Apr 6, 2012 at 1:41 PM, Prashanth kumar N <
prashanth.kuma...@gmail.com> wrote:
> Thanks Dave for your great support... you rock... after changing KEYBITS,
> it worked... my ignorance that i mistook it for Key and set it to 512...
> Please find my response below...
>
> Firstly
Thanks Dave for your great support... you rock... after changing KEYBITS,
it worked... my ignorance that i mistook it for Key and set it to 512...
Please find my response below...
Firstly Jeff,
256 is valid KEK and max one. Key can be of 'n' blocks each block being 64
bits in size and 'n' should
You can use the below API's
RAND_bytes()
RAND_pseudo_bytes()
On Thu, Apr 5, 2012 at 12:33 AM, Jeremy Farrell
wrote:
> http://lmgtfy.com/?q=openssl+random+number
>
> > From: Alex Chen [mailto:alex_c...@filemaker.com]
> >
> > There is a 'rand' command in the openssl command line tool to generat
ast 8 bytes (filed with value 8).
> For printf() you may fill this last 8 bytes to 0.
>
> Best regards,
> --
> Marek Marcola
>
>
> owner-openssl-us...@openssl.org wrote on 03/29/2012 04:02:17 PM:
>
> > Prashanth kumar N
> > Sent by: owner-openssl-us...@open
Bit confusing... are you saying that i need to add NULL termination at the
end of encrypted data? Isn't this wrong? I assume i shouldn't be NULL
terminating the input string which needs to be encrypted.
On Thu, Mar 29, 2012 at 7:10 PM, Ken Goldman wrote:
> On 3/29/2012 1:40 AM, Pr
i missing something?
lpermalink.gmane.org/gmane.comp.encryption.openssl.devel/18755
On Thu, Mar 29, 2012 at 4:07 PM, Dr. Stephen Henson wrote:
> On Thu, Mar 29, 2012, Prashanth kumar N wrote:
>
> > Thanks Marek. I will try the attached code in the attached files.
> > In many
; owner-openssl-us...@openssl.org wrote on 03/28/2012 09:01:25 AM:
>
> > Prashanth kumar N
> > Sent by: owner-openssl-us...@openssl.org
> >
> > 03/28/2012 09:03 AM
> >
> > Please respond to
> > openssl-users@openssl.org
> >
> > To
> >
> > o
n function?
3. Why is it like we have to choose 1024 as array size... when i know my
encryption text is only 16bytes. Any reasons?
-Prashanth
On Wed, Mar 28, 2012 at 7:29 PM, Ken Goldman wrote:
> On 3/28/2012 3:01 AM, Prashanth kumar N wrote:
>
>> Here is the modified program
&g
On Wed, Mar 28, 2012, at 12:32 PM, Prashanth kumar N wrote:
> > I tried to use EVP but let if of go due to bad documentation...
> >
> > On Wed, Mar 28, 2012 at 2:49 AM, Jakob Bohm
> > wrote:
> >
> > > On 3/27/2012 10:42 PM, Jeffrey Walton wrote:
Jeff.. this is good idea... so are you going to start one?
-Prashanth
On Wed, Mar 28, 2012 at 6:15 AM, Jeffrey Walton wrote:
> On Tue, Mar 27, 2012 at 4:26 PM, Ken Goldman wrote:
> > On 3/27/2012 3:51 PM, Jakob Bohm wrote:
> >>
> >> On 3/27/2012 9:37 PM, Dr. Stephen Henson wrote:
> >>>
> >>> Y
I tried to use EVP but let if of go due to bad documentation...
On Wed, Mar 28, 2012 at 2:49 AM, Jakob Bohm wrote:
> On 3/27/2012 10:42 PM, Jeffrey Walton wrote:
>
>> On Tue, Mar 27, 2012 at 4:26 PM, Ken Goldman wrote:
>>
>>> On 3/27/2012 3:51 PM, Jakob Bohm wrote:
>>>
On 3/27/2012 9:37 PM
Here is the modified program
#include
2 #include
3
4 static const unsigned char key[] = {
5 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
6 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff,
7 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
8 0x08, 0x09, 0x0a, 0x
Hi Dave,
I was going through the RFC of AES and it does say we get the IV upon
unwrapping . Check the below link
http://www.ietf.org/rfc/rfc3394.txt
-Prashanth
On Fri, Mar 23, 2012 at 9:24 AM, Dave Thompson wrote:
> > From: owner-openssl-us...@openssl.org On Behalf Of pkumarn
> > Sent: Wednesda
13 matches
Mail list logo