Hi
In OpenSSL 3.x, what RSA padding scheme does EVP_SealInit() use? PKCS1
or OAEP ?
In 1.1, I wrote my own version of this code that forced the padding to
be OAEP and am wondering if I still need that in 3.x.
Norm Green
Hi,
I need to do RSA encryption/decryption using OAEP according to rfc 3447/PKCS#1
v2.1. The documentation for RSA_public_encrypt states that with the
RSA_PKCS1_OAEP_PADDING padding flag you get 'EME-OAEP as defined in PKCS #1
v2.0 with SHA-1, MGF1 and an empty encoding parameter'. This is wha
> This is not currrently supported. The latest development releases
> include support for PSS in certificates and certificate requests but
> no OAEP/PSS support for CMS yet.
>
> Do you know of any examples using these modes?
I don't know of any such examples. I thought about using OpenSSL's CMS
f
On Sun, Oct 24, 2010, Michael Orlov wrote:
> Hi,
>
> What is the default RSA padding that is used in CMS when signing and
> when encrypting messages?
>
> Is there any way to influence the choice of padding in CMS? E.g., use
> PSS for signing and OAEP for encryption
Hi,
What is the default RSA padding that is used in CMS when signing and
when encrypting messages?
Is there any way to influence the choice of padding in CMS? E.g., use
PSS for signing and OAEP for encryption when using RSA, as is possible
for dgst (sigopt) / pkeyutl (pkeyopt) with
: 29 of 1400)
connection. However sometimes I can not get any error. The error is about RSA
padding while checking client certificate verify. I search at mail list for
these problems. Although I found some similar topics about this problem, they
are not same as mines. The log of problem is
(ex: 29
of 1400) connection. However sometimes I can not get any error. The error is
about RSA padding while checking client certificate verify. I search at mail
list for these problems. Although I found some similar topics about this
problem, they are not same as mines. The log of problem is
Hello,
Change line:
> returnvalue=RSA_private_decrypt(8,pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING);
>
to someting like that:
returnvalue=RSA_private_decrypt(RSA_size(mykey),pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING);
Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>
Hi,
I am working on a program that does bulk encryption key exchange similar
to SSH. I am running into a problem with RSA_private_decrypt, it
returns -1 and tells me padding error, no matter which padding scheme I
use. The main goal is to encrypt a Blowfish key to send over the wire
and t
That helped a lot! Thanks, Greg!
Michelle
On Fri, 14 Mar 2003, Gregory Stark wrote:
>
> - Original Message -
> From: "Michelle Li" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, March 12, 2003 9:38 AM
> Subject: RSA padding
Hi all,
Could someone tell me what kind of padding does OpenSSL's crypto library
use when implementing RSA asymmetric keys operations? I'm learning to
write a smart card application and I want to use openssl's crypto library
to do the off-card part of the application. I need to use the exact same
Hi,
in the last days I have implemented BIO-pairs into the Postfix/TLS code.
Due to this change, I found the following errors with some communication
peers:
May 24 09:42:25 serv01 postfix/smtpd[10264]: verify error:num=19:self signed
certificate in certificate chain
May 24 09:42:25 serv01 postfi
Erwann ABALEA schrieb:
>
> On Wed, 9 Jun 1999, Holger Reif wrote:
>
> > ÃÖ¿ë»ï schrieb:
> > >
> > > Basic assumption here is,
> > > 1. RSA Key size : 256
> >
> > Just remember, this counts for 32 byte...
> >
> > > 2. size of message to be encrypted : 33
> >
> > ...which would make it impossible
On Wed, 9 Jun 1999, Holger Reif wrote:
> ÃÖ¿ë»ï schrieb:
> >
> > With reference to rsa.h,
> > I found that there are four kinds of padding.
> > Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
> >
> > Basic assumption here is,
> > 1. RSA Key size : 256
>
> Just remember, this
ÃÖ¿ë»ï schrieb:
>
> With reference to rsa.h,
> I found that there are four kinds of padding.
> Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
>
> Basic assumption here is,
> 1. RSA Key size : 256
Just remember, this counts for 32 byte...
> 2. size of message to be encrypted
[EMAIL PROTECTED] wrote:
>
> With reference to rsa.h,
> I found that there are four kinds of padding.
> Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
>
> Basic assumption here is,
> 1. RSA Key size : 256
> 2. size of message to be encrypted : 33
>
With a keysize of 256 bit
Hi,
I was looking at this sort of stuff recently and I'm a still a relative
beginner at OpenSSL, so if I'm way out of order, I'm sure someone from
the core group will straighten me out ;-)
anyway, if my understanding is correct... demos/maurice/example2.c shows
how to use the EVP stuff ... which
With reference to rsa.h,
I found that there are four kinds of padding.
Of them, My concern is about RSA_NO_PADDING and RSA_PKCS1_PADDING.
Basic assumption here is,
1. RSA Key size : 256
2. size of message to be encrypted : 33
1) in case of RSA_NO_PADDING,
len = RSA_public_encrypt(what_number_h
18 matches
Mail list logo