Re: Salted password generation/digest

2008-04-03 Thread Marek . Marcola
Hello, [EMAIL PROTECTED] wrote on 03/31/2008 11:44:10 PM: I don't think Marek is correct. The command-line interface (openssl enc) doesn't use PKCS5_PBKDF2_HMAC_SHA1(). Other parts of the command-line utilities do (e.g. openssl pkcs8 -topk8 -v2 for encrypting RSA and DSA private keys), but

Re: Salted password generation/digest

2008-03-31 Thread Julius Davies
I don't think Marek is correct. The command-line interface (openssl enc) doesn't use PKCS5_PBKDF2_HMAC_SHA1(). Other parts of the command-line utilities do (e.g. openssl pkcs8 -topk8 -v2 for encrypting RSA and DSA private keys), but not openssl enc. If you can read Java, here's the algorithm

Salted password generation/digest

2008-03-29 Thread Stefan Schulze Frielinghaus
Hello, consider the following example: You want to encrypt something using OpenSSL's AES 256 Bit encryption. You use the OpenSSL command line interface and specify an 8 character password. This means you specified 64 Bit (8 characters = 64 Bit) but want to use 256 Bit encryption. How does the

Re: Salted password generation/digest

2008-03-29 Thread Marek . Marcola
Hello, [EMAIL PROTECTED] wrote on 03/29/2008 06:52:18 PM: Hello, consider the following example: You want to encrypt something using OpenSSL's AES 256 Bit encryption. You use the OpenSSL command line interface and specify an 8 character password. This means you specified 64 Bit (8