Hello,
>I just want to store some authentication data - a username, group and
>date - on a "token", which only offers a passive storage (116 byte
>EEPROM) without any cryptografic functions, to save a secret
>(normally a private key) from outside access. So this authentication
>data must be encrypt
On Mon, Jun 04, 2007, Brian Craft wrote:
> >From a brief look at the cert validation code, it appears that there's
> no way to do non-blocking IO while performing on-line revocation checks,
> e.g. querying a CDP or an OCSP responder.
>
> Is that correct? Specifically, I see in ssl_cert.c a call i
>From a brief look at the cert validation code, it appears that there's
no way to do non-blocking IO while performing on-line revocation checks,
e.g. querying a CDP or an OCSP responder.
Is that correct? Specifically, I see in ssl_cert.c a call is made to
X509_verify_cert(), or a user-supplied ver
* Marek Marcola wrote:
[...]
Or maybe you can send your data in two smaller RSA encrypted
messages ?
I just want to store some authentication data - a username, group and
date - on a "token", which only offers a passive storage (116 byte
EEPROM) without any cryptografic functions, to sav
Hello,
> > * Philippe Stellwag wrote:
> >> is it possible to change the OpenSSL RSA functions so that I can use
> >> a different - may be a variable - block size. At the moment the block
> >> size on the OpenSSL RSA functions depends on the length of the RSA
> >> key pair and the kind of padding (f
* David Schwartz wrote:
But can I use e.g. a 1024 bit key pair with a block size of 116
byte, that is not depending on the problem shown above, isn't it?!
What is the security reason, why not to do this?
That would seriously weaken the security properties.
http://en.wikipedia.org/wiki/RSA
> But can I use e.g. a 1024 bit key pair with a block size of 116
> byte, that is not depending on the problem shown above, isn't it?!
> What is the security reason, why not to do this?
That would seriously weaken the security properties.
http://en.wikipedia.org/wiki/RSA
Read the section on pa
* Marek Marcola wrote:
* Philippe Stellwag wrote:
is it possible to change the OpenSSL RSA functions so that I can use
a different - may be a variable - block size. At the moment the block
size on the OpenSSL RSA functions depends on the length of the RSA
key pair and the kind of padding (follow
Hello,
> is it possible to change the OpenSSL RSA functions so that I can use
> a different - may be a variable - block size. At the moment the block
> size on the OpenSSL RSA functions depends on the length of the RSA
> key pair and the kind of padding (following PKCS#1 v1.5, which means
>
> Hi at all,
>
> is it possible to change the OpenSSL RSA functions so that I can use
> a different - may be a variable - block size. At the moment the block
> size on the OpenSSL RSA functions depends on the length of the RSA
> key pair and the kind of padding (following PKCS#1 v1.5, which means
Hi at all,
is it possible to change the OpenSSL RSA functions so that I can use
a different - may be a variable - block size. At the moment the block
size on the OpenSSL RSA functions depends on the length of the RSA
key pair and the kind of padding (following PKCS#1 v1.5, which means
11
11 matches
Mail list logo