Thomas Fronckowiak Jr. | 11 Aug 15:24 1999

v1.1 SFL & Fortezza CTIL

What is the status of v1.1 SFL and the Fortezza CTIL?
Is there an estimated delivery date?

Pawling, John | 12 Aug 16:59 1999

v1.1 SFL Now Available

All,

J.G. Van Dyke and Associates (VDA) has delivered Version 1.1 of the S/MIME 
Freeware Library (SFL).  The v1.1 SFL implements the IETF S/MIME v3 RFC 2630

Cryptographic Message Syntax (CMS) and RFC 2634 Enhanced Security Services
(ESS) specifications.  It also implements portions of the RFC 2633 Message
Specification and RFC 2632 Certificate Handling document.  When used in
conjunction with the Crypto++ freeware library, the SFL implements the
RFC 2631 Diffie-Hellman (D-H) Key Agreement Method specification.  It has
been successfully tested using the MS Windows NT/95/98 and Solaris 2.6 
operating systems.  Further enhancements, ports and testing of the SFL are
still in process.  Further releases of the SFL will be provided as
significant capabilities are added. 

The v1.1 SFL has been successfully used to sign, verify, encrypt and decrypt

CMS/ESS objects using the mandatory algorithms (DSA, E-S D-H, 3DES) 
provided by the Crypto++ 3.1 library and SHA-1 provided by
Government-furnished 
freeware.  The v1.1 SFL has also been used to sign, verify, encrypt 
and decrypt CMS/ESS objects using the RSA suite of algorithms provided by 
the RSA BSAFE v3.0 library. The SFL uses the VDA-enhanced SNACC v1.3 ASN.1 
Library to encode/decode objects. The v1.1 SFL release includes: SFL
High-level library; SFL Crypto++ Crypto Token Interface Library (CTIL);
BSAFE CTIL; Fortezza CTIL; SPEX/ CTIL; VDA-enhanced GNU SNACC v1.3 rev 0.07
ASN.1 Compiler and Library; test drivers and test data.

The SFL has been successfully used to exchange signedData and envelopedData 
messages with the Microsoft (MS) Internet Explorer Outlook Express v4.01 and
(Continue reading)

Thomas Fronckowiak Jr. | 18 Aug 21:22 1999

Integrated v1.1 SFL & Fortezza CTIL

We (LJL) have integrated v1.1 SFL using the Fortezza CTIL and have 
successfully signed, verified, encrypted and decrypted.

Following is a list of issues/concerns we've come across so far, 
mostly with the Fortezza CTIL:

1. Failure setting personality during encrypt/decrypt.
Module: 	sm_fortdll.dll
File:		sm_fort.cpp
Function:	CSM_Fortezza::SMTI_GenerateKeyAgreement &
		CSM_Fortezza::SMTI_ExtractKeyAgreement
Line:		[947]	error = CI_SetPersonality(mp_cardInfo->GetSlot());
		[1020]	error = CI_SetPersonality( mp_cardInfo->GetSlot());

GetSlot returns the current slot which happens to be changed during a call
to GetUserPath().  Suggest:

   error = CI_SetPersonality(m_nEncryptorIndex);

to be consistant with other CI_SetPesonality calls.

2. If/else logic causes the root certificate to be retrieved, even
when bRootFlag == FALSE.
Module: 	sm_fortdll.dll
File:		sm_fortci.cpp
Function: 	CSM_Fortezza::GetUserPath()
Line: 		[327] if (nParentSlot == 0 && bRootFlag == true )

	if (nParentSlot == 0 && bRootFlag == true )
	else
(Continue reading)

Leonberger, Pierce | 18 Aug 22:04 1999

RE: Integrated v1.1 SFL & Fortezza CTIL


THANKS!!

FYI: Issues 1-4 have been addressed.  

We'll address the other issues ASAP.

Thanks again,
Pierce Leonberger
--
J.G. Van Dyke & Associates, Inc.

-----Original Message-----
From: Thomas Fronckowiak Jr. [mailto:tom <at> ljl.com]
Sent: Wednesday, August 18, 1999 3:23 PM
To: imc-sfl <at> imc.org
Subject: Integrated v1.1 SFL & Fortezza CTIL

We (LJL) have integrated v1.1 SFL using the Fortezza CTIL and have 
successfully signed, verified, encrypted and decrypted.

Following is a list of issues/concerns we've come across so far, 
mostly with the Fortezza CTIL:

1. Failure setting personality during encrypt/decrypt.
Module: 	sm_fortdll.dll
File:		sm_fort.cpp
Function:	CSM_Fortezza::SMTI_GenerateKeyAgreement &
		CSM_Fortezza::SMTI_ExtractKeyAgreement
Line:		[947]	error = CI_SetPersonality(mp_cardInfo->GetSlot());
(Continue reading)

Pawling, John | 19 Aug 18:58 1999

RE: Integrated v1.1 SFL & Fortezza CTIL

Tom,

Thank you for your message regarding LJL's successful use of the v1.1 SFL
and Fortezza CTIL.  Also, thank you for reporting the bugs.  We welcome all
feedback regarding the SFL.  Currently, we are enhancing the Certificate
Management Library (CML) to use the CTIL DLLs released in conjunction with
the v1.1 SFL.  We are also enhancing the CML to use the libCert library
provided as part of the v1.1 SFL release.  The VDA CML development team has
requested enhancements to the libCert library to support the v1.53 CML
release.  These enhancements will allow the CML team to take advantage of
code already developed and tested as part of the SFL.  The VDA SFL
development team is now making these enhancements.  We plan to deliver a new
SFL release (v1.2) to include the enhanced libCert library.  We also plan to
deliver new CTILs including fixing the bugs that you reported.  The new
CTILs will also include enhancements made to the SPEX/ and Fortezza CTIL
DLLs to support the v1.53 CML development effort.  We plan on delivering all
of this code by 31 August 99.

Thank you again,
============================================
John Pawling, Director - Systems Engineering
J.G. Van Dyke & Associates, Inc.,
a Wang Government Services Company
jsp <at> jgvandyke.com
============================================ 


Gmane