Hi,
When encrypting strings with RSA_public_encrypt, I cant seem to encrypt
more than RSA_size(key) bytes. Is there any way to encrypt more than
this number of bytes in a single call to RSA_public_encrypt (or a
similar function)?
Thanks,
Patrick
Bulk encryption, I think. I just want to encrypt/decrypt RSA_size(key)
bytes in one operation.
Thanks,
Patrick
ET Tan wrote:
What were you trying to do?
Key exchange or bulk encryption?
- Original Message -
From: Patrick Coleman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday
operate on a digest (which is little) rather
than the data itself.
- Original Message -
From: Patrick Coleman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, June 04, 2004 11:17 AM
Subject: Re: RSA_public_encrypt max message length
Bulk encryption, I think. I just want to encrypt
RSA_size, encrypts each chunk as a separate operation, etc. Is this what
is normally done in this sort of situation?
-Patrick
Richard Levitte - VMS Whacker wrote:
In message [EMAIL PROTECTED] on Fri, 04 Jun 2004 11:17:49 +0800, Patrick Coleman
[EMAIL PROTECTED] said:
pcoleman Bulk encryption, I
Thanks to everyone for the help. I'll try what you suggested.
-Patrick
David Schwartz wrote:
In that case, is there some function in openssl to chain several
encrypts/decrypts together, so I can use the RSA functions to encrypt a
DH key exchange?
Otherwise I'm just going to have to write some sort
For SSL_accept, you need to make the underlying socket non-blocking, rather
than a non-blocking BIO. You can make a socket non-blocking with the 'fcntl'
system call (check the manpages). You may also be interested in the excellent
sockets tutorial 'Beej's Guide to Network Programming' located
Hi,
I'm a little confused as to how Diffie-Hellman works with openssl. Once the
key is generated, which part of the DH struct do you need to send to the
other party? I have tried printing dh-pub_key to a terminal, but all I got
was '0'. Is this normal? Is there a standard way of formatting such
Hi,
What blowfish key length is used when I run a command like:
openssl enc -bf -in file.txt -out file.txt.enc -pass file:./passfile -e -nosalt
Can the key length be changed? I cant seem to find an option in the manpages
that does this.
Thanks,
Patrick
--
RedHerring: Linux wiki support and
I think just simply requiring people to be list members before posting
would be enough to make a big impact.
You dont necessarily have to force people to become members. Just
ensure that all anonymous posts are be moderated, and the problem
is solved. The spam, viruses and anonymous posts
Hi,
Am I right in thinking that OpenSSL prevents replay attacks by including a random
nonce with each packet?
Thanks,
Patrick
--
RedHerring: Linux wiki support and tutorials
http://covox.sepwich.com/linux
CECID: The CEnsorship CIrcumvention Device
http://cecid.sf.net
Hi,
I'm trying to do some basic encryption/decryption tests with the openssl RSA routines.
A message seems
to encrypt ok, but when it decrypts theres some random garbage appended onto the end.
Is this normal,
or is it a bug in my code?
This is what I'm doing:
encrypt.cpp
#include iostream
11 matches
Mail list logo