Hi all,
I have a quick question. Suppose i am doing RSA crypto. I cant seem to
figure out how i can choose a particular private key/public key. The
only api that seems to be provided is rsa_generate_key and the man
page says use the given api to modify the key. Unf i cant seem to find
any functio
Hi Bradm
This is what i mean. Suppose ive been given a file containing a RSA
private key. I need to read it in somehow to fill this structure up ,
so that i can use it for decryption/signing. I cant find any function
to do this.
struct
{
BIGNUM *n; // public modulus
Hi Marek,
Thanks for the sample code. Whats this file format of DNSSec
called?The public key looked like PEM...is it?
Thanks,
Sudharsan
On 5/15/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,
> I have antoher issue. I used Bind and dnssec-keygen. The key formats
> produced by dnssec-keygen
Hi Brad,
Nevermind. I figured it out myself..Its just that im new here and
openssls documentation seems to less!
Thanks,
Sudharsan
On 5/15/06, Brad Hards <[EMAIL PROTECTED]> wrote:
On Monday 15 May 2006 17:44 pm, you wrote:
> Hi all,
> I have a quick question. Suppose i am doing RSA crypto. I c
Hi Marek,
I dont really need to care about the private key. I need to know the
format of the public key of DNSSec, cause i am gonna use openSSL to
verify the SIG records signed using a KEY record.
Thanks,
Sudharsan
On 5/15/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,
> I have antoher iss
Yes..im tryin this out now...If theres a easier way out..i would take
it...why cant these pple use a single format?Saves everyone trouble
and time
Thanks,
Sudharsan
On 5/15/06, Marek Marcola <[EMAIL PROTECTED]> wrote:
Hello,
> I dont really need to care about the private key. I need to know th
Actually i did try base 64 decoding , only to get nothin in the
file..Sorry if i seem extremely ignorant(I am!)..i just started to
work on these, cant find tutorials and the only source i have is some
man page which doesnt help me much.
Heres what i did. I pasted this to a file
AQO2SoMgtzHArqduMT
Im not sure if SSL gives u such options, but the best way to prevent
compromise of a RSA key would be to establish a diffie hellman key.
You would want to do a shared secret anyawy..and im sure SSL does
it..if the shared secret is computed using diffie hellman and nobody
gets hold of the exponents
I must apologize for not being SSL specific..But it gives u a hint and
u can take a look at the SSL specs and see what they allow.
Sudharsan
On 5/25/06, Sudharsan Rangarajan <[EMAIL PROTECTED]> wrote:
Im not sure if SSL gives u such options, but the best way to prevent
compromise of a R
well..i took a quick look and the client chooses a premaster secret
and the various keys are a function of it..doesnt look like theres any
scope for a DH exchange..Maybe some of the experienced security pple
can help
Sudharsan
On 5/25/06, Sudharsan Rangarajan <[EMAIL PROTECTED]> wrote:
Thats cool..they do have DH ...a quick look suggested a premaster
secret(randomly choosen). Dint seem like theres a DH exchange
Sudharsan
Sudharsan
On 5/25/06, Victor Duchovni <[EMAIL PROTECTED]> wrote:
On Fri, May 26, 2006 at 07:23:05AM +0530, Sreeram Kandallu wrote:
> Hi All
>
> Is it possi
Hi all,
I am just wondering if i could have multiple applications on a end
host share the same public key. Can this cause a pbm in the sense
there are more applications to target and a stupid one can reveal the
private key?
Or can there be other attacks posssible
Thanks,
Sudharsan
___
se if the passphrase for any software, and the location
of its key file -- or the enencrypted private key itself -- is
revealed by any software, the key is compromised regardless.)
But there is no technical reason it cannot be done.
-Kyle H
On 6/5/06, Sudharsan Rangarajan <[EMAIL PROTECTED]> wr
Hi all,
Admittedly this is not the greatest place to talk abt DNSSec. But
well..its abt security :)..so here goes.. As far as i see, DNSSec
provides integrity verification of all DNS data. And it infact allows
assoicating keys with end hosts, making it a PKI. Given that this is
the case, why exact
et key.) It must also have a public key which the
other party knows (and believes corresponds to the identity it
claims).
I don't quite understand what you're asking here.
-Kyle H
On 6/6/06, Sudharsan Rangarajan <[EMAIL PROTECTED]> wrote:
> Hi Kyle,
> Thanks, I was
15 matches
Mail list logo