On 31/05/14 11:02, scl wrote:
> Hi,
>
> like in my previous post I am trying to build and
> install OpenSSL 1.0.1g for distribution in an OS X
> 10.6+ application (64 bit). I'm using JHBuild to
> fetch and build all pieces.
>
> JHBuild tries to install OpenSSL first to a packagers directory
> (
On 28 May 2014 11:06, Sverre Moe wrote:
> I used the following openssl command for my ECC private key and CSR.
> openssl ecparam -name secp521r1 -genkey -param_enc explicit -out
> private-key.pem
> openssl req -new -key private-key.pem -nodes -sha384 -out ecc_clientReq.csr
>
> So what is the point
On 28 May 2014 08:47, Sverre Moe wrote:
> When creating a ECC Certificate Signing Request I noticed the CSR from
> OpenSSL was quite different from the one I generated with Java Keytool.
>
> Checking the CSRs with: openssl req -in ecc.csr -text -noout
>
> OpenSSL CSR has the following attributes:
On 25/05/14 14:40, Mody, Darshan (Darshan) wrote:
> I use below command
>
> openssl ecparam -out key.pem -name prime256v1 -genkey. I am using another 3rd
> Party tool SIPp. Below is the method that sets the SSL CTX
>
Whilst I don't think its the cause of your problem, I would suggest
adding
On 25/05/14 13:11, Mody, Darshan (Darshan) wrote:
> Hi,
>
>
>
> When I try to read the EC Private Key file I get an error from the
> openssl.
>
>
>
> Is there another way to use the Elliptic curved Private key. Please note
> that I generate the Public and Private keys via the command lin
On 20 May 2014 15:42, Rahul Godbole wrote:
> Hi
>
> Is OpenSSL thread safe by default? How can I find out if a particular
> OpenSSL binary had been compiled with thread support?
>
http://www.openssl.org/support/faq.html#PROG1
Matt
_
On 19/05/14 14:12, Darshan Mody wrote:
> -BEGIN EC PARAMETERS-
>
> -END EC PARAMETERS-
> -BEGIN EC PRIVATE KEY-
>
> -END EC PRIVATE KEY-
>
> My Private key looks as above
How did you generate your private key?
Try deleting the EC PARAMETERS section in the fi
On 15 May 2014 10:39, Jeffrey Walton wrote:
> On Tue, May 13, 2014 at 12:06 PM, Tom stone wrote:
>>
>> Am I missing something or is there a bug in the openssl gcm implementation?
>
> If its any consolation, your question triggered a documentation patch.
> Matt Caswell rec
On 26 April 2014 20:38, Jeffrey Walton wrote:
> On Sat, Apr 26, 2014 at 3:18 PM, Anant Rao wrote:
>> I'm doing password encryption (and decryption) in Java. I need to port this
>> to C.
>> In Java, I'm doing this:
>>
>> PBEKeySpec ("somepassphrase", some_salt, some iterations, 128
>> /*key_length
On 16 April 2014 05:48, chetan wrote:
> If this is only ECDH than how to perform ECDHE?
> what changes i have to made in this code?
Well the final E in ECHDE stands for ephemeral. It is not really a
difference in the way the algorithm itself works, but more about how
it is used. With ECDH both pa
On 15 April 2014 05:40, chetan wrote:
> Thanks to you...it's working.
> Now i have one last query for you.
> I'm generating public and private key files using command line openssl. I
> generated 2 .PEM files each for public and private key.
> Now i want to generate shared secret from that files us
On 14 April 2014 05:42, chetan wrote:
> xxx.c is my program file.
> So, i'm compile simply like "cc xxx.c ".
> I am Gettting errors as below:
> xxx.c:(.text+0x19): undefined reference to `EVP_PKEY_CTX_new'
> xxx.c:(.text+0x30): undefined reference to `EVP_PKEY_derive_init'
> xxx.c:(.text+0x48): un
On 11 April 2014 08:18, chetan wrote:
> I'm Using version 1.0.0e.
> Is my version of openssl is suitable for "EVP_PKEY_CTX_new()"??
> and if not how can i upgrade my version to latest version?
That version should be fine. See my response to your other thread for
next steps.
Matt
On 11 April 2014 06:25, chetan wrote:
> I tried your sample code but compiler showing error like "Undefined refrence
> to EVP_PKEY_CTX_new" although i included header file "openssl/evp.h".
> You have any idea why this errors occuring???
> And by the way thanks for the help friend.
Please
1) Post
On 10 April 2014 13:08, Buddhika E. wrote:
> Could anybody provide me some solution?
>
> Many Thanks,
> Buddhika
>
> PS: I attached a code sample
>
>
I haven't gone all through your code, but spotted this:
if(!EVP_DecryptUpdate(&ctx, out, &buflen, cipher, strlen(cipher))) {
You can't use strle
On 10 April 2014 07:54, chetan wrote:
> I write a code like this. but when i compile it show's error "Undefined
> EVP_PKEY_derive".
