On 25/11/15 23:34, kalyani cv wrote:
> Hi,
> I am unable to find the source codes for af_alg plugin i.e source codes
> for libaf_alg.so shared library.
> The link http://src.carnivore.it/users/common/af alg/tree/ is referenced
> in most of the places. But link does not work.
> Can somebody point
Hi,
I am unable to find the source codes for af_alg plugin i.e source codes for
libaf_alg.so shared library.
The link http://src.carnivore.it/users/common/af alg/tree/ is referenced in
most of the places. But link does not work.
Can somebody point me to its source codes?
Thanks,
Kalyani
__
I also like this page for the best conceptual explanation for how EC crypto
works that I've seen:
https://blog.cloudflare.com/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/
Nou Dadoun
Senior Firmware Developer, Security Specialist
Office: 604.629.5182 ext 2632
Support
On 25/11/2015 18:18, Matt Loah wrote:
> Hi all,
>
> Has anyone a little tutorial on how to use OpenSSL APIs to implement
> an encryption / decryption code using Elliptic Curves ?
>
> Thanks,
>
> Matt L.
>
>
> ___
> openssl-users mailing list
> To unsubscr
Hi all,
Has anyone a little tutorial on how to use OpenSSL APIs to implement an
encryption / decryption code using Elliptic Curves ?
Thanks,
Matt L.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Exactly, that's my point, I have to integrate with a third party API, so I
can't do anything else but to send the ciphered text as expected.
Anyway, thanks for your explanation on this issue, I'll take it into
account and try to contact third party support team.
Thanks.
2015-11-25 11:23 GMT+01:
On Wed, Nov 25, 2015 at 11:14:48AM +0100, David García wrote:
> Viktor, you pointed me to the right way. I was missing the -nopad flag in
> the openssl command.
Not using padding is fragile and can lead to subtle data corruption.
Perhaps not padding is safe and correct in your case, but I am
skep
Viktor, you pointed me to the right way. I was missing the -nopad flag in
the openssl command.
I don't need to do the padding through the cipher algorithm because I do
the 0 padding manually before executing the ciphering.
Now it matches. This is the command I am using (for this manual example I
On Wed, Nov 25, 2015 at 09:18:15AM +0100, David García wrote:
> H6cr2yN8oWV6AUY/JlknQw==
Decrypting in ECB mode you get:
$ echo H6cr2yN8oWV6AUY/JlknQw== |
openssl base64 -d |
openssl enc -d -des-ede3 -K
'b2aec78eb50e05f2a60b9efa20b82c903e6cad4f3bd2027b' -nopad |
hexd
Thanks, you are rigth. I did a test with
echo -n 005863330
and
echo 005863330
and the last one adds the new line character.
I also checked that openssl is not adding this new line character. Now with
this command:
echo -n 005863330 | openssl enc -e -des-ede3-cbc -K
'b2aec78eb50e05f2a60b9efa20
10 matches
Mail list logo