Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Abdul Anshad
I use the src rpm downloaded from http://koji.fedoraproject.org/koji/buildinfo?buildID=551423 . Inquired about this issue with one of the package maintainers from koji.fedoraproject.org and following was his comment. "Apparently the Known answer test for RSA X9.31 signatures does not match an

RE: [SPAM?] Re: ECDSA Certificate

2014-08-12 Thread Dave Thompson
> and how do I generate an ECDSA certificate? To generate a selfsigned ECDSA cert the same ways you do RSA, except use EC instead of RSA. - use req -new with EC key or -newkey with EC parms and -x509 to generate selfsigned cert directly. - use req -new with key or -newkey to generate CSR, then

SSL_ERROR_WANT_READ on SSL_connect()

2014-08-12 Thread Shreyas Heranjal
Hi All, I have a DTLS implementation where I am trying to connect to a server using SSL_connect(). I am checking for the error codes using the SSL_get_error. My underlying BIO is non-blocking. Is there a way to figure out if the remote peer exists or not? As of now, I get SSL_ERROR_WANT_READ for

RE: Forcing client to send Certificate record

2014-08-12 Thread Salz, Rich
> There is no need for an API for a non-interoperable feature that would > violate the TLS protocol: > > https://tools.ietf.org/html/rfc5246#section-7.4.6 Perhaps more usefully, see http://datatracker.ietf.org/doc/draft-thomson-tls-care/ This will almost definitely be part of TLS 1.3. Note

pkcs12 password for openssl

2014-08-12 Thread Yichun Ding
Hi, I would like to know if I can always pass the export password of the .p12 client certificate to openssl without worrying about the pass phrase that needs to be set on generating the .p12 file. I looked function int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, STAC

Re: Forcing client to send Certificate record

2014-08-12 Thread Viktor Dukhovni
[ Redirecting to openssl-users ] On Wed, Aug 13, 2014 at 01:05:24AM +0400, Fedor Indutny wrote: > I just discovered that there is no way to force OpenSSL SSL client to send > Certificate record if server hasn't sent CertificateRequest. That would be a TLS protocol violation. > Would a patch th

Re: How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread jtanis
In message , Tapas Behera avows: %--- Begin Cite ---% > > How to Cross Compile OpenSSL for arm-none-eabi arch? > %--- End Cite ---% Add the following to your config command: --cross-compile-prefix=$(CROSS_COMPILE_PREFIX) where CROSS_COMPILE_PREFIX looks something like:

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Dr. Stephen Henson
On Mon, Aug 11, 2014, Abdul Anshad wrote: > Hello All, > > I have a set up which runs Apache http-2.4.10 and Openssl-1.0.1i, > when I try to start the http server with FIPS mode i get the > following error. > > [Mon Aug 11 14:39:24.407781 2014] [suexec:notice] [pid 380] AH01232: > suEXEC mechani

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Dr. Stephen Henson
On Tue, Aug 12, 2014, Thulasi Goriparthi wrote: > $ openssl genrsa 2048 > key.pem > $ openssl req -new -x509 -key key.pem -out cert.pem -sha256 > You also need to set the environment variable OPENSSL_FIPS=1 so the operations are performed in FIPS mode. Steve. -- Dr Stephen N. Henson. OpenSSL pr

RE: How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread Porter, Andrew
In general for cross-compiling you run ./Configure with various options, perhaps after setting up some environment variables like CC to point to your development tools. For example, to build Linux 32-bit on my 64-bit build machine I start with: ./Configure linux-elf -m32 plus --openssldir= and

How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread Tapas Behera
How to Cross Compile OpenSSL for arm-none-eabi arch?

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Jayadev Kumar
check 'ldd mod_ssl.so' for proper linkage. -Jayadev. On Tue, Aug 12, 2014 at 7:01 PM, Abdul Anshad wrote: > Thank you for the response. > > I already have a SHA-256 self signed certificate with a bit size 2048 but > still ended up with the same error. > > I used the following command to create

Re: multilevel CA wont load private key -help

2014-08-12 Thread Viktor Dukhovni
On Tue, Aug 12, 2014 at 10:25:36AM +0100, lux-integ wrote: > openssl req \ > -new \ > -config openssl.cnf \ > -out level1/LEVELCAReq.pem \ > -keyout level1/private/LEVEL1CAKey.pem \ Where is the key stored? > openssl ca \ > -gencrl \ > -crldays 60 \ > -config openssl.cnf \ > -keyf

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Abdul Anshad
Thank you for the response. I already have a SHA-256 self signed certificate with a bit size 2048 but still ended up with the same error. I used the following command to create the self signed certificate. $ openssl req -x509 -sha256 -days 365 -newkey rsa:2048 -keyout /etc/pki/tls/private/lo

Re: multilevel CA wont load private key -help

2014-08-12 Thread Jayadev Kumar
Looks like CA.sh doesn't create crlnumber file in demoCA and openssl ca crl complains about it. With CA.pl This steps worked. mkdir RootCA cp ../openssl-1.0.1h/apps/CA.pl . chmod +x CA.pl ./CA.pl -newca (Just Enter, will create RootCA) ./CA.pl -newreq ./CA.pl -signCA

Re: multilevel CA wont load private key -help

2014-08-12 Thread Jayadev Kumar
./CA.sh -newca (Script on a fresh directory creates demoCA directory with RootCA and Privatekey) ./CA.sh -newreq (creates a new cert request, with newcert.pem and newkey.pem) ./CA.sh -signCA (Sign the new req as CA, with RootCA). You can find the CA.sh in 'openssl-1.0.1h/apps' directory.

Re: client side session cache with SNI, and tlsext_ticket_key_cb

2014-08-12 Thread DEXTER
On Mon, Aug 11, 2014 at 6:00 PM, Viktor Dukhovni wrote: > No, generally you re-use previously generated keys, otherwise you > lose much of the advantage of "stateless resumption". However, > along with each keyset you associated some suitable TTL, and you > stop signing new sessions with a keyset

multilevel CA wont load private key -help

2014-08-12 Thread lux-integ
Greetings I am trying to learn how to set up a small multilevel CA. Im using the openssl-1.0.1h. And the computer runs linux. I did the following: --A- generate rootCA openssl req \ -new \ -config openssl.cnf_ \ -outROOTCAReq.pem \ -keyout ROOTCAKey.pem \ -B- generated a crl )r root