RE: how to generate Private for Blowfish, CAST and rc4

2006-02-17 Thread Lee Colclough
Hi, The Network Security with OpenSSL book suggests using the OpenSSL own pseudorandom number generator. RAND_bytes(key, iLength); Where key is a char* to be populated and iLength is the length required. Also look up seed_prng for seeding it. Is this what you wanted to know?

Re: how to generate Private for Blowfish, CAST and rc4

2006-02-17 Thread Kyle Hamilton
If you want a deterministic means, run a cryptographic hash of the passphrase to however many bits you need.-Kyle HOn 2/17/06, Lee Colclough [EMAIL PROTECTED] wrote: Hi, The Network Security with OpenSSL book suggests using the OpenSSL own pseudorandom number generator.

Re: function PEM_read_RSAPrivateKey not returning

2006-02-17 Thread Matthias
symptoms, function simply does nothing. Afterwards I compiled the latest snapshot (openssl-0.9.8-stable-SNAP-20060217.tar.gz) but even there it does not work - same problem again. I really appreciate all your help here! Thanks. Matthias

Re: openssl on arm

2006-02-17 Thread Bear Giles
sun yingming wrote: I'm now trying to realize a SSL connection on embedded system.But I had some problems in the beginning.how can i compile the OpenSSL in arm-linux-gcc? Simple by changing the gcc to arm-linux-gcc in the Makefile? But i got the error as in the ScreenShot.png. how can i do

false positive virus scanner alert on OpenSSL 0.9.8

2006-02-17 Thread Matthias
Just for you to know... While compiling OpenSSL 0.9.8a and OpenSSL 0.9.8 Snapshot from 17. Feb. 2006 my virus scanner alerted a virus to me (what I consider a false positive): AntiVirenKit 16.0.5 by G DATA Software AG KAV Engine: AVK 16.5594 BD Engine: BD 16.2751 Virus:

Re: function PEM_read_RSAPrivateKey not returning

2006-02-17 Thread Kyle Hamilton
-stable-SNAP-20060217.tar.gz) but even there it does not work - same problem again. I really appreciate all your help here! Thanks. Matthias __ OpenSSL Project http://www.openssl.org User Support

Re: AES cipher

2006-02-17 Thread Chris Clark
On 2/16/06, Kyle Hamilton wrote: Yeah. Any cipher that is not explicitly added is denied. So, try just doing: CString Shif = AES128-SHA; When I just use this string, it automaticly adds AES256-SHA as well. This appears to be a bug in OpenSSL 0.98a. Could anyone confirm this? -Chris

Re: AES cipher

2006-02-17 Thread Dr. Stephen Henson
On Fri, Feb 17, 2006, Chris Clark wrote: On 2/16/06, Kyle Hamilton wrote: Yeah. Any cipher that is not explicitly added is denied. So, try just doing: CString Shif = AES128-SHA; When I just use this string, it automaticly adds AES256-SHA as well. This appears to be a bug in

Re: AES cipher

2006-02-17 Thread Chris Clark
CString Shif = AES128-SHA; When I just use this string, it automaticly adds AES256-SHA as well. This appears to be a bug in OpenSSL 0.98a. Could anyone confirm this? Yes I can confirm that. The ciphers command does the same. Thanks Steve. Do you know if this has been fixed in the

Re: AES cipher

2006-02-17 Thread Dr. Stephen Henson
On Fri, Feb 17, 2006, Chris Clark wrote: CString Shif = AES128-SHA; When I just use this string, it automaticly adds AES256-SHA as well. This appears to be a bug in OpenSSL 0.98a. Could anyone confirm this? Yes I can confirm that. The ciphers command does the same. Thanks