Re: Cipher not picked/enabled in a TLS session

2010-03-29 Thread Gregory BELLIER
Hi all ! I managed to make what I wanted to work. I would like to thank you for all you've done. You've been terrific. Thanks, Gregory. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Cipher not picked/enabled in a TLS session

2010-03-18 Thread Gregory BELLIER
Nelson B Bolyard wrote: Sounds like you're not running your build. Are you perhaps still getting the 'system" libraries in your tests, rather than your own built libs? I made some progress today. Damn Nelson, you were right. I got to say I don't know where else it could have been from but

Re: Cipher not picked/enabled in a TLS session

2010-03-18 Thread Gregory BELLIER
Wan-Teh Chang wrote: Without looking at your code, I'm afraid that we won't be able to help much. Yes, I know it's difficult to guess what I may have done. That's why I provide in attachment a patch supposed to provide a "new" cipher named MYC as MYCipher. It is actually SEED. You probab

Re: Cipher not picked/enabled in a TLS session

2010-03-17 Thread Gregory BELLIER
Jean-Marc Desperrier a écrit : Wan-Teh Chang wrote: You can use the NSS command-line tool 'ssltap' to inspect the SSL handshake messages:http://www.mozilla.org/projects/security/pki/nss/tools/ssltap.html It's significantly easier to do it with Wireshark. Is it easier than the selfserv and

Re: Cipher not picked/enabled in a TLS session

2010-03-17 Thread Gregory BELLIER
Sorry, my two emails are one after the other. As I said in the previous one, I copied the SEED. Basically, I did grep -i seed $(find mozilla -type f -print) -l followed by a grep -irn 0096 * I copied all the occurences of SEED the cipher and not the ones about *a* seed and created a new cipher

Re: Cipher not picked/enabled in a TLS session

2010-03-17 Thread Gregory BELLIER
Robert, I did what you suggested. You were right, there is a deeper problem because selfserv doesn't recognize my cipher if I use the option "-c :0200". I'm told an unknown cipher has been requested. But if I use 0084 (which is camellia) it works fine. I used grep to find every occurrences of

Re: Cipher not picked/enabled in a TLS session

2010-03-15 Thread Gregory BELLIER
Robert Relyea a écrit : In sslsock.c, I print ssl3_CipherPrefSetDefault and I can see that my cipher is not enabled. Do you have any hints/tests which could help me ? Some tests I could do ? What am I missing ? OK, this is your overall problem. If NSS does not have a cipher enabled, it

Re: Cipher not picked/enabled in a TLS session

2010-03-15 Thread Gregory BELLIER
Robert Relyea wrote: this is your overall problem. If NSS does not have a cipher enabled, it will neither advertise it nor select it, no matter where it is on the list. There are two possible reasons for this: 1) New Ciphers are not enabled by default, you need to explicitly turn on that cip

Cipher not picked/enabled in a TLS session

2010-03-11 Thread Gregory BELLIER
Hello all ! I added a cipher in NSS and OpenSSL. I would like to create a TLS session between those two. In OpenSSL, the tests suite works fine (make tests) and I can get a working TLS tunnel with my cipher. I guess my problem is in NSS, that's why I ask for your help. At this time, the ciph

Re: TLS ciphers order

2010-03-09 Thread Gregory BELLIER
Wan-Teh Chang wrote: On 05/03/10 13:04, Gregory BELLIER wrote: Hi ! Is there a place somewhere in the code of thunderbird 2 where there is a cipher order for TLS negociation ? Thanks in advance for your time. Hi, The order of TLS/SSL cipher suites in NSS is hardcoded. It is

Re: TLS ciphers order

2010-03-08 Thread Gregory BELLIER
Ludovic Hirlimann a écrit : On 05/03/10 13:04, Gregory BELLIER wrote: Hi ! Is there a place somewhere in the code of thunderbird 2 where there is a cipher order for TLS negociation ? Thanks in advance for your time. We use NSS for that - so the answer is probably in the code of NNS

Re: S/MIME in Thunderbird

2010-03-01 Thread Gregory BELLIER
Konstantin Andreev a écrit : On Wen, 03 Jun 2009, Nelson B Bolyard wrote: Finally, I will add that (IINM) Thunderbird 3 has support for AES. I don't know about the SHA1 vs SHA2 issue. No, it hasn't, TB hardcodes SHA1. No variations: ( begin cite ) nsresult nsMsgComposeSecure::M

Re: how is it possible to choose a cipher for SMIME ?

2009-12-11 Thread Gregory BELLIER
Hello Konstantin, Konstantin Andreev a écrit : It could be a great enhancement if Thunderbird could allow to user-override the automated cipher selection. That's exactly what I wanted to do. In this case, it's just how I thought it has to be done : hack the code to override the cipher selecti

Re: how is it possible to choose a cipher for SMIME ?

2009-12-11 Thread Gregory BELLIER
Nelson B Bolyard a écrit : On 2009-12-10 02:12 PST, Gregory BELLIER wrote: Hi everyone ! I noticed the 3DES cipher is used to encrypt emails with S/MIME and I would like to use another one. According to the version of S/MIME standards that are implemented in Mozilla mail clients

how is it possible to choose a cipher for SMIME ?

2009-12-10 Thread Gregory BELLIER
Hi everyone ! I noticed the 3DES cipher is used to encrypt emails with S/MIME and I would like to use another one. This is a comment I've seen in secmime.c : /* * XXX Should have a #define somewhere which specifies default * strong cipher. (Or better, a way to configure, which would

Re: Question about memcpy in operation mode for NSS

2009-12-04 Thread Gregory BELLIER
Wan-Teh Chang a e'crit: On Thu, Dec 3, 2009 at 8:54 AM, Gregory BELLIER wrote: But, I still don't understand why we need to do a memcpy after the last round to save the last ciphered block as the new IV into the context. In my opinion, it's useless, this context won&#x

Re: Question about memcpy in operation mode for NSS

2009-12-03 Thread Gregory BELLIER
Robert Relyea a écrit : But, I still don't understand why we need to do a memcpy after the last round to save the last ciphered block as the new IV into the context. In my opinion, it's useless, this context won't be used anymore. http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss

Re: Question about memcpy in operation mode for NSS

2009-12-03 Thread Gregory BELLIER
Robert Relyea a écrit : This code is a direct result of the definition of CBC. The IV is a random value used to initiate the CBC. Different IVs will generate completely different output stream Indeed. The same IV is needed for encryption and decryption. If I refer to the sample2 example : http

Re: Question about memcpy in operation mode for NSS

2009-12-02 Thread Gregory BELLIER
Hi ! First of all, thank you for your time. Wan-Teh Chang a écrit : 2009/12/2 Gregory BELLIER : Examples : - For Camellia at the end of camellia_encryptCBC(CamelliaContext *cx, ...) : lastblock = output; memcpy(cx->iv, lastblock, CAMELLIA_BLOCK_SIZE); return SECSuccess;

Question about memcpy in operation mode for NSS

2009-12-02 Thread Gregory BELLIER
Hello ML, First of all, I'm not a crypto expert, that's why I ask this question which may appear obvious for some of you. I work on NSS and I've studied the CBC operation mode implementation for Camellia and SEED ciphers. I do understand how the CBC works but I don't understand why there is a