Hi Jimmy, Thanks for your response. Kindly find my thoughts inlined..
> Question:
> So, the question is: How can we generate a key for Triple DES encryption and
> write out the same in a file?
>
Simple answer for 'how to generate a key for a symmetric cipher' is 'use
a pseudo-random generator' to
Hi,
I had a set of related questions regarding the trusted CA store and
certificate chaining:
1. Lets say we have a chain of the form RootCA -> SubCA ->
Server-certificate.
Now, Will the openssl verify function be able to verify if I give only
the SubCA as the trusted CA Cert and the above cha
Hello Abderrahmane,
Thank you for your answer.
Best Regards
El hallabi-Kettani Abderrahmane <[EMAIL PROTECTED]> a écrit : Hello Driss,
I think, it will be
theDESCheckResult = DES_set_key_checked(&theDESKey1, &theSchedule);
DES_ecb_encrypt((DES_cblock *) &buff, (DES_cblock *) &th
Gerald Paprocki wrote:
> ...
>
> I do however understand that there are plans to enable the 0.9.8 version
> to operate in FIPS mode. Is anyone aware of a forecast date as to when a
> certified solution would be available ? I had seen estimates ranging
> from February of this year to the later par
Hi,
I had a set of related questions regarding the trusted CA store and
certificate chaining:
1. Lets say we have a chain of the form RootCA -> SubCA ->
Server-certificate.
Now, Will the openssl verify function be able to verify if I give only
the SubCA as the trusted CA Cert and the above cha
My certificate uses a SHA256 hash and the client has OpenSSL 0.9.7.
0.9.8 is needed to support SHA256 hashes.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listop
Urjit Gokhale wrote:
Hello everyone,
I would like to know your view on "Would the performance impact for
transmitting 'X' bytes of unencrypted data over SSLized channel be
almost same irrespective of the number of SSL_* calls" ?
Consider I am using a buffer of size 'buf_size' for SSL_read/w
Ambarish Mitra wrote:
Hi all,
Background:
My application reads an encrpyted-base64 password from a config file and
decrypts the same inside the application. The password is encryped using
Triple-DES algorithm.
To encrypt and base64 the actual password, a stand-alone utility is
provided. We run
Hello Driss,
I think, it will be
theDESCheckResult = DES_set_key_checked(&theDESKey1, &theSchedule);
DES_ecb_encrypt((DES_cblock *) &buff, (DES_cblock *) &theOutput,
&theSchedule, DES_ENCRYPT);
Namely that DES_ecb_encrypt is described like that :
void DES_ecb_encrypt(c
Hello everyone,
I would like to know your view on "Would the performance impact for
transmitting 'X' bytes of unencrypted data over SSLized channel be almost same
irrespective of the number of SSL_* calls" ?
Consider I am using a buffer of size 'buf_size' for SSL_read/write
(SSL_read(ssl_obj,b
Hi all,
Background:
My application reads an encrpyted-base64 password from a config file and
decrypts the same inside the application. The password is encryped using
Triple-DES algorithm.
To encrypt and base64 the actual password, a stand-alone utility is
provided. We run this utility, and then c
Hello,
I need to encrypt a password with a DES key, I'm trying the following code:
char * buff[20];
int theDESCheckResult;
DES_cblock * theDESKey1;
DES_key_schedule *theSchedule;
DES_cblock * theOutput;
ALMLog (@"Enter your DBPassword");
fgets((char *)&buff, 1
Hello,
I use the function PEM_write_RSAPrivateKey(privateKeyFilePW,
r,EVP_des_ede3_cbc(),NULL, 0, NULL, NULL) to write the RSA private key with a
pass phrase. But I am wondering where the pass phrase is stored?
later I use the function PEM_read_RSAPrivateKey(privateKeyFilePW, &keyReading,
pas
All,
I understand that there is not currenlty a FIPS compatible option
available for openSSL version 0.9.8x. We are hesitant to downgrade our
current version to 0.9.7 due to outstanding security fixes that only
exist in 0.9.8.
I do however understand that there are plans to enable the 0.9.8 ver
Hello,
I am wondering how many letters we can enter for the PEM pass phrase?
It seems that the maxium length is 1024.
Can we change the pass phrase later? if so, which functions can we use?
Thanks in advance!
_
Discover the new W
Hello Steve,
Thanks! It works.
> Date: Tue, 25 Mar 2008 18:00:58 +0100
> From: [EMAIL PROTECTED]
> To: openssl-users@openssl.org
> Subject: Re: PEM_read_RSAPrivateKey() does not call callback function
>
> On Tue, Mar 25, 2008, learning openssl wrote:
>
> >
> > Hello,
> >
> > I created a priv
16 matches
Mail list logo