RE: Diffie Hellman question
Thanks for your reply. Can you provide the source for the problem that you're running into? I cannot give the source code as it is now, but I will create a new test case using only the OpenSSL calls I make in this situation. I will post it or report back if I find an error. Regards, LJB
RE: Diffie Hellman question
Thanks for your reply. Are you, by chance, trying to derive secret from keypairs generated with *different* parameters? This cannot possibly work, of course. Both sides keypairs must be generated for same DH parameters. OK, I guess the larger prime numbers of each group makes there parameters *different*. Thanks, LJB
SHA-3 availability
Dear all, The OFTP2 support group is going to start upgrading the cipher suite supported in OFTP2. The proposal includes SHA-3, which is supported by Java implementations (BouncyCastle at least). Is there some plan to support it in openSSL ? Thanks and best regards, --
Re: SHA-3 availability
Personally I'd advise against this until NIST publishes test vectors for the finalist.We already have:DES(_OLD) and DES.SHA0 and SHA1Rjindael and AES.NIST has a long track record of changing algorithms before going 'final' and the problem is that once people start using the 'bad' version of the algorithm, it has to be supported forever, and that causes interop AND security issues.If you really want to speed the adoption of SHA3 :), ask NIST to finalize the standard ?, until that happens it's a poison pill.Peter-owner-openssl-...@openssl.org wrote: -To: openssl DEV openssl-dev@openssl.orgFrom: Francis GASCHETSent by: owner-openssl-...@openssl.orgDate: 02/12/2014 08:45PMSubject: SHA-3 availability Dear all, The OFTP2 support group is going to start upgrading the cipher suite supported in OFTP2. The proposal includes SHA-3, which is supported by Java implementations (BouncyCastle at least). Is there some plan to support it in openSSL ? Thanks and best regards, --
Re: [openssl-dev] SHA-3 availability
Bonjour, SHA3 is not standardized yet. Keccak has been chosen in the end, but its parameters are still debated. I'm pretty sure that once those parameters are fixed in stone, there will be an implementation in OpenSSL. -- Erwann ABALEA Le 12/02/2014 11:29, Francis GASCHET a écrit : The OFTP2 support group is going to start upgrading the cipher suite supported in OFTP2. The proposal includes SHA-3, which is supported by Java implementations (BouncyCastle at least). Is there some plan to support it in openSSL ?
Re: Hypothesis to explain error A2088: END directive required at end of file
Same issue for me. Any help is welcome. Thanks! -- View this message in context: http://openssl.6102.n7.nabble.com/Hypothesis-to-explain-error-A2088-END-directive-required-at-end-of-file-tp42328p48495.html Sent from the OpenSSL - Dev mailing list archive at Nabble.com. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org