On Wed, Feb 24, 2016, Neptune wrote:
> Using:
> FIPS Object Module 2.0.9
> OpenSSL 1.0.1l
>
> When I call RSA_generate_key:
> if (rsa = RSA_generate_key(keySize, RSA_F4, NULL, NULL))
>
> I get the following error string:
> (OPENSSL error:04081078:rsa routines:RSA_
Using:
FIPS Object Module 2.0.9
OpenSSL 1.0.1l
When I call RSA_generate_key:
if (rsa = RSA_generate_key(keySize, RSA_F4, NULL, NULL))
I get the following error string:
(OPENSSL error:04081078:rsa routines:RSA_BUILTIN_KEYGEN:key size too small)
As I understand, RSA Key size must be 2048 or
Hi David,
1. I am not sure what you mean by replacing RSA_generate_key with my own
function, because I would like it to go through the process of creating
prime numbers, and modulus, etc. Basically I want the RSA_generate_key
to generate the same public key at startup each time my process runs
RSA_generate_key generate the same
public/private key each time? (I know this doesn’t make sense security
wise, but the work I have to do requires it).
Replace RSA_generate_key with your own function that returns the desired
key. Using the same seed each time won't work because intervening
operation
I would like to call this function to generate the same public/private
key everytime.
I thought all I had to do was create the same seed using RAND_seed each
time, however I still keep getting different key pairs.
Is there any way to have RSA_generate_key generate the same
public/private key
Hi ,
Someone could y tell me how can I extract public and private keys from RSA
structure returned by the function "RSA_generate_key"?
I'm using openssl in my c simulation work and I must exchange public keys
between simulated server and client, the encrypt and decrypt the mes
On Wed, Aug 11, 2010, krishnamurthy santhanam wrote:
>
> I am able to generate key. how to do seed PRNG before generating key?
>
The PRNG is seeded automatically using platform specific entropy. If it wasn't
they key would not be generated and you'd get a PRNG not seeded error.
Steve.
--
Dr S
quot;; //Sample text (plain text) to Encrypt/Decrypt
char *ciphertext;
printf("%s\n",plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf("NO RSA!\
> key..below is the program and outcome..is this the way to generate
>> key?
>> >
>> > #include
>> > #include
>> > #include
>> > int main()
>> > {
>> > char *plain="Sample text"; //Sample text (plain text)
ot;Sample text"; //Sample text (plain text) to Encrypt/Decrypt
>> > char *ciphertext;
>> > printf("%s\n",plain);
>> > // Generate RSA key
>> > RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
>> > // RSA_size() will de
gt; char *ciphertext;
> > printf("%s\n",plain);
> > // Generate RSA key
> > RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
> > // RSA_size() will determine how much memory must be allocated for an
> > if(rsa1==NULL) {
> > printf("NO RSA!\n
; {
> char *plain="Sample text"; //Sample text (plain text) to Encrypt/Decrypt
> char *ciphertext;
> printf("%s\n",plain);
> // Generate RSA key
> RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
> // RSA_size() will determine how much memory m
intf("%s\n",plain);
// Generate RSA key
RSA *rsa1= RSA_generate_key(1024,65537,NULL,NULL);
// RSA_size() will determine how much memory must be allocated for an
if(rsa1==NULL) {
printf("NO RSA!\n\n");
ERR_load_crypto_strings();
ERR_print_errors_fp(stdout);
}
else
Schulz <[EMAIL PROTECTED]>
To: openssl-bugs@openssl.org
Subject: 0.9.8a: DSA_generate_parameters & RSA_generate_key not in libcrypto
X-Virus-Scanned: by amavisd 0.1
X-Virus-Scanned: by amavisd 0.1
I am not sure if this is a bug or something that was never defined to work.
I tried to build opens
Please ignore that message: I accidently linked against the OpenSSL library
while using libeay32.dll from the MKS toolkit :-/
-Oorspronkelijk bericht-
Van: Heusden van, FJJ (Folkert)
Verzonden: dinsdag 11 mei 2004 10:49
Aan: '[EMAIL PROTECTED]'
Onderwerp: RSA_generate_key:
Hi,
I'm trying to create an RSA keypair with the RSA_generate_key function.
After seeding the PRNG with some random values, I call RSA_generate_key this way:
RSA *pRsa = RSA_generate_key(
1024, // key length
257, // exponent
progress, // shows progress
16 matches
Mail list logo