RSA padding scheme for EVP_SealInit() ?

2022-11-03 Thread Norm Green
Hi In OpenSSL 3.x, what RSA padding scheme does EVP_SealInit() use? PKCS1 or OAEP ? In 1.1, I wrote my own version of this code that forced the padding to be OAEP and am wondering if I still need that in 3.x. Norm Green

RSA padding

2012-06-18 Thread Roger No-Spam
Hi, I need to do RSA encryption/decryption using OAEP according to rfc 3447/PKCS#1 v2.1. The documentation for RSA_public_encrypt states that with the RSA_PKCS1_OAEP_PADDING padding flag you get 'EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding parameter'. This is wha

Re: Using OAEP/PSS RSA padding with CMS

2010-10-26 Thread Michael Orlov
> This is not currrently supported. The latest development releases > include support for PSS in certificates and certificate requests but > no OAEP/PSS support for CMS yet. > > Do you know of any examples using these modes? I don't know of any such examples. I thought about using OpenSSL's CMS f

Re: Using OAEP/PSS RSA padding with CMS

2010-10-26 Thread Dr. Stephen Henson
On Sun, Oct 24, 2010, Michael Orlov wrote: > Hi, > > What is the default RSA padding that is used in CMS when signing and > when encrypting messages? > > Is there any way to influence the choice of padding in CMS? E.g., use > PSS for signing and OAEP for encryption

Using OAEP/PSS RSA padding with CMS

2010-10-23 Thread Michael Orlov
Hi, What is the default RSA padding that is used in CMS when signing and when encrypting messages? Is there any way to influence the choice of padding in CMS? E.g., use PSS for signing and OAEP for encryption when using RSA, as is possible for dgst (sigopt) / pkeyutl (pkeyopt) with

RSA padding SSL Bulk Connection

2009-03-24 Thread Kazım SARIKAYA
: 29 of 1400) connection. However sometimes I can not get any error. The error is about RSA padding while checking client certificate verify. I search at mail list for these problems. Although I found some similar topics about this problem, they are not same as mines. The log of problem is

RSA padding SSL Bulk Connection

2009-03-23 Thread Kazim SARIKAYA
(ex: 29 of 1400) connection. However sometimes I can not get any error. The error is about RSA padding while checking client certificate verify. I search at mail list for these problems. Although I found some similar topics about this problem, they are not same as mines. The log of problem is

Re: RSA padding problem

2006-04-03 Thread Marek Marcola
Hello, Change line: > returnvalue=RSA_private_decrypt(8,pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING); > to someting like that: returnvalue=RSA_private_decrypt(RSA_size(mykey),pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING); Best regards, -- Marek Marcola <[EMAIL PROTECTED]>

RSA padding problem

2006-04-02 Thread Matt Geimer
Hi, I am working on a program that does bulk encryption key exchange similar to SSH.  I am running into a problem with RSA_private_decrypt, it returns -1 and tells me padding error, no matter which padding scheme I use.   The main goal is to encrypt a Blowfish key to send over the wire and t

Re: RSA padding scheme, plz help!

2003-03-17 Thread Michelle Li
That helped a lot! Thanks, Greg! Michelle On Fri, 14 Mar 2003, Gregory Stark wrote: > > - Original Message - > From: "Michelle Li" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Wednesday, March 12, 2003 9:38 AM > Subject: RSA padding

RSA padding scheme, plz help!

2003-03-12 Thread Michelle Li
Hi all, Could someone tell me what kind of padding does OpenSSL's crypto library use when implementing RSA asymmetric keys operations? I'm learning to write a smart card application and I want to use openssl's crypto library to do the off-card part of the application. I need to use the exact same

Possible problems with RSA padding

2000-05-27 Thread Lutz Jaenicke
Hi, in the last days I have implemented BIO-pairs into the Postfix/TLS code. Due to this change, I found the following errors with some communication peers: May 24 09:42:25 serv01 postfix/smtpd[10264]: verify error:num=19:self signed certificate in certificate chain May 24 09:42:25 serv01 postfi

Re: RSA padding

1999-06-09 Thread Holger Reif
Erwann ABALEA schrieb: > > On Wed, 9 Jun 1999, Holger Reif wrote: > > > ÃÖ¿ë»ï schrieb: > > > > > > Basic assumption here is, > > > 1. RSA Key size : 256 > > > > Just remember, this counts for 32 byte... > > > > > 2. size of message to be encrypted : 33 > > > > ...which would make it impossible

Re: RSA padding

1999-06-09 Thread Erwann ABALEA
On Wed, 9 Jun 1999, Holger Reif wrote: > ÃÖ¿ë»ï schrieb: > > > > With reference to rsa.h, > > I found that there are four kinds of padding. > > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING. > > > > Basic assumption here is, > > 1. RSA Key size : 256 > > Just remember, this

Re: RSA padding

1999-06-09 Thread Holger Reif
ÃÖ¿ë»ï schrieb: > > With reference to rsa.h, > I found that there are four kinds of padding. > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING. > > Basic assumption here is, > 1. RSA Key size : 256 Just remember, this counts for 32 byte... > 2. size of message to be encrypted

Re: RSA padding

1999-06-09 Thread Dr Stephen Henson
[EMAIL PROTECTED] wrote: > > With reference to rsa.h, > I found that there are four kinds of padding. > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING. > > Basic assumption here is, > 1. RSA Key size : 256 > 2. size of message to be encrypted : 33 > With a keysize of 256 bit

Re: RSA padding

1999-06-09 Thread Sean O Riordain
Hi, I was looking at this sort of stuff recently and I'm a still a relative beginner at OpenSSL, so if I'm way out of order, I'm sure someone from the core group will straighten me out ;-) anyway, if my understanding is correct... demos/maurice/example2.c shows how to use the EVP stuff ... which

RSA padding

1999-06-09 Thread ÃÖ¿ë»ï
With reference to rsa.h, I found that there are four kinds of padding. Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING. Basic assumption here is, 1. RSA Key size : 256 2. size of message to be encrypted : 33 1) in case of RSA_NO_PADDING, len = RSA_public_encrypt(what_number_h