It turns out what I needed was EVP_SealInit, so I don't need to
generate my own key. Thanks for the responses though.
Mike
Richard Levitte - VMS Whacker wrote:
In message <[EMAIL PROTECTED]> on Wed, 16 Mar 2005 14:32:03 -0800, Michael D'Errico
<[EMAIL PROTECTED]> said:
mike-mlm> I read somewhere
In message <[EMAIL PROTECTED]> on Wed, 16 Mar 2005 14:32:03 -0800, Michael
D'Errico <[EMAIL PROTECTED]> said:
mike-mlm> I read somewhere that it is a good idea to
mike-mlm> cryptographically hash your key material to
mike-mlm> generate a key, so I wrote a function to do
mike-mlm> that. I'm not e
On Wed, Mar 16, 2005, Michael D'Errico wrote:
> Hi,
>
> I read somewhere that it is a good idea to
> cryptographically hash your key material to
> generate a key, so I wrote a function to do
> that. I'm not exactly sure I'm doing what
> they suggest, so if anyone cares to, can
> you check over m
I read somewhere that it is a good idea to
cryptographically hash your key material to
generate a key, so I wrote a function to do
that.
it's an even better idea to use well known/tested
algorithm for key generation
I haven't run across any; can you point me in
the right direction? Or do you thin
Michael D'Errico wrote:
Hi,
I read somewhere that it is a good idea to
cryptographically hash your key material to
generate a key, so I wrote a function to do
that.
it's an even better idea to use well known/tested
algorithm for key generation
I'm not exactly sure I'm doing what
they suggest, so i
Dr. Stephen Henson wrote:
>On Thu, Sep 09, 2004, Steve Hay wrote:
>
>
>>I'm afraid I don't know what "password based encryption" is, so I don't
>>know if this is the right thing to even be trying to do. It doesn't
>>sound like what I wanted...
>>
>>
>>
>
>It one of various standards which
On Thu, Sep 09, 2004, Charles B Cranston wrote:
> Perhaps one way to think of the IV is that it is part of the key.
> That is, the IV and key are used to encrypt, and then the (same) IV
> and the (same) key can decrypt. It's just that if the IV is sent
> in clear text ("included in the structure.
Charles B Cranston wrote:
>Perhaps one way to think of the IV is that it is part of the key.
>That is, the IV and key are used to encrypt, and then the (same) IV
>and the (same) key can decrypt.
>
IOW I could hard-code the IV into my source code, or use one supplied by
the user at build time (a
On Thu, Sep 09, 2004, Steve Hay wrote:
> Dr. Stephen Henson wrote:
>
> >On Thu, Sep 09, 2004, Steve Hay wrote:
> >
> >
> >
> >>I've no idea what the ASN1_TYPE *param is, or where to get one from. I
> >>had a look at EVP_CIPHER_param_to_asn1(), but it says that the cipher IV
> >>in the ctx pa
Perhaps one way to think of the IV is that it is part of the key.
That is, the IV and key are used to encrypt, and then the (same) IV
and the (same) key can decrypt. It's just that if the IV is sent
in clear text ("included in the structure...") then it is not secret.
One popular algorithm is to u
Dr. Stephen Henson wrote:
>On Thu, Sep 09, 2004, Steve Hay wrote:
>
>
>
>>I've no idea what the ASN1_TYPE *param is, or where to get one from. I
>>had a look at EVP_CIPHER_param_to_asn1(), but it says that the cipher IV
>>in the ctx passed to it must be set when the call is made, which seems
On Thu, Sep 09, 2004, Steve Hay wrote:
> Steve Hay wrote:
>
> It occurs to me that I can make use of PKCS5_v2_PBE_keyivgen() for
> 0.9.4+, and just use EVP_BytesToKey() for earlier versions -- the fact
> that the latter doesn't support non-default key lengths isn't a problem
> because I can't
Steve Hay wrote:
>El hallabi-Kettani Abderrahmane wrote:
>
>
>
>>the function PKCS5_v2_PBE_keyivgen() exist in version
>>openssl0.7.9d in directory
>>openssl/crypto/evp/p5_crypt.c
>>it corresponds to what you want to do .
>>
>>
>>
>If you'd read my mail properly, you'd see that I'd already f
Yang Dehua <[EMAIL PROTECTED]>:
> i downloaded and compiled OpenSSL 0.9.5, then i
> got the following error before i tried to upgrade
> my Apache1.3.12 with mod_ssl 2.6.0:
> "Failed to generate temporary 512 bits RSA private key"
Use the latest mod_ssl release.
__
14 matches
Mail list logo