Basically when we encrypt something using an RSA key (whether public or
private), the encrypted value must be smaller than the key (due to the maths
used to do the actual encryption). So if you have a 1024-bit key, in theory
we could encrypt any 1023-bit value (or a 1024-bit value smaller than the
Thanks. As per my understanding,Before sending master key to client , server
has to maintain the master key. How i can get this in server side? is there
any code sample or snippet to get this key?
Krishna
On Tue, Aug 23, 2011 at 11:54 PM, Gayathri Sundar wrote:
> Master key is unique per session,
It's likely you're hitting RT #1593:
http://rt.openssl.org/Ticket/Display.html?id=1593&user=guest&pass=guest
Options include
A) Use a different curve.
B) Use a 64-bit build.
C) upgrade to at least 0.9.8h.
D) Figure out the series of patches to resolve the bug.
E) Hack the code up to resolve it y
Master key is unique per session, and its same for both client and server,
thats the concept behind the SSL handshake. The RFC would state the
information accurately. Perhaps you can send the master secret as part of
ur application data, to the client, which can decrypt and use.
Thanks
--Gayathri
Thanks. I gone through the RFC 2246 and understood the Master key generation
part. The Master key is generated and able to print the client side(test C
program) using ssl strucure.
printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
for (i=0; i<(
Hi
I am attempting to compile Openssl 0.9.8r on a sparc based solaris10 machine.
I am hitting an error when I run "make test", the majority of the tests pass
successfully, but when It gets to the AES tests I am getting a cyphertext
mismatch:
Testing cipher AES-128-ECB(encrypt)
Key
00 01
Hello ,
I tested problematic signature using Bcrypt API on Window7 ,
and function BCryptVerifySignature succeed .
To my mind function ecdsa_do_verify implemented in the OpenSSL has bug.
I do not know how solve this problem?
Thanks for any help.
Mark
-Original Message-
From: owner-opens
I'm trying to create a pkcs#7 detached signature with openssl.
When using this command:
openssl smime -signer signer.cer -inkey key.pem -sign -in file
I get a signature, which is slightly different from what I expect.
I analysed the signature with the signature created by other tool, and only on