RSA_public_encrypt max message length

2004-06-03 Thread Patrick Coleman
Hi, When encrypting strings with RSA_public_encrypt, I cant seem to encrypt more than RSA_size(key) bytes. Is there any way to encrypt more than this number of bytes in a single call to RSA_public_encrypt (or a similar function)? Thanks, Patrick

Re: RSA_public_encrypt max message length

2004-06-03 Thread Patrick Coleman
Bulk encryption, I think. I just want to encrypt/decrypt RSA_size(key) bytes in one operation. Thanks, Patrick ET Tan wrote: What were you trying to do? Key exchange or bulk encryption? - Original Message - From: Patrick Coleman [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday

Re: RSA_public_encrypt max message length

2004-06-03 Thread Patrick Coleman
operate on a digest (which is little) rather than the data itself. - Original Message - From: Patrick Coleman [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, June 04, 2004 11:17 AM Subject: Re: RSA_public_encrypt max message length Bulk encryption, I think. I just want to encrypt

Re: RSA_public_encrypt max message length

2004-06-03 Thread Patrick Coleman
RSA_size, encrypts each chunk as a separate operation, etc. Is this what is normally done in this sort of situation? -Patrick Richard Levitte - VMS Whacker wrote: In message [EMAIL PROTECTED] on Fri, 04 Jun 2004 11:17:49 +0800, Patrick Coleman [EMAIL PROTECTED] said: pcoleman Bulk encryption, I

Re: RSA_public_encrypt max message length

2004-06-03 Thread Patrick Coleman
Thanks to everyone for the help. I'll try what you suggested. -Patrick David Schwartz wrote: In that case, is there some function in openssl to chain several encrypts/decrypts together, so I can use the RSA functions to encrypt a DH key exchange? Otherwise I'm just going to have to write some sort

Re: non-blocking BIO

2004-05-17 Thread Patrick Coleman
For SSL_accept, you need to make the underlying socket non-blocking, rather than a non-blocking BIO. You can make a socket non-blocking with the 'fcntl' system call (check the manpages). You may also be interested in the excellent sockets tutorial 'Beej's Guide to Network Programming' located

DH Confusion

2004-05-12 Thread Patrick Coleman
Hi, I'm a little confused as to how Diffie-Hellman works with openssl. Once the key is generated, which part of the DH struct do you need to send to the other party? I have tried printing dh-pub_key to a terminal, but all I got was '0'. Is this normal? Is there a standard way of formatting such

Blowfish Key Length

2004-04-16 Thread Patrick Coleman
Hi, What blowfish key length is used when I run a command like: openssl enc -bf -in file.txt -out file.txt.enc -pass file:./passfile -e -nosalt Can the key length be changed? I cant seem to find an option in the manpages that does this. Thanks, Patrick -- RedHerring: Linux wiki support and

Re: Regarding all the spam...

2004-03-02 Thread Patrick Coleman
I think just simply requiring people to be list members before posting would be enough to make a big impact. You dont necessarily have to force people to become members. Just ensure that all anonymous posts are be moderated, and the problem is solved. The spam, viruses and anonymous posts

Replay attack prevention

2004-02-29 Thread Patrick Coleman
Hi, Am I right in thinking that OpenSSL prevents replay attacks by including a random nonce with each packet? Thanks, Patrick -- RedHerring: Linux wiki support and tutorials http://covox.sepwich.com/linux CECID: The CEnsorship CIrcumvention Device http://cecid.sf.net

Strange garbage in RSA decryption

2003-11-17 Thread Patrick Coleman
Hi, I'm trying to do some basic encryption/decryption tests with the openssl RSA routines. A message seems to encrypt ok, but when it decrypts theres some random garbage appended onto the end. Is this normal, or is it a bug in my code? This is what I'm doing: encrypt.cpp #include iostream