Hello,
Instead of reading the public key from a file (PEM), I would like to be able to keep the key string in a local char[] variable and be able to generate the RSA*rsa object from it. Can anyone tell me what BIO_xxx steps would be needed to achieve that? Any suggestions would be appreciated. I
I will keep note of that.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Joseph Oreste Bruni
Sent: Monday, October 10, 2005 4:06 PM
To: openssl-users@openssl.org
Subject: Re: Generating AES Keys using command line
Try not to use that common indiscrimina
Try not to use that common indiscriminately as it will deplete
valuable entropy from your system.
-Joe
On Oct 10, 2005, at 1:58 PM, Adam Jones wrote:
Thanks!
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kent Yoder
Sent: Monday, October 10, 2005
Thanks!
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kent Yoder
Sent: Monday, October 10, 2005 3:49 PM
To: openssl-users@openssl.org
Subject: Re: Generating AES Keys using command line
openssl rand 16 > aes128.key
On 10/10/05, Adam Jones <[EMAIL PROT
openssl rand 16 > aes128.key
On 10/10/05, Adam Jones <[EMAIL PROTECTED]> wrote:
>
>
> Does anyone know how to generate AES 128, 192, 0r 256 keys using the openssl
> command line.
--
Kent Yoder
IBM LTC Security Dev.
__
OpenSSL Pr
Does anyone know how
to generate AES 128, 192, 0r 256 keys using the openssl command
line.
When the password to be returned in the callback function is too long
for the buffer given, what action should be taken?
Should zero be returned or a truncuated password?
Thanks,
--
Nadav Golombick
__
OpenSSL Project