On 3/1/2013 7:24 AM, Tayade, Nilesh wrote:
Hi,
I am using the AES_cbc_encrypt() API to perform symmetric decryption.
But in one of the scenarios I see the data encrypted is of 16bytes but just
1byte is useful and 15bytes is for padding.
Is there some way I can know the actual encrypted data le
Hi,
I am using the AES_cbc_encrypt() API to perform symmetric decryption.
But in one of the scenarios I see the data encrypted is of 16bytes but just
1byte is useful and 15bytes is for padding.
Is there some way I can know the actual encrypted data length?
I came across some pointers like using
Olivier,
The command line you provided just worked fine in my box, in which a fresh
openssl-1.0.1e installed.
On Fri, Mar 1, 2013 at 7:31 AM, LANGLOIS Olivier PIS -EXT <
olivier.pis.langl...@transport.alstom.com> wrote:
> They just reset the connection upon the reception of the message.
>
> This
Comparing printed debug values that I put into the incore script, it
looks like our compileris putting the signature somewhere between
FIPS_rodata_start and FIPS_rodata_end resulting in the"fingerprint does
not match segment aliasing" error. I can get around this by removing the
-fPIC option
They just reset the connection upon the reception of the message.
This is a new behavior from version 1.0.1-e
1.0.1-d was which sending ClientHello v3.2 are fine.
How to reproduce:
openssl s_client -connect aur.archlinux.org:443
CONFIDENTIALITY : This e-mail an
They just reset the connection upon the reception of the message.
This is a new behavior from version 1.0.1-e 1.0.1-d was which sending
ClientHello v3.2 are fine.
How to reproduce:
openssl s_client -connect aur.archlinux.org:443
CONFIDENTIALITY : This e-mail a
On Thu, Feb 28, 2013, John-Alan Simmons wrote:
> I am trying to implement aes encryption via openssl using C, and cant
> figure out how to use the aesni hardware acceleration. I have already
> confirmed my processor can use, any help would be great.
>
If you use the EVP interface AES-NI is autom
Thanks,
Walter
On 28.02.2013 12:03, Erwann Abalea wrote:
man asn1parse
man ASN1_generate_nconf
That should give you some bootstrap information.
--
Erwann ABALEA
-
tridécatabulophobie: peur d'être treize à table
Le 28/02/2013 11:16, Walter H. a écrit :
Hello,
I have the following:
---
na
BH
Hi All,
I'm trying to pass a pci scan, I'm on Ubuntu 12.04 lts server and Nginx.
I've tried everything I know and did a lot of research... apparently seems
that need to disable a setting in OpenSSL which I can't find how to do.
This is the result of the scan:
SSL/TLS Protocol Initialization V
On Wed, Feb 27, 2013, Glenn Smith wrote:
> Does the same apply to DLLs? I'm planning on using OpenSSL+Fips in a DLL
> that gets loaded either by other DLLs or directly from an application as a
> support DLL (the App won't be known, as we're doing DLL to be used by other
> vendors).
>
Since you
man asn1parse
man ASN1_generate_nconf
That should give you some bootstrap information.
--
Erwann ABALEA
-
tridécatabulophobie: peur d'être treize à table
Le 28/02/2013 11:16, Walter H. a écrit :
Hello,
I have the following:
---
name = ASN1:SEQUENCE:section
[ section ]
value.1 = XXX:text
Hello,
I have the following:
---
name = ASN1:SEQUENCE:section
[ section ]
value.1 = XXX:text
---
what is possible to have instead of XXX?
Thanks,
Walter
smime.p7s
Description: S/MIME Cryptographic Signature
Does the same apply to DLLs? I'm planning on using OpenSSL+Fips in a DLL
that gets loaded either by other DLLs or directly from an application as a
support DLL (the App won't be known, as we're doing DLL to be used by other
vendors).
--
View this message in context:
http://openssl.6102.n7.na
I wondered about that. I saw several mentions about that.
--
View this message in context:
http://openssl.6102.n7.nabble.com/Need-help-with-Windows-and-FIPS-enabled-OpenSSL-libs-tp43956p43975.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
Hi Jakob ...
My doubt is like this .
I have a .pem file say : chain.pem
chain.pem == server certificate-> intermediate CA certificate -> self signed
root certificate .
Now i am writing the code in C using opensl Api's to verify this (chain.pem)
chain .
filename ==> chain.pem
I had the same problem with you, I've done the same thing with you to resolve
the problem. but after I mentioned how my apache server can not run. is
there any other way to solve this problem?
--
View this message in context:
http://openssl.6102.n7.nabble.com/openssl-private-encrypt-crashes-bro
Hi Walter,
I hope this helps.
Steve
id-pda-dateOfBirth = 1.3.6.1.5.5.7.9.1
[ subjectDirAttrib_sec ]
1.3.6.1.5.5.7.9.1 = SEQUENCE:dateOfBirth_sec #id-pda-dateOfBirth
[ dateOfBirth_sec ]
id-pda-dateOfBirth.name= OID:id-pda-dateOfBirth
id-pda-dateOfBirth.value = SET:dateOfBirth_
Hi all
I'm reading a paper from intel that mention an AES-NI-GCM implementation within
the Linux kernel cryptographic framework using the new instructions(PCLMULQDQ
and AES-NI).
As I know ,aes-ni is already include in 1.0.1, So How does the AES-NI-GCM?
The paper is here
http://www.intel.com/con
18 matches
Mail list logo