MySQL would have to implement this. I believe there is some support
of SSL encrypted connections in MySQL. Try here first:
http://dev.mysql.com/doc/refman/5.0/en/secure-connections.html and if
you still have questions, try the MySQL mailing lists.
Andrew
Thomas Fitzgerald wrote:
I'm no expert, so please verify anything that you don't trust here.
Block algorithms typically don't operate the way a cube operates. They
are named a block algorithm because they operate on a single block in,
single block out. They have the same starting point and rules for each
block.
Shaun Lipscombe wrote:
* Ben Laurie wrote:
Peter 'Luna' Runestig wrote:
On Fri, 14 Jan 2005 21:10 pm, Eduardo PĂ©rez wrote:
Do you know if it's possible to use SSL (or some other protocol) over
UDP running totally in user space.
The OpenVPN project http://openvpn.net/ runs OpenSSL over UDP,
David Schwartz wrote:
2) Streams of entangled particles can generate shared
secrets where none
previously existed.
No, not really, since the scheme described on page 80 of the Jan 2005
Scientific American looks vulnerable to a man-in-the-middle attack.
In that case, it generates
Do you agree that:
1) If there exists a shared secret, quantum encryption can provide
protection, now and in the future, against MITM attacks or passive
interception.
2) Streams of entangled particles can generate shared secrets where none
previously existed.
DS
I think
It sounds like the data is being padded (perhaps automatically). There
are several standards for padding data prior to applying RSA encryption.
It seems that whatever padding is being used is adding about 10 bytes.
One of the PKCS standards should be able to explain everything that's
for you.
Andrew Mann
Andrew Walrond wrote:
On Thursday 18 Mar 2004 16:14, Gerrit E.G. 'Insh_Allah' Hobbelt wrote:
Hi Andrew,
How unique is it? Is it statistically improbable that I could generate
the same key twice?
If you have properly seeded your random generator, generated (RSA) keys
should
Jeff Fulmer wrote:
Hi,
I'm the author of siege, an open source http regression tester. I
recently started to recieve complaints from users on Red Hat 9.0
systems. Apparently openssl is built with kerberos support on red
hat 9.0 and it requires krb5.h which is in /usr/kerberos/include
How
If possible, put a system capable of logging all traffic in a position
to record everything going to that system (and everything coming out if
that's not too much data). A hub (not a switch), or a switch that be
configured to echo all traffic out to a specific port will do. The
recording
Do you have any reason to think this is an OpenSSL bug rather than an
Apache, PHP, or other module bug/configuration error? Or even another
service?
When you cleaned up the system and presumably restored your data, did
you check to make sure that there weren't any malicious or altered php
You're storing, reading or passing the data incorrectly. There's
nothing magic about encryption or writing to a file that makes them
incompatible. Go back and debug.
Andrew
Mike Maloy wrote:
Okay, next irritant:
If I encrypt a chunk of data, and store it in a list node,
I can decrypt it
be attacker?
Generally, you can either encode your data in a more compact form and
if you need hex translate it out on the other side, or you can break it
into multiple blocks, encrypt and send each block.
Andrew Mann
[EMAIL PROTECTED] wrote:
Hi..
I am using Crypto library of openSSL for RSA encryption
for thread slot ids.
For example:
// Set function to create hash for slot ID
CRYPTO_set_id_callback(solaris_thread_id);
I hope this helps
Emilio
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Andrew Mann
Sent: Monday, September 08, 2003 9:35 AM
To: [EMAIL
13 matches
Mail list logo