On Tue, May 13, 2014 at 12:06 PM, Tom stone stone...@gmail.com wrote:
Using openssl-1.0.1g command line for simple file encryption/decryption,
when I issue the commands
openssl enc -aes-256-cbc -k secret -in file.txt -out file.ssl
openssl enc -d -aes-256-cbc -k secret -in file.ssl
The
Hello,
Please Help Me To Build OPENSSL on WIN CE 6.0.
I Followed Steps Which are mentioned in INSTALL.WCE Text File.
But Didnt Successed.
--
View this message in context:
http://openssl.6102.n7.nabble.com/BUILD-OPENSSL-in-WIN-CE-6-0-tp50152.html
Sent from the OpenSSL - User mailing list
hello ,
i working on windows ce 6.5 and i want to configure openSSL on that.
i followed step from
https://groups.google.com/forum/#!topic/mailing.openssl.users/Ph9AoofDP0U
this link.but i did not compile wcecompat.
so i wasn't got my two .lib files succesfully.so,please help me out from
this
Hello,
Please Give The Basic Steps To Build OPENSSL in WIN CE 6.0.
All Steps From Starts To END.
I already Performed Steps Which are Mentioned in INSTALL.WCE Text File.
Didnt Successed.
--
View this message in context:
On May 15, 2014 10:59 AM, RaviVyas ravi.vyas.1...@gmail.com wrote:
Hello,
Please Help Me To Build OPENSSL on WIN CE 6.0.
I Followed Steps Which are mentioned in INSTALL.WCE Text File.
But Didnt Successed.
What were your steps? Where's the output?
Dustin
--
View this message in
Hello,
Purely for a test case to see if a small wrapper library for
EVP_DigestSign*() can output the exact same signature twice, I tried
calling:
if((rc = EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_NO_PADDING)) = 0) {
print(failed with %d\n, rc);
}
With plain old PKCS1 and
Hello,
I did the job many times, last with openssl V100a and V102, using MS EVC
compiler instead of Visual Studio.
You will find instructions here (from start to end, but it is a long
process anyway, and you have to be very careful in modifying various
files and scripts...):
On Thu, May 15, 2014, Jan Danielsson wrote:
Hello,
Purely for a test case to see if a small wrapper library for
EVP_DigestSign*() can output the exact same signature twice, I tried
calling:
if((rc = EVP_PKEY_CTX_set_rsa_padding(pctx, RSA_NO_PADDING)) = 0) {
print(failed with
On 15 May 2014 10:39, Jeffrey Walton noloa...@gmail.com wrote:
On Tue, May 13, 2014 at 12:06 PM, Tom stone stone...@gmail.com wrote:
Am I missing something or is there a bug in the openssl gcm implementation?
If its any consolation, your question triggered a documentation patch.
Matt Caswell
On Thu, May 15, 2014 at 2:37 PM, Matt Caswell m...@openssl.org wrote:
On 15 May 2014 10:39, Jeffrey Walton noloa...@gmail.com wrote:
On Tue, May 13, 2014 at 12:06 PM, Tom stone stone...@gmail.com wrote:
Am I missing something or is there a bug in the openssl gcm implementation?
If its any
EVP_BytesToKey implements (a tweak on) the original PKCS#5, which derived a key
and IV
by iterated hashing of a (reusable but secret) password with random (i.e.
unique) salt.
Given random salt this gives effectively random IV, but is unnecessarily
complicated.
This was recognized as a
11 matches
Mail list logo