hi:
2011/4/20 Mike Mohr :
> IMHO openssl is unsuitable for this purpose. Openssl is really good
> at what it does, don't get me wrong, but using it in a boot loader
> probably isn't the easiest/smartest idea. What you really want is a
> subset of PKCS#1 - that is, EMSA-PSS encoding and verificat
hi all:
I am quite curious about the format of openssl speed of digest.
Take sha1 for example, below are the results on my machine:
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes
sha1 1194.73k
hi all:
My quesitons about openssl are below:
1. I want to take advantage of RSA and SHA in openssl for secure booting.
Can they run as standalone program, that means they can run without
libc support.
2. I want RSA and sha authentication run in DRAM instead of flash,
such that the speed will be
Hi:
2009/8/31 Dave Thompson :
>> From: owner-openssl-us...@openssl.org On Behalf Of loody
>> Sent: Friday, 28 August, 2009 04:15
>
>> > the above mean aes-128 cbc will use 55113.2k bytes/second while
>> > encrypting/decrypting 16btytes plain text?
>
> This
2009/8/28 loody :
> Hi:
> thanks for your help.
> 2009/8/28 David Schwartz :
>>
>> loody wrote:
>>
>>> Dear all:
>>> I measure my cpu's performance with "openssl speed"
>>> below are the output:
>>> # openssl speed rsa
Hi:
thanks for your help.
2009/8/28 David Schwartz :
>
> loody wrote:
>
>> Dear all:
>> I measure my cpu's performance with "openssl speed"
>> below are the output:
>> # openssl speed rsa
>> Doing 512 bit private rsa's for 10s: 11828
Dear all:
I measure my cpu's performance with "openssl speed"
below are the output:
# openssl speed rsa
Doing 512 bit private rsa's for 10s: 11828 512 bit private RSA's in 9.83s
available timing options: TIMES TIMEB HZ=100 [sysconf value]
timing function used: times
signverify
Hi:
2009/7/27, Dr. Stephen Henson :
> On Mon, Jul 27, 2009, loody wrote:
>
>> Dear all:
>> When executing my sample code, I got the message below:
>> error:0406B07A:lib(4):func(107):reason(122)
>>
>> My question are:
>> 1. after checking crypto/err
Dear all:
When executing my sample code, I got the message below:
error:0406B07A:lib(4):func(107):reason(122)
My question are:
1. after checking crypto/err/err.h
#define ERR_LIB_RSA 4
the error seems comes from RSA, but how can I find the code name
of func and reason?
2. is there any
hi:
2009/5/22 Kyle Hamilton :
> On Thu, May 21, 2009 at 11:55 PM, loody wrote:
>> Hi:
>>
>> thanks for your help.
>> By your explanation, in der form, the leading 00 seems like a padding byte.
>> ( Is there spec which says it must put 00 here?)
>> from my
Hi all
2009/5/22 David Schwartz :
>
>> Dear all:
>> at the end of letter, I append the the public key I excerpted from my
>> certificate by openssl x509.
>> Since the key is 2048 bits, 256 bytes, I find the length of
>> 00:af:..14:f7
>> is 257 bytes.
>
> Right. In BER/DER form, without the lead
Hi:
2009/5/22 David Schwartz :
>
>> Dear all:
>> at the end of letter, I append the the public key I excerpted from my
>> certificate by openssl x509.
>> Since the key is 2048 bits, 256 bytes, I find the length of
>> 00:af:..14:f7
>> is 257 bytes.
>
> Right. In BER/DER form, without the leadin
Dear all:
at the end of letter, I append the the public key I excerpted from my
certificate by openssl x509.
Since the key is 2048 bits, 256 bytes, I find the length of 00:af:..14:f7
is 257 bytes.
But I use -modulus parameter, I see the beginning 00 will disappear
and the size if 256 bytes as
Dear all:
I have some questions about DH in crypto
1. can we assign different generator in DH, since the default is 2, 3 or 5.
2. the p is randomly generated from BN_generate_prime_ex in
dh_buildtin_genparams.
if I have a p already, can I directly pass to DH*ret instead of
randomly generating it
2009/2/18 Ger Hobbelt :
> On Tue, Feb 17, 2009 at 11:30 PM, Victor Duchovni
> wrote:
>>> Why are you trying to enforce the idea of cryptography as a black box,
>>> rather than something that people should learn about?
>>
>> Because in amost all cases that's exactly the right advice.
>
> Well, yes,
2009/2/17 Victor Duchovni :
> On Mon, Feb 16, 2009 at 01:48:54PM +0800, loody wrote:
>
>> Dear all:
>> I want to realize aes, so I trace enc_main in enc.c.
>> But I find there are a lot call back functions such that I spend more
>> time on tracing these call back fu
Dear all:
I want to realize aes, so I trace enc_main in enc.c.
But I find there are a lot call back functions such that I spend more
time on tracing these call back functions than understanding aes
algorithm.
I have studied the aes flow chart on the wiki,
http://en.wikipedia.org/wiki/Advanced_Encr
17 matches
Mail list logo