some questions about openssl

2011-04-20 Thread loody
hi all: My quesitons about openssl are below: 1. I want to take advantage of RSA and SHA in openssl for secure booting. Can they run as standalone program, that means they can run without libc support. 2. I want RSA and sha authentication run in DRAM instead of flash, such that the speed will be

Re: DH session Key length

2011-04-20 Thread Mike Mohr
Look, the typical way you'd use the DH shared secret would be to hash it using an appropriate hash function. I personally like using Tiger with AES-192, YMMV. On Tue, Apr 19, 2011 at 3:56 PM, ikuzar razuk...@gmail.com wrote: So,  have I to generate a prime with length = 3200 bits ?, ( the

Combining MD5 and SHA-1 to reduce collision probability

2011-04-20 Thread Luc Perthuis
Hi all, I'm specially interested on finding a way to uniquely identify rather small data chunks (less than or equal to 128*1024 bytes in size) without using a byte per byte compare. Is there any theoretical proof for a good selection of 2 HASH (computing the results of two different

Re: some questions about openssl

2011-04-20 Thread Mike Mohr
IMHO openssl is unsuitable for this purpose. Openssl is really good at what it does, don't get me wrong, but using it in a boot loader probably isn't the easiest/smartest idea. What you really want is a subset of PKCS#1 - that is, EMSA-PSS encoding and verification plus RSASP1/RSAVP1. I'm

Re: Combining MD5 and SHA-1 to reduce collision probability

2011-04-20 Thread David Schwartz
On 4/20/2011 1:18 AM, Luc Perthuis wrote: Hi all, I'm specially interested on finding a way to uniquely identify rather small data chunks (less than or equal to 128*1024 bytes in size) without using a byte per byte compare. Is there any theoretical proof for a good selection of 2 HASH

Conversion of RSA Encrypted message to Base64 format !!!

2011-04-20 Thread pattabi raman
Hi, I have done the RSA encryption program. Now I want to convert that encrypted message to BASE64 message inorder to send the message via socket. I am trying the following sample code which converts Hello World to Base64 format and *printing in console* ( stdout). *How can I use the funtion

Bug in openssl-0.9.8e

2011-04-20 Thread Moisés Barba Pérez
Hello, I have a problem with SSL like in the bug https://bugzilla.redhat.com/show_bug.cgi?id=676384 for the comands sudo -l, getent group, id with my client machine integrated in LDAP. I have apply the patch suggested in the filed bug but I still have a SSL peer reports incorrect Message

Re: DH session Key length

2011-04-20 Thread ikuzar
Sorry I do not see the link between my previous post and your answer. 2011/4/20 Mike Mohr akih...@gmail.com Look, the typical way you'd use the DH shared secret would be to hash it using an appropriate hash function. I personally like using Tiger with AES-192, YMMV. On Tue, Apr 19, 2011 at

Printing a bignumber

2011-04-20 Thread Giuseppe Barbieri
Hello, I am having really problems to get a big number printed out in the stdout... This is how it should be (if I got it properly): *BIGNUM *r;* *BIO *out;* * * *out = BIO_new_fp(stdout, BIO_NOCLOSE);* * * *r=BN_new();* * * *BN_rand(r, 2048, -1, 0)* * * *BN_print(out, r);* but when I

Re: Printing a bignumber

2011-04-20 Thread Giuseppe Barbieri
Solved, i included applink.c 2011/4/20 Giuseppe Barbieri elec...@gmail.com Hello, I am having really problems to get a big number printed out in the stdout... This is how it should be (if I got it properly): *BIGNUM *r;* *BIO *out;* * * *out = BIO_new_fp(stdout, BIO_NOCLOSE);* *

RE: Combining MD5 and SHA-1 to reduce collision probability

2011-04-20 Thread Steffen DETTMER
* Luc Perthuis: Hi all, I'm specially interested on finding a way to uniquely identify rather small data chunks (less than or equal to 128*1024 bytes in size) without using a byte per byte compare. Is there any theoretical proof for a good selection of 2 HASH (computing the results of

EVP_Decrypt function- AES cbc 128 bit mode- Input length?

2011-04-20 Thread tera tellence
Hi All, I am trying in vain to find out why the AES decrypt won't work here. I have found where exactly is the problem and now looking for some wise-crack to help me solve it. Here is the code that I tested with(from various posts here): #include string.h #include stdio.h

Re: Conversion of RSA Encrypted message to Base64 format !!!

2011-04-20 Thread Wim Lewis
On 20 Apr 2011, at 3:01 AM, pattabi raman wrote: How can I use the funtion BIO_new_fp(stdout, BIO_NOCLOSE) to print the value to another character array instead of stdout? If not this, which Bio_ function I can use so that it will convert to Base64 and put it in char buffer ?? I think

PKCS12 - Why Encrypted?

2011-04-20 Thread Patrick Rutkowski
I'm pretty new to this PKI stuff, but I'm very confused about why pkcs12 files are encrypted. As I understand it, a basic p12 file contains within it two things: (1) A private key (private.pem in my case, an RSA key created with genrsa) (2) An x509 certificate (cert.pem in my case, created with

Re: DH session Key length

2011-04-20 Thread ikuzar
2011/4/19 Dave Thompson dthomp...@prinpay.com From: owner-openssl-us...@openssl.org On Behalf Of ikuzar Sent: Monday, 18 April, 2011 11:01 I 'd like to know the length of DH session key generated by DH_compute_key(unsigned char *key, BIGNUM *pub_key, DH *dh) . Here :

Re: DH session Key length

2011-04-20 Thread Mike Mohr
Ikuzar, I'm not sure what software you're writing. Please understand that I'm not trying to be mean spirited when I say this, but if you don't already know the difference between symmetric vs public-key crypto then you should not be writing this type of code. Stop doing it until you have a firm

Re: PKCS12 - Why Encrypted?

2011-04-20 Thread Erwin Himawan
PKCS doc., including PKCS12 http://www.rsa.com/rsalabs/node.asp?id=2124 http://www.rsa.com/rsalabs/node.asp?id=2124 On Wed, Apr 20, 2011 at 5:03 PM, Patrick Rutkowski rutsk...@gmail.comwrote: I'm pretty new to this PKI stuff, but I'm very confused about why pkcs12 files are encrypted. As I

openssl dgst using ecdsa-with-SHA384

2011-04-20 Thread Shelley, Mike
Hi all, I'm having a problem using ecdsa with SHA 384 when creating a message digest. I will admit I'm not too familiar with openssl and digests, but I have code that works using -ecdsa-with-SHA1. I need to change that to use ecdsa-with-SHA384. I looked at the release notes to see that this