Hi Dave,
I was going through the RFC of AES and it does say we get the IV upon
unwrapping . Check the below link
http://www.ietf.org/rfc/rfc3394.txt
-Prashanth
On Fri, Mar 23, 2012 at 9:24 AM, Dave Thompson dthomp...@prinpay.comwrote:
From: owner-openssl-us...@openssl.org On Behalf Of
Here is the modified program
#include stdio.h
2 #include openssl/aes.h
3
4 static const unsigned char key[] = {
5 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
6 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
7 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
8
I tried to use EVP but let if of go due to bad documentation...
On Wed, Mar 28, 2012 at 2:49 AM, Jakob Bohm jb-open...@wisemo.com wrote:
On 3/27/2012 10:42 PM, Jeffrey Walton wrote:
On Tue, Mar 27, 2012 at 4:26 PM, Ken Goldmankgold...@us.ibm.com wrote:
On 3/27/2012 3:51 PM, Jakob Bohm
Jeff.. this is good idea... so are you going to start one?
-Prashanth
On Wed, Mar 28, 2012 at 6:15 AM, Jeffrey Walton noloa...@gmail.com wrote:
On Tue, Mar 27, 2012 at 4:26 PM, Ken Goldman kgold...@us.ibm.com wrote:
On 3/27/2012 3:51 PM, Jakob Bohm wrote:
On 3/27/2012 9:37 PM, Dr.
, 2012, at 12:32 PM, Prashanth kumar N wrote:
I tried to use EVP but let if of go due to bad documentation...
On Wed, Mar 28, 2012 at 2:49 AM, Jakob Bohm jb-open...@wisemo.com
wrote:
On 3/27/2012 10:42 PM, Jeffrey Walton wrote:
On Tue, Mar 27, 2012 at 4:26 PM, Ken Goldmankgold
. Any reasons?
-Prashanth
On Wed, Mar 28, 2012 at 7:29 PM, Ken Goldman kgold...@us.ibm.com wrote:
On 3/28/2012 3:01 AM, Prashanth kumar N wrote:
Here is the modified program
[snip]
18 AES_KEY ectx;
19 AES_KEY dectx;
20
21 AES_set_encrypt_key(key, 256, ectx);
22
/2012 09:01:25 AM:
Prashanth kumar N prashanth.kuma...@gmail.com
Sent by: owner-openssl-us...@openssl.org
03/28/2012 09:03 AM
Please respond to
openssl-users@openssl.org
To
openssl-users@openssl.org
cc
Subject
Re: How to do encryption using AES in Openssl
Here
something?
lpermalink.gmane.org/gmane.comp.encryption.openssl.devel/18755
On Thu, Mar 29, 2012 at 4:07 PM, Dr. Stephen Henson st...@openssl.orgwrote:
On Thu, Mar 29, 2012, Prashanth kumar N wrote:
Thanks Marek. I will try the attached code in the attached files.
In many of the examples i
AM, Prashanth kumar N wrote:
Thanks Ken for pointing out the mistake... after changing to
AES_Decrypt(), it worked but i still see issue when i print the
decrypted output as it has extra non-ascii characters in it.
That's what happens in C if you try to printf an array that's not NUL
).
For printf() you may fill this last 8 bytes to 0.
Best regards,
--
Marek Marcola marek.marc...@malkom.pl
owner-openssl-us...@openssl.org wrote on 03/29/2012 04:02:17 PM:
Prashanth kumar N prashanth.kuma...@gmail.com
Sent by: owner-openssl-us...@openssl.org
03/29/2012 04:03 PM
Please
You can use the below API's
RAND_bytes()
RAND_pseudo_bytes()
On Thu, Apr 5, 2012 at 12:33 AM, Jeremy Farrell
jeremy.farr...@oracle.comwrote:
http://lmgtfy.com/?q=openssl+random+number
From: Alex Chen [mailto:alex_c...@filemaker.com]
There is a 'rand' command in the openssl command
Thanks Dave for your great support... you rock... after changing KEYBITS,
it worked... my ignorance that i mistook it for Key and set it to 512...
Please find my response below...
Firstly Jeff,
256 is valid KEK and max one. Key can be of 'n' blocks each block being 64
bits in size and 'n'
, 2012 at 1:41 PM, Prashanth kumar N
prashanth.kuma...@gmail.com wrote:
Thanks Dave for your great support... you rock... after changing KEYBITS,
it worked... my ignorance that i mistook it for Key and set it to 512...
Please find my response below...
Firstly Jeff,
256 is valid KEK and max
13 matches
Mail list logo