Thanks for your reply.
Can you provide the source for the problem that you're running into?
I cannot give the source code as it is now, but I will create a new test case
using only the OpenSSL calls I make in this situation. I will post it or report
back if I find an error.
Regards,
LJB
Thanks for your reply.
Are you, by chance, trying to derive secret from keypairs generated with
*different* parameters? This cannot possibly work, of course. Both sides
keypairs must be generated for same DH parameters.
OK, I guess the larger prime numbers of each group makes there parameters
Dear all,
The OFTP2 support group is going to
start upgrading the cipher suite supported in OFTP2.
The proposal includes SHA-3, which
is supported by Java implementations (BouncyCastle
at least).
Is there some plan to support it
Personally I'd advise against this until NIST publishes test vectors for the finalist.We already have:DES(_OLD) and DES.SHA0 and SHA1Rjindael and AES.NIST has a long track record of changing algorithms before going 'final' and the problem is that once people start using the 'bad' version of the
Bonjour,
SHA3 is not standardized yet. Keccak has been chosen in the end, but its
parameters are still debated.
I'm pretty sure that once those parameters are fixed in stone, there
will be an implementation in OpenSSL.
--
Erwann ABALEA
Le 12/02/2014 11:29, Francis GASCHET a écrit :
The
Same issue for me.
Any help is welcome.
Thanks!
--
View this message in context:
http://openssl.6102.n7.nabble.com/Hypothesis-to-explain-error-A2088-END-directive-required-at-end-of-file-tp42328p48495.html
Sent from the OpenSSL - Dev mailing list archive at Nabble.com.