PKCS #12

2002-04-22 Thread Raphael Amorim
Title: PKCS #12 Dear OpenSSL Developers, I need to generate PKCS#12 private key files from CryptoApi Key Containers. I'd tried to use Xenroll, OpenSSL and the RSA's PKCS#12 specification, but the files I'm generating have not been recognized as valid pkcs#12 files by anot

Re: PKCS #12

2002-04-23 Thread Lutz Jaenicke
On Mon, Apr 22, 2002 at 05:24:04PM -0300, Raphael Amorim wrote: > I need to generate PKCS#12 private key files from CryptoApi Key > Containers. I'd tried to use Xenroll, OpenSSL and the RSA's PKCS#12 > specification, but the files I'm generating have not been recognized

Re: PKCS #12

2002-04-23 Thread raphael amorim
gt;On Mon, Apr 22, 2002 at 05:24:04PM -0300, Raphael Amorim > wrote: >> I need to generate PKCS#12 private key files from > CryptoApi Key >> Containers. I'd tried to use Xenroll, OpenSSL and the > RSA's PKCS#12 >> specification, but the files I'm generating

Re: PKCS #12

2002-04-23 Thread Lutz Jaenicke
On Tue, Apr 23, 2002 at 02:05:15PM -0500, raphael amorim wrote: > They're using OpenSSL. > > By the way, you know how to use the pkcs12 command passing > the container name(key pair holder in CryptoAPI) as -name > parameter to obtain a .p12 file? ??? I don't know CryptoAPI. The -name option i

PKCS@12 Support

1999-03-26 Thread madwolf
I've read one of the primary objective is to include support for the PKCS#12. I've had some contact with Dr. Stephen Henson about his software: - Massimiliano Pala wrote: > > Hi! > > I have a question re

PKCS#12 integration.

1999-04-01 Thread Dr Stephen Henson
Further to my announcement a few days ago I've now completed most of the PKCS#12 integration into OpenSSL. The latest snapshots include a new 'pkcs12' application linked into openssl and all my PKCS#12 library code. Usage is: openssl pkcs12 [pkcs12 options] where [pkcs12 options

Is PKCS#12 secure?

2000-09-26 Thread zhu qun-ying
I am actually quite new to the Crypto world, just about 2 months. While reading Peter Gutmann's article on breaking PKCS#12 formatted file, I am wondering is the implementation of OpenSSL's PKCS#12 routines subject to the same attack. What's the most secure format could be used u

PKCS#12 program 0.54.

1999-03-22 Thread Dr Stephen Henson
I've just uploaded version 0.54 of my PKCS#12 program for OpenSSL and SSLeay. It compiles under OpenSSL 0.9.1c, 0.9.2 and SSLeay 0.9.X. You can download it at: http://www.drh-consultancy.demon.co.uk/pkcs12-054-tar-gz.bin This version fixes a typo in 0.53 which meant the -keyex and -k

Re: Is PKCS#12 secure?

2000-09-27 Thread Dr S N Henson
zhu qun-ying wrote: > > I am actually quite new to the Crypto world, just about 2 months. While reading > Peter Gutmann's article on breaking PKCS#12 formatted file, I am wondering is > the implementation of OpenSSL's PKCS#12 routines subject to the same attack. > What

Re: Is PKCS#12 secure?

2000-09-27 Thread zhu qun-ying
> I supplied some of the info for that article and I wrote PKCS#12 for > OpenSSL so I'd say yes OpenSSL PKCS#12 implementation is reasonably > secure with the usual precautions, i.e. not picking obvious or guessable > passwords. > > OpenSSLs implementation uses high mac a

Re: Is PKCS#12 secure?

2000-09-27 Thread Dr S N Henson
zhu qun-ying wrote: > > > Thank you for your clearence. There are still some information that I want to > know. Is the default setting to PKCS12_create() will be sufficient? Or do I need > to increase the mac_iter and nid_cert ciper to 3DES-CBC? > They should be sufficient. Certificates are us

Re: Is PKCS#12 secure?

2000-09-27 Thread zhu qun-ying
> They should be sufficient. Certificates are usually public knowledge > anyway so using weak or no encryption on them is harmless but if you > want to use strong encryption on it you can, however some of the older > export browsers wont import 3DES encrypted certificates. > > Steve. My concern i

Re: Is PKCS#12 secure?

