From: owner-openssl-users On Behalf Of Nyyr
Sent: Tuesday, December 10, 2013 15:37
I received certificate from CA and it had no alias set: snip
(as expected; alias is local to your system and CA doesn't know it)
So I set alias via: snip: x509 -setalias myalias
I then
Hi All,
When we are trying to build the openssl-1.0.1 in x86-64 board we are facing the
following error
x86cpuid.s: Assembler messages:
x86cpuid.s:8: Error: suffix or operands invalid for `push'
x86cpuid.s:9: Error: suffix or operands invalid for `push'
x86cpuid.s:10: Error: suffix or operands
Hello all !
I would like to know if RSA allows plausible deniability ?
I'm on a crypto app, and the RSA_private_* functions seem to return 0 if
error.
I want to implement plausible deniability, deciphering with a wrong key would
work but show a
--
Cordialement, Adnan RIHAN.
Hello,
Is there an easy way in OpenSSL to call some function which returns the
length of the digest/hash it returns? Like SHA256 would return 32 (maximum
digest length of 32 bytes).
Dereck
Can someone tell me what hash algorithm the RSA_public_encrypt function
uses?
Is this SHA1 only for both?
Dereck
It's not strange.
You removed the RSA-* from client side, the result is that the server
can't match anything in common between what the client proposed and what
the server accepts. The error you get has been sent by the server.
--
Erwann ABALEA
Le 11/12/2013 22:34, Walter H. a écrit :
The documentation says:
RSA_PKCS1_OAEP_PADDING
EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding
parameter. This mode is recommended for all new applications.
--
Ken Goldman kgold...@us.ibm.com
914-945-2415 (862-2415)
From: Dereck Hurtubise
[Corrected, sorry for not finished previous mail]
Hello all !
I would like to know if RSA allows plausible deniability ?
I'm on a crypto app, and the RSA_private_* functions seem to return 0 if
error.
I want to implement plausible deniability, deciphering with a wrong key would
work but show
I read that. Still doesn't give me a clue if the hash and the mgf both use
sha1
On Thu, Dec 12, 2013 at 3:21 PM, Kenneth Goldman kgold...@us.ibm.comwrote:
The documentation says:
*RSA_PKCS1_OAEP_PADDING*
EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding
parameter.
Or 'mount -o umask=077' I think.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Machines should not be friendly. Machines should be obedient.
signature.asc
Description: Digital signature
On Thu, Dec 12, 2013, Dereck Hurtubise wrote:
I read that. Still doesn't give me a clue if the hash and the mgf both use
sha1
They do both use SHA1. OpenSSL 1.0.2 and later via the EVP_PKEY interface can
be set to use other digests.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core
|Did you see EVP_MD_size()
at http://www.openssl.org/docs/crypto/EVP_DigestInit.html
|Le 12/12/2013 09:29, Dereck Hurtubise a écrit :
Hello,
Is there an easy way in OpenSSL to call some function which returns
the length of the digest/hash it returns? Like SHA256 would return 32
(maximum
How do you use EVP_MD_size() if the only thing you have is the NID of the
algorithm?
On Thu, Dec 12, 2013 at 5:59 PM, Michel msa...@paybox.com wrote:
Did you see EVP_MD_size()
at http://www.openssl.org/docs/crypto/EVP_DigestInit.html
Le 12/12/2013 09:29, Dereck Hurtubise a écrit :
On Thu, Dec 12, 2013, Dereck Hurtubise wrote:
How do you use EVP_MD_size() if the only thing you have is the NID of the
algorithm?
Call EVP_get_digestbynid() to get the EVP_MD first.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see:
14 matches
Mail list logo