Working with RSA Public Key in a local char []

2005-10-10 Thread guvenma (sent by Nabble.com)
Hello, Instead of reading the public key from a file (PEM), I would like to be able to keep the key string in a local char[] variable and be able to generate the RSA*rsa object from it. Can anyone tell me what BIO_xxx steps would be needed to achieve that? Any suggestions would be appreciated.  I

RE: Generating AES Keys using command line

2005-10-10 Thread Adam Jones
I will keep note of that. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Joseph Oreste Bruni Sent: Monday, October 10, 2005 4:06 PM To: openssl-users@openssl.org Subject: Re: Generating AES Keys using command line Try not to use that common indiscrimina

Re: Generating AES Keys using command line

2005-10-10 Thread Joseph Oreste Bruni
Try not to use that common indiscriminately as it will deplete valuable entropy from your system. -Joe On Oct 10, 2005, at 1:58 PM, Adam Jones wrote: Thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kent Yoder Sent: Monday, October 10, 2005

RE: Generating AES Keys using command line

2005-10-10 Thread Adam Jones
Thanks! -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kent Yoder Sent: Monday, October 10, 2005 3:49 PM To: openssl-users@openssl.org Subject: Re: Generating AES Keys using command line openssl rand 16 > aes128.key On 10/10/05, Adam Jones <[EMAIL PROT

Re: Generating AES Keys using command line

2005-10-10 Thread Kent Yoder
openssl rand 16 > aes128.key On 10/10/05, Adam Jones <[EMAIL PROTECTED]> wrote: > > > Does anyone know how to generate AES 128, 192, 0r 256 keys using the openssl > command line. -- Kent Yoder IBM LTC Security Dev. __ OpenSSL Pr

Generating AES Keys using command line

2005-10-10 Thread Adam Jones
Does anyone know how to generate AES 128, 192, 0r 256 keys using the openssl command line.

What action should be taken when password too long?

2005-10-10 Thread Nadav Golombick
When the password to be returned in the callback function is too long for the buffer given, what action should be taken? Should zero be returned or a truncuated password? Thanks, -- Nadav Golombick __ OpenSSL Project