Hello Steve,
Thanks! It works.
Date: Tue, 25 Mar 2008 18:00:58 +0100
From: [EMAIL PROTECTED]
To: openssl-users@openssl.org
Subject: Re: PEM_read_RSAPrivateKey() does not call callback function
On Tue, Mar 25, 2008, learning openssl wrote:
Hello,
I created a private key with
Hello,
I am wondering how many letters we can enter for the PEM pass phrase?
It seems that the maxium length is 1024.
Can we change the pass phrase later? if so, which functions can we use?
Thanks in advance!
_
Discover the new
All,
I understand that there is not currenlty a FIPS compatible option
available for openSSL version 0.9.8x. We are hesitant to downgrade our
current version to 0.9.7 due to outstanding security fixes that only
exist in 0.9.8.
I do however understand that there are plans to enable the 0.9.8
Hello,
I use the function PEM_write_RSAPrivateKey(privateKeyFilePW,
r,EVP_des_ede3_cbc(),NULL, 0, NULL, NULL) to write the RSA private key with a
pass phrase. But I am wondering where the pass phrase is stored?
later I use the function PEM_read_RSAPrivateKey(privateKeyFilePW, keyReading,
Hello,
I need to encrypt a password with a DES key, I'm trying the following code:
char * buff[20];
int theDESCheckResult;
DES_cblock * theDESKey1;
DES_key_schedule *theSchedule;
DES_cblock * theOutput;
ALMLog (@Enter your DBPassword);
fgets((char *)buff, 10,
Hi all,
Background:
My application reads an encrpyted-base64 password from a config file and
decrypts the same inside the application. The password is encryped using
Triple-DES algorithm.
To encrypt and base64 the actual password, a stand-alone utility is
provided. We run this utility, and then
Hello everyone,
I would like to know your view on Would the performance impact for
transmitting 'X' bytes of unencrypted data over SSLized channel be almost same
irrespective of the number of SSL_* calls ?
Consider I am using a buffer of size 'buf_size' for SSL_read/write
Hello Driss,
I think, it will be
theDESCheckResult = DES_set_key_checked(theDESKey1, theSchedule);
DES_ecb_encrypt((DES_cblock *) buff, (DES_cblock *) theOutput,
theSchedule, DES_ENCRYPT);
Namely that DES_ecb_encrypt is described like that :
void
Ambarish Mitra wrote:
Hi all,
Background:
My application reads an encrpyted-base64 password from a config file and
decrypts the same inside the application. The password is encryped using
Triple-DES algorithm.
To encrypt and base64 the actual password, a stand-alone utility is
provided. We run
Urjit Gokhale wrote:
Hello everyone,
I would like to know your view on Would the performance impact for
transmitting 'X' bytes of unencrypted data over SSLized channel be
almost same irrespective of the number of SSL_* calls ?
Consider I am using a buffer of size 'buf_size' for
My certificate uses a SHA256 hash and the client has OpenSSL 0.9.7.
0.9.8 is needed to support SHA256 hashes.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Hi,
I had a set of related questions regarding the trusted CA store and
certificate chaining:
1. Lets say we have a chain of the form RootCA - SubCA -
Server-certificate.
Now, Will the openssl verify function be able to verify if I give only
the SubCA as the trusted CA Cert and the above
Gerald Paprocki wrote:
...
I do however understand that there are plans to enable the 0.9.8 version
to operate in FIPS mode. Is anyone aware of a forecast date as to when a
certified solution would be available ? I had seen estimates ranging
from February of this year to the later part of
Hello Abderrahmane,
Thank you for your answer.
Best Regards
El hallabi-Kettani Abderrahmane [EMAIL PROTECTED] a écrit : Hello Driss,
I think, it will be
theDESCheckResult = DES_set_key_checked(theDESKey1, theSchedule);
DES_ecb_encrypt((DES_cblock *) buff, (DES_cblock *)
Hi,
I had a set of related questions regarding the trusted CA store and
certificate chaining:
1. Lets say we have a chain of the form RootCA - SubCA -
Server-certificate.
Now, Will the openssl verify function be able to verify if I give only
the SubCA as the trusted CA Cert and the above
Hi Jimmy, Thanks for your response. Kindly find my thoughts inlined..
Question:
So, the question is: How can we generate a key for Triple DES encryption and
write out the same in a file?
Simple answer for 'how to generate a key for a symmetric cipher' is 'use
a pseudo-random generator' to
16 matches
Mail list logo