Hello,
thanks your answer, it was really detailed.
Tamas
On Mon, 2012-03-19 at 21:30 -0400, Dave Thompson wrote:
> RE: ACK message usage
__
OpenSSL Project http://www.openssl.org
User Support Mail
Thanks a lot Dave for pointing out few things which i need to take care. By
the way as this is not complete code, original code already has taken care
of few things.
Now coming to the original question, how do i make sure
PKCS5_PBKDF2_HMAC_SHA1() is generating the correct result of my i/p data?
Dear All,
Thanks for reply.
And I have more question. For example, the actual file size is 16B, and it
will be encrypted to 32B.
Then, how does decrypt side know its actual size is 16B or 17B?
2012/3/20 Dave Thompson
> > From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm
> > Sent:
> From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm
> Sent: Monday, 19 March, 2012 13:25
> On 3/19/2012 5:26 PM, Nicle wrote:
> > Hi all,
> >
> > I can understand if file-size%16 != 0, openssl will pad data.
> >
> > But it will also pad 16bytes for those file size exactly 16 times.
> >
> From: owner-openssl-us...@openssl.org On Behalf Of Fekete, Tamás
(lesswire AG Ungarn)
> Sent: Saturday, 17 March, 2012 01:03
> But I am thinking, maybe a trivial question to you.
> Do I need use something "to ACK" messages?
Maybe. It depends on your application(s).
SSL/TLS,
> From: owner-openssl-us...@openssl.org On Behalf Of Mr.Rout
> Sent: Sunday, 18 March, 2012 03:55
> We have fixed the Segment lost issue which was causing Packet
> drop. But we
> are still seeing the "Encryption Alert" again. I am attaching one more
> packet capture which has all the information.
> From: owner-openssl-us...@openssl.org On Behalf Of pkumarn
> Sent: Monday, 19 March, 2012 03:06
> I am trying to use PKCS5_PBKDF2_HMAC_SHA1() and below is my
> sample program.
> I wanted to make sure if my result of
> PKCS5_PBKDF2_HMAC_SHA1() is correct so
> i verified the same with the below
It makes the response unambiguous.
If a 16 byte file was not padded, how does the receiver know whether the
file was 16 bytes or 1-15 bytes plus padding.
By having at least one byte of padding, and (in some padding schemes)
having the padding itself define the number of padding bits, one can
On 3/19/2012 5:26 PM, Nicle wrote:
Hi all,
I can understand if file-size%16 != 0, openssl will pad data.
But it will also pad 16bytes for those file size exactly 16 times.
For example: original file size 16 bytes, cipher file size: 32 bytes.
Any help will be so appreciated.
Best Regards
Neo
Hi all,
I can understand if file-size%16 != 0, openssl will pad data.
But it will also pad 16bytes for those file size exactly 16 times.
For example: original file size 16 bytes, cipher file size: 32 bytes.
Any help will be so appreciated.
Best Regards
Neo
On Fri, Mar 16, 2012 at 4:14 PM, Jakob Bohm wrote:
> On 3/15/2012 7:04 PM, pankaj jain wrote:
>
>> Hi,
>> I am using openssl-0.9.8 release;
>> I could not find any documentation if it supports RFC-5280.
>>
>> basically I am looking for the answers about following capabilities:
>>
>> 1. While rece
Hi,
I have a requirement of wrapping a 512-bit DEK witk 256 bit KEK. I picked up
openssl API and figured out that it provides AES_wrap_key() to do the job. I
wrote a small program (snippet below) to get the job done but when i check
out the values in "dek", i see all values as zero. Not sure what
Hi All,
I am trying to add tls resumption code in my currently existing application
which uses openssl-0.9.8l. Its already includes 4507 patch. Please let me
know is it contains any vulnerability or shall I use the TLS SessionTickets
extension patch which supports RFC 5077.
Thanks in Advance
Bes
On 3/19/2012 7:50 AM, grarpamp wrote:
Since OpenSSL 0.9.8 is still in widespread use it will still be
maintained for some time yet.
I think part of this is may due to the new 1.x.x releases not
being able to compile on older releases of operating systems.
Perhaps a short round of effort in resol
Hi,
I am trying to use PKCS5_PBKDF2_HMAC_SHA1() and below is my sample program.
I wanted to make sure if my result of PKCS5_PBKDF2_HMAC_SHA1() is correct so
i verified the same with the below wesbite http://anandam.name/pbkdf2/ and i
see a different result... Am i using the API correctly?
I am ha
15 matches
Mail list logo