On Thu, Dec 12, 2013, Dereck Hurtubise wrote:
> How do you use EVP_MD_size() if the only thing you have is the NID of the
> algorithm?
>
Call EVP_get_digestbynid() to get the EVP_MD first.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see:
How do you use EVP_MD_size() if the only thing you have is the NID of the
algorithm?
On Thu, Dec 12, 2013 at 5:59 PM, Michel wrote:
> Did you see EVP_MD_size()
>
> at http://www.openssl.org/docs/crypto/EVP_DigestInit.html
>
>
> Le 12/12/2013 09:29, Dereck Hurtubise a écrit :
>
> Hello,
>
> I
|Did you see EVP_MD_size()
at http://www.openssl.org/docs/crypto/EVP_DigestInit.html
|Le 12/12/2013 09:29, Dereck Hurtubise a écrit :
Hello,
Is there an easy way in OpenSSL to call some function which returns
the length of the digest/hash it returns? Like SHA256 would return 32
(maximum dig
On Thu, Dec 12, 2013, Dereck Hurtubise wrote:
> I read that. Still doesn't give me a clue if the hash and the mgf both use
> sha1
>
They do both use SHA1. OpenSSL 1.0.2 and later via the EVP_PKEY interface can
be set to use other digests.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core dev
Or 'mount -o umask=077' I think.
--
Mark H. Wood, Lead System Programmer mw...@iupui.edu
Machines should not be friendly. Machines should be obedient.
signature.asc
Description: Digital signature
I read that. Still doesn't give me a clue if the hash and the mgf both use
sha1
On Thu, Dec 12, 2013 at 3:21 PM, Kenneth Goldman wrote:
> The documentation says:
>
> *RSA_PKCS1_OAEP_PADDING*
> EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding
> parameter. This mode is re
[Corrected, sorry for not finished previous mail]
Hello all !
I would like to know if RSA allows plausible deniability ?
I'm on a crypto app, and the RSA_private_* functions seem to return < 0 if
error.
I want to implement plausible deniability, deciphering with a wrong key would
work but show
The documentation says:
RSA_PKCS1_OAEP_PADDING
EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding
parameter. This mode is recommended for all new applications.
--
Ken Goldman kgold...@us.ibm.com
914-945-2415 (862-2415)
From: Dereck Hurtubise
To: openssl-us
It's not strange.
You removed the RSA-* from client side, the result is that the server
can't match anything in common between what the client proposed and what
the server accepts. The error you get has been sent by the server.
--
Erwann ABALEA
Le 11/12/2013 22:34, Walter H. a écrit :
Hello,
Can someone tell me what hash algorithm the RSA_public_encrypt function
uses?
Is this SHA1 only for both?
Dereck
Hello,
Is there an easy way in OpenSSL to call some function which returns the
length of the digest/hash it returns? Like SHA256 would return 32 (maximum
digest length of 32 bytes).
Dereck
Hello all !
I would like to know if RSA allows plausible deniability ?
I'm on a crypto app, and the RSA_private_* functions seem to return < 0 if
error.
I want to implement plausible deniability, deciphering with a wrong key would
work but show a
--
Cordialement, Adnan RIHAN.
Directeur-Géran
Hi All,
When we are trying to build the openssl-1.0.1 in x86-64 board we are facing the
following error
x86cpuid.s: Assembler messages:
x86cpuid.s:8: Error: suffix or operands invalid for `push'
x86cpuid.s:9: Error: suffix or operands invalid for `push'
x86cpuid.s:10: Error: suffix or operands in
> From: owner-openssl-users On Behalf Of Nyyr
> Sent: Tuesday, December 10, 2013 15:37
> I received certificate from CA and it had no alias set:
(as expected; alias is local to your system and CA doesn't know it)
> So I set alias via:
> I then exported the certificate alo
14 matches
Mail list logo