Hi Uri Blumenthal,
I hace started from the Intel RSAX engine, and I just wanted to use
my own implementation of the rsa modular exponentiation. This
project that I am working on intends to use a CUDA based
implementation for modular computation.
In order to post a working example here, I just
Not sure I understand what you’re doing. But compiling/building eng_rsax.c
(provided by Intel) with the only mod being addition of dynamic bind,
produces the following result:
$ openssl engine rsax -t
(rsax) RSAX engine support
[ available ]
$ sync
$ openssl speed rsa512 -engine rsax
engine
Hi.
I am trying to build an OpenSSL RSA engine and the first step is to use the
"BN_mod_exp_mont" for the RSA modular exponentiation function, in RSA_METHOD
structure.
***BEGINNING OF eng_rsax_test.c FILE***
/
#include
#include
#include
#include
#include
#include
#ifndef OPENSSL_NO_RSA
Hi,
I'm trying to compile httpd 2.4.18 with openssl-1.0.2g(with
openssl-fips-2.0.12) on 64-bit RHEL machine.
I'm could compile and get it(httpd) running in http mode and while i'm
trying to run it in
HTTPS mode, server is unable to start saying
"httpd: Syntax error on line 128 of
Hi,
I always use like this
Hash ( salt + password )
You can use like this also
Hash ( hash(salt) + password )
regards,
James
On Tue, Apr 5, 2016 at 1:52 PM, Sugumar wrote:
> Hello,
>
> Ya you are correct James.
> But my doubt is what is the best method to hash the password
On Mon, Apr 04, 2016, Abe Racioppo wrote:
> Hey guys,
>
> I'm trying to use the CMS operations in libcrypto but with a symmetric key
> encryption key instead of x509.
>
> I'm thinking I want to use a combination of
>
> CMS_RecipientInfo_set0_pkey,
> SMIME_write_CMS,
> and
>
Hello,
Ya you are correct James.
But my doubt is what is the best method to hash the password securely with
salt.
I mean which method is preferred by openssl,
HashValue = Hash(password + salt).
HashValue = Hash( Hash(password) + salt). or something else?
HashValue = Hash(password) + Hash(salt).
Hello Sugumar,
There are sites that store the commonly used strings and hashed strings.
For example for hello sha2 hash is this
2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
If you copy paste this in google, you would see hello
they dont do reverse of this hash but they hashed
Thanks for all the information provided. Really its very nice information.
And one more question, if i am using a salt with the password for computing
a hash value i need to store the salt for future reference and what about
the scenario when attacker gets that salt and hash. That time it may be