2000-09-27 Thread Dr S N Henson
finding out the private key scret key. > What's the effect on increasing mac_iter, does it worse the iteration? > The larger the value the more work is involved in checking the mac value, and the harder it is for an attacker to run through large quantities of candidate passwords on the

PKCS#12 program v 0.53a

1999-01-01 Thread Dr Stephen Henson
I've just uploaded v0.53a of my PKCS#12 program. It should compile under the latest OpenSSL tree. It probably will *not* compile under OpenSSL 0.9.1X. It will compile under SSLeay still. It's still under test and OpenSSL may change to break it so consider it "experimental".

PKCS#12 program v 0.53a

1999-01-02 Thread Dr Stephen Henson
Hmm lets try this again... I've just uploaded v0.53a of my PKCS#12 program. It should compile under the latest OpenSSL tree. It probably will *not* compile under OpenSSL 0.9.1X. It will compile under SSLeay still. It's still under test and OpenSSL may change to break it so c

IMPORTANT NOTICE: PKCS#12 integration.

1999-03-27 Thread Dr Stephen Henson
Note to any developers using the CVS snapshots. I am currently engaged in the integration of my PKCS#12 program into OpenSSL. This will be a gradual process over several days (weeks?) while I consider where the stuff should go, which compatability stuff to remove etc etc. During this time it

pkcs#12 creation with secret bags

2003-06-23 Thread Claude CONVERT
Title: Message Hi all I try to create a pkcs#12 with several secret bags. I haven't found any sample which indicates how to do this and especially how to create a secret bag. I try the following code, but it doesn't work  :    PKCS12_SAFEBAG *safebag; ASN1_OCTET_STRING *os;

Key/Cert to PKCS#12 file

2000-04-07 Thread Hellan,Kim KHE
I have a key file and a cert file with one certificate (signed by a CA). All I want to do is "combine" these two files in a PKCS#12 file. Does anyone know how to perform this relatively "simple" task (which functions must be called)? I have looked in the pkcs12.c file, but i

Re: PKCS#12 program v 0.53a

1999-01-02 Thread Ben Laurie
Dr Stephen Henson wrote: > > Hmm lets try this again... What was wrong with the first attempt? Cheers, Ben. -- "My grandfather once told me that there are two kinds of people: those who work and those who take the credit. He told me to try to be in the first group; there was less competition

Re: pkcs#12 creation with secret bags

2003-06-24 Thread Dr. Stephen Henson
On Mon, Jun 23, 2003, Claude CONVERT wrote: > Hi all > I try to create a pkcs#12 with several secret bags. > I haven't found any sample which indicates how to do this and especially how > to create a secret bag. > I try the following code, but it doesn't work : >

RE : pkcs#12 creation with secret bags

2003-06-27 Thread Claude CONVERT
CONVERT, > -Message d'origine- > De : Dr. Stephen Henson [mailto:[EMAIL PROTECTED] > Envoyé : mardi 24 juin 2003 23:26 > À : [EMAIL PROTECTED] > Objet : Re: pkcs#12 creation with secret bags > > > On Mon, Jun 23, 2003, Claude CONVERT wrote: > > > Hi all

Re: Compatibility of client PKCS#12 files

2008-07-09 Thread Joe Orton
On Wed, Jul 09, 2008 at 04:14:28PM +0100, Joe Orton wrote: > On Tue, Jul 08, 2008 at 12:03:15PM +1000, Paul Cuthbert wrote: > > Subversion 1.5.0 (and probably earlier) is unable to handle client > > PKCS#12 files that are generated using the Bouncy Castle cryptographic &g

Re: Compatibility of client PKCS#12 files

2008-07-09 Thread Joe Orton
On Tue, Jul 08, 2008 at 12:03:15PM +1000, Paul Cuthbert wrote: > Subversion 1.5.0 (and probably earlier) is unable to handle client > PKCS#12 files that are generated using the Bouncy Castle cryptographic > toolkit (Java version 139, see > http://www.bouncycastle.org/latest_r

Re: Compatibility of client PKCS#12 files

2008-07-11 Thread Paul Cuthbert
+1000, Paul Cuthbert wrote: Subversion 1.5.0 (and probably earlier) is unable to handle client PKCS#12 files that are generated using the Bouncy Castle cryptographic toolkit (Java version 139, see http://www.bouncycastle.org/latest_releases.html). These P12 files can be handled fine by Microso

Re: Key/Cert to PKCS#12 file

2000-04-07 Thread Dr Stephen Henson
Hellan,Kim KHE wrote: > > I have a key file and a cert file with one certificate (signed by a CA). > All I want to do is "combine" these two files in a PKCS#12 file. > Does anyone know how to perform this relatively "simple" task (which > functions must be

Using X509 cert from a PKCS#12 certificate.

