At 12:21 24/06/03 -0400, you wrote:
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of David Maurus
Sent: Tuesday, June 24, 2003 7:29 AM
To: [EMAIL PROTECTED]
Subject: Re: AES counter mode
The easiest way to go about it would be to increment the user
Thanks for your answer.
I allready tried with the ASN1_ANY, but it's failed too. Actually, i
inspected the implentation of the PKCS12_item_pack_safebag function and
found that it can't support any secret bag. The solution which works is the
following code:
PKCS12_BAGS *bag;
PKCS12_SAFEBAG
Michael Sierchio wrote:
Completely. If we have confidence in the cipher and the secrecy
of the key, make the nonce all zeroes. There's good reason for not
doing this in the case of IPsec, but not for SSL/TLS.
In theory, you may be right ;-). But: For one, I think that it can't
hurt NOT to
Hello David,
David Maurus wrote:
Goetz Babin-Ebell wrote:
The application specifies 4 datas:
1. a step size
2. a bit mask.
3. a (optional) pointer to a function that is called if the
step bits that are not in the bit mask:
4. a (optional) pointer to a function doing the counting;
if
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
This thing happens when certificates share common data. You cannot have two
certificates that look otherwise the same. Either remove them by hand from the
database, or properly revoke them using 'openssl ca -revoke xyz.crt'
Why it fails with MySQL example, though, escapes me.
Cheers, Kuba
CTR mode offers very little advantage over CBC or CFB or OFB -- the
motivation for IPsec was very high speed, parallel encryption with
precomputation of the keystream (according to the Rt. Hon. Rev.
Bellovin, IETF Security Area co-chair).
A very important consideration for ultra high
Thus spake Thierry Boivin [EMAIL PROTECTED]
I agree with this approach which leaves the crypto library very open and
not to complex to manipulate, whatever the upper program to develop is.
Generalized approach : as differencies for the various applications are
the
way to build the IV, ie:
Thus spake Richard Levitte - VMS Whacker [EMAIL PROTECTED]
lee_dilkie (the other thing to remember is that CTR can be used with
lee_dilkie any block cipher, it's not limited to AES)
Absolutely. However, since it's currently very obviously an
experimental field, and it was originally