> what is the reason for that?
What version of openssl are you using? EVP_PKEY_derive is only in
OpenSSL 1.0.0 and later versions.
Matt
___
On 10 April 2014 07:29, chetan wrote:
> Thanks for giving time to me. I was given a task that i have to implement
> ECDHE algorithm means i can use openssl.
> So, can you please tell me what i have to do after generatic public and
> private key files. How to generate shared secret and what next a
On 9 April 2014 08:39, chetan wrote:
> I am newer to this and i want to make ECDHE algorithm for cilient-server.
> Can anyone tell me basic steps and functions to do this. all response are
> acceptable.
> Thankss in advance
>
Its unclear from your question whether you are l
On 3 March 2014 04:36, Jeffrey Walton wrote:
> Is there a list of EC curves to NIDs?
>
> http://www.openssl.org/docs/crypto/EC_KEY_new.html and
> http://www.openssl.org/docs/crypto/EC_GROUP_new.html discuss the
> curves and the NIDs, but don't provide a list.
>
> Or better, is there a function lik
On 28 February 2014 17:07, Paddy wrote:
>>>On 20 December 2013 09:09, Patrick McCorry <[hidden email]> wrote:
Thanks Guys,
At the moment I'm trying to distinguish if n > p, as the x co-ordinate
does not wrap around n (so x = r >>in all cases) - to verify if this is
always
On 22 January 2014 22:40, Dave Thompson wrote:
> The general public-key sign and verify processes are:
>
> S1. compute hash of data (or for CMS, hash of data-hash plus some other
> bits)
>
> S2. generate signature for hash S1 using private key (RSA, DSA, or ECDSA)
>
> S3. send signature with or l
On 21 January 2014 23:51, HelenH Zhang wrote:
> Thank you, Matt for your quick reply.
>
> I have additional questions: I looked both links below:
>
> https://www.openssl.org/docs/crypto/EVP_PKEY_encrypt.html
> https://www.openssl.org/docs/crypto/EVP_PKEY_decrypt.html
>
> One for encryption, one fo
On 21 January 2014 15:44, HelenH Zhang wrote:
> Dear experts:
>
> We want to be able to specify padding.
> RSA_PKCS1_PADDING or RSA_NO_PADDING.
>
> I would like to use EVP API instead of RSA_Public_decrypt(), and
> RSA_Private_encrypt().
> Which API should I use?
>
> I am currently using EVP_SignI
On 20 January 2014 15:34, khan wahid wrote:
> Hi,
> I am trying to implement DH key exchage using openssl in the same program,
> so I generate DH parameters once, and then transfer the p and g to another
> DH object, here is my code-
>
> #include
> #include
> #include
> #include
> #includ
On 20 December 2013 09:09, Patrick McCorry wrote:
> Thanks Guys,
>
> At the moment I'm trying to distinguish if n > p, as the x co-ordinate does
> not wrap around n (so x = r in all cases) - to verify if this is always the
> case
>
n can be greater than p, e.g. see the definition of secp112r1 i
On 20 December 2013 00:24, Matt Caswell wrote:
> On 19 December 2013 23:47, Porter, Andrew wrote:
>> So, additional data now. This works:
>>
>> ./openssl s_client -debug -cipher 'ECDHE-RSA-AES256-SHA' -curves
>> 'secp521r1:secp384r1:prime256v1:sect571
On 19 December 2013 23:47, Porter, Andrew wrote:
> So, additional data now. This works:
>
> ./openssl s_client -debug -cipher 'ECDHE-RSA-AES256-SHA' -curves
> 'secp521r1:secp384r1:prime256v1:sect571r1' -connect tomcat-host:443
>
> But use the same curves in a different order, with sect571r1 first
On 19 December 2013 18:52, Billy Brumley wrote:
> It's in the EC_GROUP structure: group->field. Check crypto/ec/ec_lcl.h. BBB
>
Anything in the *lcl.h header files does not form part of the public
API and you shouldn't really rely on it as it may change.
Better is to use:
int EC_GROUP_get_curve_
On 17 December 2013 18:11, Porter, Andrew wrote:
> We've into a problem with a native x86/Linux app of ours - linked
> statically with vanilla openssl-fips-2.0.2 and openssl-1.0.1e we've
> built - trying to connect to our Java app when it is running under
> the latest OpenJDK 1.7.0_45 on RedHat 6.
On 13 December 2013 17:33, andreas wrote:
> Hello,
>
> in our public hospital we have a application that has to encrypt data
> with a certificate.
