Classification: For internal use only
Thanks Jakob.
Do you have any pointers around "script that decodes the
Content-Transfer-Encoding" ? Is there something that is widely used ?
Thanks and Regards,
Dwipin Chandran.
From:
Jakob Bohm
To:
openssl-users@openssl.org,
Date:
04/04/2013 11:02 PM
I am trying to generate a shell script to run the fips algorithim tests
for CAVP testing on our platform. When running the test vectors through
fipsalgtest.pl to generate the script, I get some file name errors. It
looks like the fipsalgtest.pl perl script doesnt know about 186-3 files
yet a
On 4/4/2013 9:00 AM, Dwipin C wrote:
Classification: For internal use only
Hi,
I am using openssl - "OpenSSL 0.9.8e 23 Feb 2007" on Solaris. I need to
use this to decrypt and verify AS2 messages coming in from customers. Is
this possible ?
OpenSSL 0.9.8e is an old insecure version, please upg
On 4/4/2013 11:53 AM, Sameer Stephen wrote:
Hi,
I am building an application which needs TLSv1.2 protocol. I am getting
following issues with openssl-1.0.1c version:
Issue 1: openssl command errors out
=> openssl ciphers -v 'TLSv1.2'
Error in cipher list
47767988151392:error:140E6118:SSL
rou
-KF and -ivF seems like a good approach to me as a user.
Thanx
A.
On 04/04/2013 08:37 AM, Stern, Andrew wrote:
It seems like it would be easy to add an option to the enc command to get the
key and IV from a file by providing the file location to the command line. For
instance we could add -KF
It seems like it would be easy to add an option to the enc command to get the
key and IV from a file by providing the file location to the command line. For
instance we could add -KF path and -ivF path to the command line options and
have the enc get the real values from within these files. Th
On 04/04/2013 05:41 AM, Salz, Rich wrote:
read -sp "Enter path to key: " key
read -sp "Enter IV: " iv
openssl enc -e -aes256 -K $key -iv $iv -in ... -out ...
That doesn't help; the key is STILL in the argv list and can be seen by doing a
ps.
/r$
Your right, my apologies. Doesn't look l
Hi,
I am building an application which needs TLSv1.2 protocol. I am getting
following issues with openssl-1.0.1c version:
Issue 1: openssl command errors out
=> openssl ciphers -v 'TLSv1.2'
Error in cipher list
47767988151392:error:140E6118:SSL routines:SSL_CIPHER_PROCESS_RULESTR:invalid
comma
Wow, that's a lot of output :)
First of all, you need -lssl and -lcrypto. Where did you install the OpenSSL
libraries, are they in a common place that your compiler can find? If not,
you'll need to add -L/ where is the path to the place where the
libraries (libssl.a for example) can
> read -sp "Enter path to key: " key
> read -sp "Enter IV: " iv
> openssl enc -e -aes256 -K $key -iv $iv -in ... -out ...
That doesn't help; the key is STILL in the argv list and can be seen by doing a
ps.
/r$
--
Principal Security Engineer
Akamai Technology
Cambridge, MA
___
This really isn't something that is OpenSSL specific. But you can always
look into the 'read' (ie. man read) command, example:
read -sp "Enter path to key: " key
read -sp "Enter IV: " iv
openssl enc -e -aes256 -K $key -iv $iv -in ... -out ...
On 04/03/2013 02:59 PM, grajdean wrote:
openssl enc
openssl enc -e -aes256 -K xxx -iv xxx -in ... -out ...
While the above command executes, if someone were to issue a ps -ef, the
K/iv leak. How would one specify the Key/iv to protect against this?
I'm looking for something akin to -pass file:xxx, but not for passwords
and for keys directly.
Classification: For internal use only
Hi,
I am using openssl - "OpenSSL 0.9.8e 23 Feb 2007" on Solaris. I need to
use this to decrypt and verify AS2 messages coming in from customers. Is
this possible ?
I do not see a "cms" option available.
When I use openssl smime -verify -CAfile -out ,
14 matches
Mail list logo