Marek Marcola wrote:
Hello,
As an addition to my previous mail,
I can decrypt the data that are encrypted by my application. (It's a
WS-Security Implementation).
But it is not inter-operable with the WSS4J. WSS4J uses bouncy castle
crypto package. The reason is that they use ISO 10126
Hello,
For encryption I can disable the padding in openssl and fill the data up
to a multiplication of a block size as per http://www.w3.org/TR/xmlenc-core.
The spec says a way to pad the block (section : Padding). So in the
decryption process I have to check the last byte to get the pad
Hi all,
I'm a new user trying to use the EC_DH benefits on key sharing.
But I'm having some problems to understand how it works...
First, in(ecdhtest.c),
aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
it generates the following key in both sides Alice and Bob
key Alice =
Hi all,
here I come again.
I'm testing the ECDSAtest.c approach to make my own test and I saw one
thing that I don't really know if it's right.
I'm sorry about taking your time, but I'm really trying to learn EC!
01 int main() {
02 const char message[] = abc;
03 unsigned char digest[20];
04
[EMAIL PROTECTED] wrote:
Hi all,
here I come again.
I'm testing the ECDSAtest.c approach to make my own test and I saw one
thing that I don't really know if it's right.
I'm sorry about taking your time, but I'm really trying to learn EC!
01 int main() {
02 const char message[] = abc;
03
[EMAIL PROTECTED] wrote:
Hi all,
I'm a new user trying to use the EC_DH benefits on key sharing.
But I'm having some problems to understand how it works...
First, in(ecdhtest.c),
aout=ECDH_compute_key(abuf,alen,EC_KEY_get0_public_key(b),a,KDF1_SHA1);
it generates the following key in both
Nils, thanks.
That's what I though, but I've looked rc5 up in the /crypto/rc5/rc5*.{h,c}
files, and I don't know how to suply this key, 'cause it generates its key
by its own, i.e, through RC5_32_set_key method.
Is there another way to use this shared key(or one part of it) from EC_DH,
in the rc5
It's best if you tag your in/out files with '.pem', '.csr', '.crt'. I
realize that UNIX doesn't deal with file extensions, but it goes a
LONG way to help with debugging.
Do you have a file called ./private/ca-key.pem? It is looking for the
CA's private key, which is located in the same file as
What are the contents of your openssl.cnf? Are you using precisely
the same configuration you were using with earlier versions of
openssl?
If you have the ability to use an older version of openssl with the
same configuration file, does it currently work?
-Kyle H
On 12/15/06, Alex [EMAIL
I'm trying to retrace your steps to figure out where the bug could be
(and honestly, the diagnostics are not that helpful). However, there
is one more thing that I would like you to check: Is the file
./ca-cert.pem in place, and does it contain a certificate?
If it does not have the text
10 matches
Mail list logo