. rt> When the encrypted text was

[openssl.org #506] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread via RT
Hi, I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear text, by using CBC mode with IV preset to 8 bytes of 0x00. When the encrypted text was decrypted back to plain text, the first 8 bytes are bad text. I believe there are something to do with the IV parameter, or I call t

[openssl.org #505] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread via RT
Hi, I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear text, by using CBC mode with IV preset to 8 bytes of 0x00. When the encrypted text was decrypted back to plain text, the first 8 bytes are bad text. I believe there are something to do with the IV parameter, or I call t

[openssl.org #504] DES CBC Initial Vector Parameter Problem

2003-02-14 Thread via RT
Hi, I'm using the latest (0.9.7) Crypto lib to encrypt a string of clear text, by using CBC mode with IV preset to 8 bytes of 0x00. When the encrypted text was decrypted back to plain text, the first 8 bytes are bad text. I believe there are something to do with the IV parameter, or I call t

Re: [CVS] OpenSSL: openssl/crypto/des des.h des_old.h

2002-12-11 Thread Goetz Babin-Ebell
PROTECTED] ^^ Is that really a good idea ? Module: openssl Date: 11-Dec-2002 07:59:18 Branch: HEAD Handle: 2002121106591600 Modified files: openssl/crypto/des des.h des_old.h Log: Since HEADER_DES_H

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Richard Levitte - VMS Whacker
In message <20021210133035.GC31780@folly> on Tue, 10 Dec 2002 14:30:35 +0100, Markus Friedl <[EMAIL PROTECTED]> said: markus> yes, i think that des_old should use the same protecting macros as markus> the old libdes/openssl, and the DES_ file something completely markus> different. I'll commit t

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Markus Friedl
On Tue, Dec 10, 2002 at 01:38:03PM +0100, Richard Levitte - VMS Whacker wrote: > I think the best way to solve this is to change the name of the > protecting macro in OpenSSL 0.9.7's des.h, and give it's des_old.h the > same protecting macro name as older versions use (and presumably > libdes as we

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Markus Friedl
On Tue, Dec 10, 2002 at 01:58:28PM +0100, Richard Levitte - VMS Whacker wrote: > In message <20021210085038.GA166@folly> on Tue, 10 Dec 2002 09:50:38 +0100, Markus >Friedl <[EMAIL PROTECTED]> said: > > markus> > It's including all those headers because it used to, and people will > markus> > comp

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Richard Levitte - VMS Whacker
to test, if this would be mmokrejs> solution to get rid of des originating from openssl. ;) I think that's a bad solution, because then you're explicitely asking for a mix of the two des.h, with the consequences that has. mmokrejs> If you plan to rename des.h to des_old.h, fine for

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Richard Levitte - VMS Whacker
In message <20021210085038.GA166@folly> on Tue, 10 Dec 2002 09:50:38 +0100, Markus Friedl <[EMAIL PROTECTED]> said: markus> > It's including all those headers because it used to, and people will markus> > complain if they don't get all those algorithms just by including markus> > evp.h. markus>

Re: Building openssh-3.5p1 with new DES functions

2002-12-10 Thread Richard Levitte - VMS Whacker
In message <20021210110227.GA10920@folly> on Tue, 10 Dec 2002 12:02:27 +0100, Markus Friedl <[EMAIL PROTECTED]> said: markus> hm, i think this happens if kerberos is included before evp.h Interesting. That would mean one of two things: 1. Kerberos (was that with the KTH-KRB and Heimdal impleme

add new mode to des encryption

2002-12-10 Thread Ng Siak Hooi
Hi, I tried to add one more mode (my version of counter mode) to des part, and I faced compilation problem. I am working on openssl-0.9.6h, RedHat 8 using kernel 2.4.20, gcc 3.2.1 on an Intel Pentium III desktop. Here are what I have done: 1 added function des_ectr_encrypt() to file crypto

  1   2   3   >