hi all:
My quesitons about openssl are below:
1. I want to take advantage of RSA and SHA in openssl for secure booting.
Can they run as standalone program, that means they can run without
libc support.
2. I want RSA and sha authentication run in DRAM instead of flash,
such that the speed will be
Look, the typical way you'd use the DH shared secret would be to hash
it using an appropriate hash function. I personally like using Tiger
with AES-192, YMMV.
On Tue, Apr 19, 2011 at 3:56 PM, ikuzar razuk...@gmail.com wrote:
So, have I to generate a prime with length = 3200 bits ?, ( the
Hi all,
I'm specially interested on finding a way to uniquely identify rather
small data chunks (less than or equal to 128*1024 bytes in size) without
using a byte per byte compare.
Is there any theoretical proof for a good selection of 2 HASH
(computing the results of two different
IMHO openssl is unsuitable for this purpose. Openssl is really good
at what it does, don't get me wrong, but using it in a boot loader
probably isn't the easiest/smartest idea. What you really want is a
subset of PKCS#1 - that is, EMSA-PSS encoding and verification plus
RSASP1/RSAVP1. I'm
On 4/20/2011 1:18 AM, Luc Perthuis wrote:
Hi all,
I'm specially interested on finding a way to uniquely identify rather
small data chunks (less than or equal to 128*1024 bytes in size) without
using a byte per byte compare.
Is there any theoretical proof for a good selection of 2 HASH
Hi,
I have done the RSA encryption program. Now I want to convert that encrypted
message to BASE64 message inorder to send the message via socket.
I am trying the following sample code which converts Hello World to Base64
format and *printing in console* ( stdout).
*How can I use the funtion
Hello,
I have a problem with SSL like in the bug
https://bugzilla.redhat.com/show_bug.cgi?id=676384 for the comands sudo
-l, getent group, id with my client machine integrated in LDAP. I have
apply the patch suggested in the filed bug but I still have a SSL peer
reports incorrect Message
Sorry I do not see the link between my previous post and your answer.
2011/4/20 Mike Mohr akih...@gmail.com
Look, the typical way you'd use the DH shared secret would be to hash
it using an appropriate hash function. I personally like using Tiger
with AES-192, YMMV.
On Tue, Apr 19, 2011 at
Hello,
I am having really problems to get a big number printed out in the stdout...
This is how it should be (if I got it properly):
*BIGNUM *r;*
*BIO *out;*
*
*
*out = BIO_new_fp(stdout, BIO_NOCLOSE);*
*
*
*r=BN_new();*
*
*
*BN_rand(r, 2048, -1, 0)*
*
*
*BN_print(out, r);*
but when I
Solved, i included applink.c
2011/4/20 Giuseppe Barbieri elec...@gmail.com
Hello,
I am having really problems to get a big number printed out in the
stdout...
This is how it should be (if I got it properly):
*BIGNUM *r;*
*BIO *out;*
*
*
*out = BIO_new_fp(stdout, BIO_NOCLOSE);*
*
* Luc Perthuis:
Hi all,
I'm specially interested on finding a way to uniquely
identify rather small data chunks (less than or equal to
128*1024 bytes in size) without using a byte per byte compare.
Is there any theoretical proof for a good selection of 2
HASH (computing the results of
Hi All,
I am trying in vain to find out why the AES decrypt won't work here.
I have found where exactly is the problem and now looking for some
wise-crack to help me solve it.
Here is the code that I tested with(from various posts here):
#include string.h
#include stdio.h
On 20 Apr 2011, at 3:01 AM, pattabi raman wrote:
How can I use the funtion BIO_new_fp(stdout, BIO_NOCLOSE) to print the
value to another character array instead of stdout? If not this, which Bio_
function I can use so that it will convert to Base64 and put it in char
buffer ??
I think
I'm pretty new to this PKI stuff, but I'm very confused about why pkcs12 files
are encrypted.
As I understand it, a basic p12 file contains within it two things:
(1) A private key (private.pem in my case, an RSA key created with genrsa)
(2) An x509 certificate (cert.pem in my case, created with
2011/4/19 Dave Thompson dthomp...@prinpay.com
From: owner-openssl-us...@openssl.org On Behalf Of ikuzar
Sent: Monday, 18 April, 2011 11:01
I 'd like to know the length of DH session key generated by
DH_compute_key(unsigned char *key, BIGNUM *pub_key, DH *dh) .
Here :
Ikuzar,
I'm not sure what software you're writing. Please understand that I'm
not trying to be mean spirited when I say this, but if you don't
already know the difference between symmetric vs public-key crypto
then you should not be writing this type of code. Stop doing it until
you have a firm
PKCS doc., including PKCS12
http://www.rsa.com/rsalabs/node.asp?id=2124
http://www.rsa.com/rsalabs/node.asp?id=2124
On Wed, Apr 20, 2011 at 5:03 PM, Patrick Rutkowski rutsk...@gmail.comwrote:
I'm pretty new to this PKI stuff, but I'm very confused about why pkcs12
files are encrypted.
As I
Hi all,
I'm having a problem using ecdsa with SHA 384 when creating a message
digest. I will admit I'm not too familiar with openssl and digests, but
I have code that works using -ecdsa-with-SHA1. I need to change that to
use ecdsa-with-SHA384. I looked at the release notes to see that this
18 matches
Mail list logo