See http://openssl.org/support/faq.html#PROG1 and
http://openssl.org/docs/crypto/threads.html
--
"The World is a book, and those who do not travel read only a page." -
St. Augustine.
__
OpenSSL Project
On 18 March 2010 10:09, Victor Duchovni
wrote:
> It is always enabled, no special compilation flags required.
>
> Applications have to enable NULL ciphers explicitly at runtime. Do not
> recompile with a broken DEFAULT cipher list, just configure applications
> that know what they are doing to use
Hello openssl-users,
I am trying to have eNULL (null cipher) enabled while compiling
openssl from source.
I've tried with 0.9.8g source and providing the enable- option to the
configure script with no luck.
I've tried combinations like enable-null, enable-eNULL,
enable-null-md5, etc with
(I beli
On Sun, Jul 6, 2008 at 10:22 PM, Ger Hobbelt <[EMAIL PROTECTED]> wrote:
> http://www.virustotal.com/
>
> you can upload the file and have it analyzed by multiple
> virus/trojan/etc. scanners. Provides a nice report of the results. For
> those files that make you go 'hr'.
The result : http://ww
On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED]> wrote:
> You can download the soft from here:
> http://www.limina.com.ar/Downloads/RosPKI-EN-Demo.exe
LOL, asking users in a *security* list to download and run a random
executable from the Internet and without source code, I wonder how
On Tue, Apr 29, 2008 at 5:03 AM, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
> The call to EVP_EncryptInit_ex() uses the default key length for the cipher
> unless told otherwise. For Blowfish this is 128 bits but you have a 56 byte
> (?) key. You need to set the key length using
> EVP_CIPHER
Hello,
I'm trying to encrypt a few bytes (as a trial run) with the same key
and IV with Blowfish in CBC mode and "standard PKCS" padding using
OpenSSL in a C++ app and also using SUN's Java crypto libraries. The
output ciphertext is different in both places which means that I
cannot get them to in
Hello OpenSSL users,
I'm doing Diffie-Hellman key agreement between Java's built-in crypto
and C++ using OpenSSL latest version 0.9.8g.
The key agreement works and the generated shared secret bytes are the
same on the Java and OpenSSL side.
The problem is when I try to use the bytes of the DH sha