TASSL icon indicating copy to clipboard operation
TASSL copied to clipboard

已升级到TASSL-1.1.1k,下载链接https://github.com/jntass/TASSL-1.1.1k

Results 28 TASSL issues
Sort by recently updated
recently updated
newest added

TLCP中ECDHE_SM4_GCM_SM3/ECDHE_SM4_CBC_SM3,使用SM2 key exchange生成的到底是预主密钥还是主密钥? 如果是预主密钥,长度是多少?这个在**GB/T 38636-2020**也没有看到详细信息。

参考的是这里的例子: https://github.com/jntass/TASSL-1.1.1b/blob/master/tassl_demo/ssl/sm2svr.c

请问,TASSL与GMSSL有进行过gmtls互通测试吗,我这边测试无论是做server都不能协商成功

### 秘钥文件内容: Private-Key: (256 bit) priv: 51:5f:ff:18:27:b5:be:41:5e:70:bc:d9:00:fc:a3: d6:af:4a:b8:da:3c:5e:88:4d:d3:7b:64:2a:77:1a: 2a:ea pub: 04:43:81:e4:75:71:ba:3e:73:3b:c3:a8:bd:69:7c: 6a:08:9d:a7:e5:50:46:63:c1:d1:6e:39:ea:ee:d8: bb:39:b8:0d:0a:58:2d:e8:79:2e:73:32:2c:7e:a1: ea:47:4b:8a:08:5b:2f:6b:5a:61:c7:2d:93:bc:21: 51:28:fd:94:23 ASN1 OID: sm2p256v1 ### 私钥16进制: 515fff1827b5be415e70bcd900fca3d6af4ab8da3c5e884dd37b642a771a2aea ### sm2加密后的数据16进制字串: a631eaf7cfb45f6c8c1adbcb353f32fff624f629a942282e1167d4c4310ca3586eaa72a25482fd6c8f72593a437e5bb1b86c600fbf2caef88a283ab2c92896c5355c0795839f5565dfb63c3ab137a94d5333f57352df5a4e61c45515df99d92fd789fb0b9c4c19f03a3150b28062f6edec2d6f4981e96e3680203912ec40c504da0c6fe033202878c62da2513d0c0a8fe8d0ab1e2c598fdad05723550d247fe6a2f1f7adeb3ca4977c5f4a30a67b861681933ce65352387cf65ece12ffd9f1a8 ### 解密操作: [root@localhost crypto]# ./sm2enc_der d...

RFC和国密标准说是要对client hello 到 certificate verify(不包含)之间的所有交互报文做签名,现在看代码,是对一块固定大小的摘要数据做签名 客户端侧: ` if (EC_GROUP_get_curve_name(EC_KEY_get0_group(pkey->pkey.ec)) == NID_sm2) { size_t _j_j = EVP_PKEY_size(pkey); tass_md = EVP_sm3(); if (EVP_DigestSignInit(&mctx, NULL, tass_md, NULL, pkey) md_size) tmp.cert_verify_md[offset], md->md_size)

编译脚本 compile-v7.sh 内容如下: compile-v7.sh 和 源码目录 TASSL-v7 在同一目录。 arm64 armv7s 架构的编译类似。 #!/bin/bash OUT_DIR=out-v7 rm -rf $OUT_DIR cd TASSL-v7 make clean # 设置编译器 export CC="clang -arch armv7" # 设置工具链路径 export PATH="/Applications/Xcode10.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:$PATH"...

linux下运行,指定ECDHE-SM4-SM3密码套件握手成功后,server端输入“R”进行重协商,为什么整个握手流程看起来是session id的复用流程,这样重协商是否符合规范?