See http://openssl.org/support/faq.html#PROG1 and
http://openssl.org/docs/crypto/threads.html
--
The World is a book, and those who do not travel read only a page. -
St. Augustine.
__
OpenSSL Project
On 18 March 2010 10:09, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
It is always enabled, no special compilation flags required.
Applications have to enable NULL ciphers explicitly at runtime. Do not
recompile with a broken DEFAULT cipher list, just configure applications
that
Hello openssl-users,
I am trying to have eNULL (null cipher) enabled while compiling
openssl from source.
I've tried with 0.9.8g source and providing the enable-cipher option to the
configure script with no luck.
I've tried combinations like enable-null, enable-eNULL,
enable-null-md5, etc with
On Sun, Jul 6, 2008 at 10:22 PM, Ger Hobbelt [EMAIL PROTECTED] wrote:
http://www.virustotal.com/
you can upload the file and have it analyzed by multiple
virus/trojan/etc. scanners. Provides a nice report of the results. For
those files that make you go 'hr'.
The result :
On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF [EMAIL PROTECTED] wrote:
You can download the soft from here:
http://www.limina.com.ar/Downloads/RosPKI-EN-Demo.exe
LOL, asking users in a *security* list to download and run a random
executable from the Internet and without source code, I wonder how
On Tue, Apr 29, 2008 at 5:03 AM, Dr. Stephen Henson [EMAIL PROTECTED] wrote:
The call to EVP_EncryptInit_ex() uses the default key length for the cipher
unless told otherwise. For Blowfish this is 128 bits but you have a 56 byte
(?) key. You need to set the key length using
Hello,
I'm trying to encrypt a few bytes (as a trial run) with the same key
and IV with Blowfish in CBC mode and standard PKCS padding using
OpenSSL in a C++ app and also using SUN's Java crypto libraries. The
output ciphertext is different in both places which means that I
cannot get them to
Hello OpenSSL users,
I'm doing Diffie-Hellman key agreement between Java's built-in crypto
and C++ using OpenSSL latest version 0.9.8g.
The key agreement works and the generated shared secret bytes are the
same on the Java and OpenSSL side.
The problem is when I try to use the bytes of the DH