Ø what is the best way to store keys that will be used by openssl
You will find a great many examples of how to do things by reading and
understanding the code in the apps directory.
--
Principal Security Engineer
Akamai Technology
Cambridge, MA
I'm trying to do the following:
1) Put a base64-encoded key (the normal one generated by openssl command
line tools) into a header file
2) Compile code with this key which will public-key encrypt a message.
My problem:
I'm not sure what interface to use to 1) read in the char array in my
header
On 29 March 2013 15:09, Zach lace...@roboticresearch.com wrote:
I'm trying to do the following:
1) Put a base64-encoded key (the normal one generated by openssl command
line tools) into a header file
Do you mean to put the actual key itself hardcoded into the header
file?? This seems like a
1) Put a base64-encoded key (the normal one generated by openssl command line
tools) into a header file
Avoid a step. Base64 decode and using something like od put a binary
bytestream into your source. Like
unsigned char der_key[] = { 3, 12, 253, }
2) Compile code with this
On 03/28/2013 11:30 AM, Abhijit Ray Chaudhury wrote:
Steve,
Thanks a lot for your explanation. I am not clear on one crucial point.
Below are the steps I used to build fipscanister.o:
1. export env variables. (note CROSS_COMPILE=/opt/fip-tools/; and
/opt/fip-tools/gcc is a shell
The reason I want to put the public key into the header file is to
simply make it easier to use the software (you can do the public key
encryption of some data with only the binary file, not the binary and
another file). Thus, I don't want to read a PEM file from the disk, but
rather from memory.
To read the key from your header file you might want to use a memory BIO in
conjunction with the PEM_read_bio_PUBKEY function or
PEM_read_bio_RSAPublicKey ( I don't remember which one you should use, but
this was answered in this list before). I don't have a test enviroment
right now, but you
Hi all,
I happened upon an inconsistency in the openssl command line tool. I think
it's a bug, but I wanted to ask the list before filing a report.
OAEP is a supported RSA padding mode on the pkeyutl command. However,
there's a typo in how it's implemented on the command line. OAEP requires
the
http://www.profinancas.com/ssxawjky/ktcj.qdz?ibqv
Susumu Sai