On Dec 17, 2018, at 11:42 PM, Billy Brumley wrote:
>
> But 0.4% is suspiciously close to 1/256, so I'm willing to bet your
> problem surrounds your size assumptions in various functions. Check
> the manpage of e.g. EC_POINT_point2oct and grep for usage in the
> library, but the idea is to pass NU
On Tue, Dec 18, 2018 at 12:07 AM Mike Blaguszewski wrote:
>
> Some code of mine reads a NIST P256 private key from bytes and derives the
> public key from it, and this derived public key is incorrect about 0.4% of
> the time. I’ve attached a sample program that does the following.
>
> 1. Generat
Some code of mine reads a NIST P256 private key from bytes and derives the
public key from it, and this derived public key is incorrect about 0.4% of the
time. I’ve attached a sample program that does the following.
1. Generate a key-pair of type NID_X9_62_prime256v1
2. Write the public and priv
On 17/12/2018 16:21, Nick wrote:
Hello,
I've written a script to try and work around openssl's lack of a way to encrypt
large files with public key or hybrid cryptography. I gather SMIME works for
files < ~ 2.5GB but the current implementation cannot decrypt files larger than
this.
My use case
Hello,
I've written a script to try and work around openssl's lack of a way to encrypt
large files with public key or hybrid cryptography. I gather SMIME works for
files < ~ 2.5GB but the current implementation cannot decrypt files larger than
this.
My use case is automated server back-ups, for
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> Shreya Bhandare
> Sent: Monday, December 17, 2018 03:29
> i am very new to openssl and contributing to large code bases in general, I
> did my first contribution
> to openssl which got me familiar with the process et
Hi all,
I have some queries regarding OpenSSL async operation.
Current setup
-
I have one* OpenSSL dynamic engine (with RSA and AES-GCM support) *and
linked it with *Nginx* server. Multiple *WGET* commands on the client side.
Current issue
-
Since OpenSSL *do_cipher cal
Kyle
Anyone in their rights minds understands the dangers with government key escrow
systems and governments requesting back doors or delaying the remediation of
existing zero days, local and remote exploits so that they can utilise them for
their own intelligence or law enforcement purposes.
Bonjour,
Without knowing what functions you’re calling when you try to encrypt data
using the key Key3_wo16, I can only guess. And I’m guessing that you’re calling
a function that expects to find a public key encoded in a SubjectPublicKeyInfo
structure, and since this Key3_wo16 object is not su
Hello,
i am very new to openssl and contributing to large code bases in general, I
did my first contribution to openssl which got me familiar with the process
etc. It is time for me to dig deeper and find a bug that actually helps me
understand some part of code base and I'm having a hard time to
10 matches
Mail list logo