On Wed, Feb 24, 2016, Neptune wrote:
> Using:
> FIPS Object Module 2.0.9
> OpenSSL 1.0.1l
>
> When I call RSA_generate_key:
> if (rsa = RSA_generate_key(keySize, RSA_F4, NULL, NULL))
>
> I get the following error string:
> (OPENSSL error:04081078:rsa routines:RSA_
Using:
FIPS Object Module 2.0.9
OpenSSL 1.0.1l
When I call RSA_generate_key:
if (rsa = RSA_generate_key(keySize, RSA_F4, NULL, NULL))
I get the following error string:
(OPENSSL error:04081078:rsa routines:RSA_BUILTIN_KEYGEN:key size too small)
As I understand, RSA Key size must be 2048
I would like to call this function to generate the same public/private
key everytime.
I thought all I had to do was create the same seed using RAND_seed each
time, however I still keep getting different key pairs.
Is there any way to have RSA_generate_key generate the same
public/private key
RSA_generate_key generate the same
public/private key each time? (I know this doesn’t make sense security
wise, but the work I have to do requires it).
Replace RSA_generate_key with your own function that returns the desired
key. Using the same seed each time won't work because intervening
operations can
Hi David,
1. I am not sure what you mean by replacing RSA_generate_key with my own
function, because I would like it to go through the process of creating
prime numbers, and modulus, etc. Basically I want the RSA_generate_key
to generate the same public key at startup each time my process runs
Hi ,
Someone could y tell me how can I extract public and private keys from RSA
structure returned by the function RSA_generate_key?
I'm using openssl in my c simulation work and I must exchange public keys
between simulated server and client, the encrypt and decrypt the message..
I cannot
text; //Sample text (plain text) to Encrypt/Decrypt
char *ciphertext;
printf(%s\n,plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf(NO RSA!\n\n
On Wed, Aug 11, 2010, krishnamurthy santhanam wrote:
I am able to generate key. how to do seed PRNG before generating key?
The PRNG is seeded automatically using platform specific entropy. If it wasn't
they key would not be generated and you'd get a PRNG not seeded error.
Steve.
--
Dr
= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf(NO RSA!\n\n);
ERR_load_crypto_strings();
ERR_print_errors_fp(stdout);
}
else
{
printf(RSA OK!\n
?
#includestdio.h
#includeopenssl/rsa.h
#includestring.h
int main()
{
char *plain=Sample text; //Sample text (plain text) to
Encrypt/Decrypt
char *ciphertext;
printf(%s\n,plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size
*ciphertext;
printf(%s\n,plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf(NO RSA!\n\n);
ERR_load_crypto_strings();
ERR_print_errors_fp(stdout);
}
else
=Sample text; //Sample text (plain text) to Encrypt/Decrypt
char *ciphertext;
printf(%s\n,plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf(NO RSA!\n\n
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf(NO RSA!\n\n);
ERR_load_crypto_strings();
ERR_print_errors_fp(stdout);
}
else
{
printf(RSA OK!\n
PROTECTED]
To: openssl-bugs@openssl.org
Subject: 0.9.8a: DSA_generate_parameters RSA_generate_key not in libcrypto
X-Virus-Scanned: by amavisd 0.1
X-Virus-Scanned: by amavisd 0.1
I am not sure if this is a bug or something that was never defined to work.
I tried to build openssh-4.3p2 against
Hi,
I'm trying to create an RSA keypair with the RSA_generate_key function.
After seeding the PRNG with some random values, I call RSA_generate_key this way:
RSA *pRsa = RSA_generate_key(
1024, // key length
257, // exponent
progress, // shows progress
NULL
Please ignore that message: I accidently linked against the OpenSSL library
while using libeay32.dll from the MKS toolkit :-/
-Oorspronkelijk bericht-
Van: Heusden van, FJJ (Folkert)
Verzonden: dinsdag 11 mei 2004 10:49
Aan: '[EMAIL PROTECTED]'
Onderwerp: RSA_generate_key: n/e/d
16 matches
Mail list logo