1999-09-14 Thread James Darwin
rtificates and all give the same error, and yet all appear find when using the openssl tool. Even a PEM certificate which works fine, when converted to pkcs#12 format fails. I am using version Openssl 0.9.3a, and the same thing happens on NT, Solaris and OSF1. Any ideas would be greatly appreciate

Re: Using X509 cert from a PKCS#12 certificate.

1999-09-15 Thread Dr Stephen Henson
James Darwin wrote: > > Hi, > > I am having trouble using the "X509* ssl_public_cert" created from the code > at the end of this message. This code runs fine without error, but when I > call: > [stuff deleted] >if (!PKCS12_parse(p12, pass_key, &pkey, &cert, NULL)) { >dce_sv

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-28 Thread David Woodhouse
On Wed, 2016-08-24 at 18:55 +0100, Dr. Stephen Henson wrote: > commit 647ac8d3d7143e3721d55e1f57730b6f26e72fc9 > > OpenSSL versions before 1.1.0 didn't convert non-ASCII > UTF8 PKCS#12 passwords to Unicode correctly. > > To correctly decrypt older files, if MAC verifi

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-29 Thread Andy Polyakov
efore 1.1.0 didn't convert non-ASCII >> UTF8 PKCS#12 passwords to Unicode correctly. >> >> To correctly decrypt older files, if MAC verification fails >> with the supplied password attempt to use the broken format >> which is compatible with earlier versions of OpenS

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-29 Thread David Woodhouse
gt; > > > > > commit 647ac8d3d7143e3721d55e1f57730b6f26e72fc9 > > > > > > OpenSSL versions before 1.1.0 didn't convert non-ASCII > > > UTF8 PKCS#12 passwords to Unicode correctly. > > > > > > To correctly decrypt older files, if MA

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-29 Thread David Woodhouse
On Mon, 2016-08-29 at 18:40 +0100, David Woodhouse wrote: > > So... let's have a password 'nałve', in a ISO8859-2 environment where > that is represented by the bytes 6e 61 b3 76 65. > > First I should try the correct version according to the spec: >  006e 0061 0142 0076 0065 > > Then we try the

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-29 Thread Andy Polyakov
> So let's try a better example. The password is "ĂŻ" (U+0102 U+017b), > and the locale (not that it *should* matter) is ISO8859-2. When it comes to locale in *this* case you should rather wonder what does your terminal emulator program do and how does it interact with your shell. Because these tw

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-30 Thread David Woodhouse
about > how string is composed by *somebody else*. That's why I said that "we > assume that you don't change locale when you upgrade OpenSSL". I'm talking about how other libraries should attempt to read the PKCS#12 files created by OpenSSL. In my code I have the

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-30 Thread Andy Polyakov
had. Or the whole set of "we treated local > X as if it were UTF-8" bugs that the new code has. Yes. > So for other applications to try to read OpenSSL's PKCs#12 files, what > we need to do is first convert the sane Unicode rendition of the > password into the native

Re: [openssl-dev] [PATCH] Support broken PKCS#12 key generation.

2016-08-30 Thread David Woodhouse
On Tue, 2016-08-30 at 12:38 +0200, Andy Polyakov wrote: > > So for other applications to try to read OpenSSL's PKCs#12 files, what > > we need to do is first convert the sane Unicode rendition of the > > password into the native locale charset (e.g. Windows-1252), then take

[openssl-dev] internationalized passwords for pkcs#8, pkcs#12 files

2017-04-05 Thread Nikos Mavrogiannopoulos
Hi, I would like to eliminate the ambiguities concerning internationalized passwords in PKCS#8 and PKCS#12 files. I plan to propose an update to the PKCS#5, PKCS#12 documents mandating UTF-8 and requiring the RFC7613 OpaqueString profile. I'm interested on openssl developers opinion on the

