ards,
Vishal
General
-Original Message-
From: openssl-users On Behalf Of Viktor
Dukhovni
Sent: Friday, May 31, 2024 06:14 PM
To: openssl-users@openssl.org
Subject: Re: Issue in DH Algorithm Keys Generation in OpenSSL 3.3.0
[External email: Use caution with links and attachm
On Fri, May 31, 2024 at 07:47:40AM +, Vishal Kevat via openssl-users wrote:
> Hi OpenSSL users,
>
> I am using OpenSSL source version 3.3.0 and facing an issue in key generation
> part of Diffie Hellman (DH) Algorithm. Below are the APIs I am using for
> generating Public and Private Keys:
>
On Fri, May 31, 2024 at 12:39:12PM +, Vishal Kevat via openssl-users wrote:
> Is there any way to make this prime number work by doing some
> modifications in the openssl source code.
It ISN'T a *prime* number.
> Like bypassing the OpenSSL DH prime check?
Why do you want to use a broken DH
PM
To: openssl-users@openssl.org
Subject: Re: Issue in DH Algorithm Keys Generation in OpenSSL 3.3.0
[External email: Use caution with links and attachments]
On Fri, May 31, 2024 at 07:47:40AM +, Vishal Kevat via openssl-users wrote:
> I am using Open
On Fri, May 31, 2024 at 07:47:40AM +, Vishal Kevat via openssl-users wrote:
> I am using OpenSSL source version 3.3.0 and facing an issue in key
> generation part of Diffie Hellman (DH) Algorithm. Below are the APIs I
> am using for generating Public and Private Keys:
>
> static unsigned char
Hi OpenSSL users,
I am using OpenSSL source version 3.3.0 and facing an issue in key generation
part of Diffie Hellman (DH) Algorithm. Below are the APIs I am using for
generating Public and Private Keys:
static unsigned char DH_PRIME_128[] = { /* 128 bit prime */
0xff, 0xff, 0xff, 0xff,