From hakan at ZYBERIT.COM Thu Aug 11 10:38:29 2005 From: hakan at ZYBERIT.COM (Hakan Persson) Date: Thu, 11 Aug 2005 10:38:29 +0200 Subject: [PYTHON-CRYPTO] Seperated hasing and signing in PGP Message-ID: Hi all. I need to do a PGP signature in two steps, first the hash on one machine and then the actual signature (signing) on another. The reason for this is that the data that is to be signed is extremely large and cannot be moved to the signing machine, which is off-line and only communicates through a ?sneaker net? (USB stick). I have looked around I can only find Python code that either calls GPG (which does not have this ?two phase? possibility) or code that calls some C library that will require rewrite to make this possible. Does anyone know I could achieve this in Python? Thanks, H?kan From m2crypto at EDAC.UNM.EDU Mon Aug 15 20:37:47 2005 From: m2crypto at EDAC.UNM.EDU (Greg Cook) Date: Mon, 15 Aug 2005 12:37:47 -0600 Subject: [PYTHON-CRYPTO] [Fwd: errors running alltests in test_ssl.py] Message-ID: <1699.129.24.73.222.1124131067.squirrel@edacmail.unm.edu> Hello: I have been receiving errors running alltests.py (following). They are coming up during the test_ssl.py portion of the test script. I am running Python 2.4.1, Openssl 0.9.8, and Swig 1.3.23. Below are the errors: ***************************************************************************** [root at tux tests]# python alltests.py ................................................................bind: Address already in use Ebind: Address already in use Ebind: Address already in use Ebind: Address already in use Ebind: Address already in use Ebind: Address already in use E ====================================================================== ERROR: test_cipher_mismatch (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 89, in test_cipher_mismatch ctx = SSL.Context() File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ====================================================================== ERROR: test_cipher_ok (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 115, in test_cipher_ok ctx = SSL.Context() File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ====================================================================== ERROR: test_no_such_cipher (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 102, in test_no_such_cipher ctx = SSL.Context() File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ====================================================================== ERROR: test_server_simple (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 55, in test_server_simple ctx = SSL.Context() File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ====================================================================== ERROR: test_tls1_nok (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 66, in test_tls1_nok ctx = SSL.Context('tlsv1') File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ====================================================================== ERROR: test_tls1_ok (test_ssl.SSLClientTestCase) ---------------------------------------------------------------------- Traceback (most recent call last): File "/usr/local/src/m2crypto-0.13/tests/test_ssl.py", line 78, in test_tls1_ok ctx = SSL.Context('tlsv1') File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 41, in __init__ map()[self.ctx] = self File "/usr/local/lib/python2.3/site-packages/M2Crypto/SSL/Context.py", line 20, in __setitem__ self.map[key] = value TypeError: unhashable type ---------------------------------------------------------------------- Ran 70 tests in 3.695s FAILED (errors=6) ****************************************************************************** Can you please help with this problem? Thank you, GDCook From heikki at OSAFOUNDATION.ORG Thu Aug 18 01:44:05 2005 From: heikki at OSAFOUNDATION.ORG (Heikki Toivonen) Date: Wed, 17 Aug 2005 16:44:05 -0700 Subject: [PYTHON-CRYPTO] M2Crypto release 0.15 Message-ID: <4303CBC5.3010304@osafoundation.org> M2crypto release 0.15 In this M2Crypto release: * Support for OpenSSL up to 0.9.8 * Support for SWIG 1.3.24 * Support for Python 2.4.1 * Twisted integration * Safer defaults for SSL context and post connection check for clients * Eliminated C pointers from interfaces (some may still remain in callbacks) * Many cases where Python interpreter crashed have been fixed * Improved thread safety of many callbacks * Memory leak fixes * And of course more of the OpenSSL API is covered, new docstrings and tests have been written To get the source: svn co http://svn.osafoundation.org/m2crypto/tags/0.15 m2crypto-0.15 Enjoy! Currently known M2Crypto bugs: https://bugzilla.osafoundation.org/buglist.cgi?product=M2Crypto&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED This release has been tested and is known to work with: * Windows XP - Cygwin 1.5.18 - Cygwin OpenSSL 0.9.8 - Cygwin SWIG 1.3.24 - Cygwin Python 2.4 and (Compiled with MS Visual C++ .NET 2003) - OpenSSL 0.9.7g - SWIG 1.3.24 - Python 2.4.1 * Debian (testing) - OpenSSL 0.9.7e - SWIG 1.3.24 - Python 2.3.5 * Ubuntu - OpenSSL 0.9.7g - SWIG 1.3.24 - Python 2.4.1 * Fedora Core 2-4 - OpenSSL 0.9.7g - SWIG 1.3.24 - Python 2.4.1 * Mac OS 10.x - OpenSSL 0.9.7g - SWIG 1.3.24 - Python 2.4.1 There have been reports that SWIG 1.3.25 and OpenSSL 0.9.7f should also work. If you know of other combinations that work please post them to python-crypto, and file bugs otherwise. -- Heikki Toivonen -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 253 bytes Desc: OpenPGP digital signature URL: From gabrielcnr at GMAIL.COM Wed Aug 31 05:07:42 2005 From: gabrielcnr at GMAIL.COM (Gabriel Reis) Date: Wed, 31 Aug 2005 00:07:42 -0300 Subject: [PYTHON-CRYPTO] Zero-Knowledge Proof Protocols Message-ID: <1f2e8c720508302007554957b0@mail.gmail.com> Hi, could anyone, please, tell me if there is an Zero-Knowledge Proof Protocol implemented in Python? -- Att, Gabriel Reis E-mail: gabrielcnr at gmail.com -------------- next part -------------- An HTML attachment was scrubbed... URL: From heikki at OSAFOUNDATION.ORG Wed Aug 31 06:57:53 2005 From: heikki at OSAFOUNDATION.ORG (Heikki Toivonen) Date: Tue, 30 Aug 2005 21:57:53 -0700 Subject: [PYTHON-CRYPTO] Zero-Knowledge Proof Protocols In-Reply-To: <1f2e8c720508302007554957b0@mail.gmail.com> References: <1f2e8c720508302007554957b0@mail.gmail.com> Message-ID: <431538D1.9070403@osafoundation.org> Gabriel Reis wrote: > could anyone, please, tell me if there is an Zero-Knowledge Proof > Protocol implemented in Python? Secure Remote Password (http://srp.stanford.edu/) is one such protocol, and googling around shows several Python implementations, for example http://members.tripod.com/professor_tom/archives/srpsocket.html and http://trevp.net/tls_srp/index.html. -- Heikki Toivonen -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 253 bytes Desc: OpenPGP digital signature URL: