There is example code for doing RSA PSS with OpenSSL at
https://www.idrix.fr/Root/Samples/openssl_pss_signature.c
On Tue, May 12, 2020 at 11:59 AM John McCabe wrote:
> Hi,
> I've searched around, but found nothing that appears to help.
>
> I'm developing some software where I may be given a fi
Unless buffer is a char* instead of a char[] in which case its completely
wrong. A very common case among buggy C code.
On Wed, Nov 27, 2019 at 7:09 AM Phillip Susi wrote:
>
> Michael Wojcik writes:
>
> > Some C experts have argued that the length-checking versions of the
> library functions
Assuming your OpenSSL library is already FIPS capable you need to build and
link with the FIPS container library enable the integrity check in your app.
Details are in section C.1 of the FIPS user guide at
https://www.openssl.org/docs/fips/UserGuide-2.0.pdf
On Thu, Jun 6, 2019 at 2:34 PM Larry J
re changes
dont screw something up.
On Fri, Jan 25, 2019 at 4:18 PM Matt Caswell wrote:
>
>
> On 25/01/2019 20:16, Andrew Tucker wrote:
> > I was doing some comparisons of XTS and GCM mode using the EVP APIs and
> found a
> > discrepancy that seems to be an issue with XTS.
&g
I was doing some comparisons of XTS and GCM mode using the EVP APIs and
found a discrepancy that seems to be an issue with XTS.
In GCM mode if the buffer is encrypted in one call to EVP_EncryptUpdate or
with several calls with smaller buffers the resulting ciphertext is the
same, as I would expect