[openssl.org #569] OpenSSL reduced size - suppress PKCS #12 code generation

2014-06-28 Thread Rich Salz via RT
Not a project goal, but still neat work. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

Сonnect to IIS 5.0 with Personal Information Exchange - PKCS#12 (.PFX) certificate

2000-04-17 Thread Andriy Kornatskyy
I am trying to connect to IIS 5.0 with Personal Information Exchange - PKCS#12 (.PFX) certificate. The server returned message 'The client certificate is untrusted or corrupt'. IIS 5.0 server is tuned as require user certificate. Certificate I passed to the server is registered ther

[openssl.org #1496] PKCS#12 export with empty password produces incorrect encoding of MacData

2007-03-01 Thread via RT
openssl pkcs12 -export -in _.pem -nodes -out _.p12 generates PFX DER data with MacData in which empty password is used incorrectly, violating following quote from Chapter B, section B.2, item 3 of PKCS#12 standard [1]: "Note that if the password is the empty string, then so

[openssl-dev] [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-06-24 Thread Hubert Kario via RT
I can't list PKCS#12 file information when it is encrypted with AES-256-CBC with PKCS#5 v2.0 PBE openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt -subj /CN=localhost -nodes -batch openssl pkcs12 -export -out bundle.p12 -in localhost.key -nocerts -passout pass: -name s

[openssl-dev] [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-07-19 Thread Stephen Henson via RT
Thanks for the report, fixed now in master and 1.0.2. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4588 Please log in as guest with password guest if

[openssl.org #1497] Issue: PKCS#12 export with empty password produces incorrect encoding of MacData in PFX object

2007-03-02 Thread Andrey Jivsov via RT
openssl pkcs12 -export -in _.pem -nodes -out _.p12 generates PFX DER data with MacData in which empty password is used incorrectly, violating following quote from Chapter B, section B.2, item 3 of PKCS#12 standard [1]: "Note that if the password is the empty string, then so is P."

[openssl.org #1497] Issue: PKCS#12 export with empty password produces incorrect encoding of MacData in PFX object

2007-03-02 Thread Stephen Henson via RT
> [EMAIL PROTECTED] - Fri Mar 02 09:58:13 2007]: > > openssl pkcs12 -export -in _.pem -nodes -out _.p12 > > generates PFX DER data with MacData in which empty password is used > incorrectly, violating following quote from Chapter B, section B.2, item > 3 of PKCS#12 sta

Re: [openssl.org #1497] Issue: PKCS#12 export with empty password produces incorrect encoding of MacData in PFX object

2007-03-02 Thread Andrey Jivsov
Stephen Henson via RT wrote: [EMAIL PROTECTED] - Fri Mar 02 09:58:13 2007]: openssl pkcs12 -export -in _.pem -nodes -out _.p12 generates PFX DER data with MacData in which empty password is used incorrectly, violating following quote from Chapter B, section B.2, item 3 of PKCS#12

[openssl-dev] [openssl.org #1497] Issue: PKCS#12 export with empty password produces incorrect encoding of MacData in PFX object

2016-02-01 Thread Rich Salz via RT
This is reported against 0.9.8; please open a new ticket if still a problem with current releases. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] pkcs12 settings, Was: Re: [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-07-19 Thread Hubert Kario
On Tuesday, 19 July 2016 12:07:33 CEST Stephen Henson via RT wrote: > Thanks for the report, fixed now in master and 1.0.2. > > Steve. Thanks! I have few questions now though: I've noticed that 1.0.2 uses sha1 hmac for the PRF while the master uses sha256 is there a way to set this? also, is

Re: [openssl-dev] pkcs12 settings, Was: Re: [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-07-19 Thread Dr. Stephen Henson
On Tue, Jul 19, 2016, Hubert Kario wrote: > I have few questions now though: > > I've noticed that 1.0.2 uses sha1 hmac for the PRF while the master > uses sha256 > > is there a way to set this? > Not currently no (at least not from the command line, maybe by delving into the pkcs12 internals)

Re: [openssl-dev] pkcs12 settings, Was: Re: [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-07-20 Thread Hubert Kario
onding to the MAC though. something like this? https://github.com/openssl/openssl/pull/1334 the small problem is that this prints: MAC algorithm: sha1, I'm not sure how correct is that (haven't read the PKCS#12 standard) -- Regards, Hubert Kario Senior Quality Engineer, QE BaseOS Se