> At the moment we call a batch files that does
>
> openssl.exe rsautl -encrypt -in %1 -out %1.enc -inkey SanitelCF.cer
> -certin -pkcs
I don't know w
On 5 December 2013 19:34, Dave Thompson wrote:
>> Well looking at the code where this error is raised:
>>
>> /* XXX: surely this is wrong - if ret is 0, it just didn't verify;
>>there is no error in BN. Test should be ret == -1 (Ben) */
>> if (ret != 1) DSAerr(DSA_F_DSA_DO_VERIFY,E
On 5 December 2013 23:32, John wrote:
> I recently became aware of aes-ni and found the linked articles. My CPU
> supports this, but it seems (assuming the advice in the linked pages is
> accurate) that openssl does not have it enabled. What am I missing? I am
> running Arch Linux x86_64 and
On 4 December 2013 22:38, Dave Thompson wrote:
> In addition to the misplaced paren already noted, and also a surplus paren,
>
> which I’ll assume were typos since they wouldn’t have compiled,
>
I think it could compile (unless there is another surplus paren I
haven't seen?):
EVP_SignInit(ctx, E
On 3 December 2013 10:36, Aastha Mehta wrote:
> Hello,
>
> I wrote a simple code to sign and verify using DSA keys, but I am facing
> some problem with verification and I cannot figure it out. This is the error
> I get:
> error:0A071003:dsa routines:DSA_do_verify:BN lib
>
> I know the error comes
On 1 December 2013 18:15, cvishnuid wrote:
> Thanks for reply matt. Yeah your correct I want implement completely from
> starch as my agenda is to have complete manged code in my server app and i
> did't find any manged manged crypto library with will is compatable with
> Open SSL Client. Client w
On 30 November 2013 18:52, cvishnuid wrote:
> I am newbie to Open SSL . I am already have an application where server and
> client are using Openssl libraries for Diffie hellman encryption.I wanna
> convert server to compleatly to C# .
It is not clear from your question whether you are plannin
On 14 October 2013 22:29, Joost Ringoot wrote:
> Hello,
>
> I am trying to install openssl-1.0.0 on fedora 19.
> I tried different versions:
> openssl-1.0.0k.tar.gz
> openssl-1.0.0f.tar.gz
> and
> openssl-1.0.0.tar.gz
>
> ./config and make appear ok
>
> but make install always ends like this:
>
>
On 7 October 2013 19:39, Dave Thompson wrote:
> You don’t need to change OpenSSL to do what you say you want; just create an
> EC_KEY with the curve,
>
> set the desired private key value, and do a point multiplication to get the
> public key value and set that.
>
>
>
> This is assuming a key to b
ice solution though.
Matt
> Br,
> Jonas
>
>
>
> 2013/9/3 Matt Caswell
>>
>> On 3 September 2013 15:16, Jonas Andersson
>> wrote:
>> > Hi all,
>> >
>> > Is there a way to verify a signature with ECDSA_do_verify having only
>> &g
On 3 September 2013 15:16, Jonas Andersson wrote:
> Hi all,
>
> Is there a way to verify a signature with ECDSA_do_verify having only the
> x-coordinate (in public key) available?
Are you sure you *only* have the x-coord and not a point in compressed
format? The difference being that with compres
On 16 August 2013 16:46, Swair Mehta wrote:
> On 16-Aug-2013, at 7:49 AM, Unga wrote:
>
>> Hi all
>>
>> I have a requirement to encrypt files, in such a way identical files should
>> generate identical ciphertexts.
>>
>> I plan to use aes-256-cbc cipher with 128-byte long non-guessable password
Just to clarify, that should say the OpenSSL wiki is NOW available!
Matt
Steve Marquess wrote:
>The recently created OpenSSL Wiki is not available for general access
>at
>
> http://wiki.openssl.org/
>
>It is starting to accumulate some useful content and should continue to
>grow in the futur
On 18 June 2013 19:22, Jakob Bohm wrote:
> Fundamentally, every CBC block except the first will use what you call a
> "predictable" IV, namely the previous ciphertext block. To make any sense
> security arguments about this need to be very clear about what is
> and is not vulnerable.
Your clarif
On 18 June 2013 09:43, Michel wrote:
> Hi Yamini,
>
> I would suggest looking at the 'EVP Envelope' API :
> https://www.openssl.org/docs/crypto/EVP_SealInit.html
>
Also see:
http://wiki.openssl.org/index.php/EVP_Asymmetric_Encryption_and_Decryption_of_an_Envelope
Matt
__
On 17 June 2013 15:17, Jakob Bohm wrote:
>>
>> IV's should always be random - you should not reuse an IV.
>> Using the the last block of cipher-text from a previous message as the
>> IV gives a predictable IV which is insecure in CBC mode for certain
>> classes of attack.
>
>
> You are making the
On 17 June 2013 14:02, enrico d'urso wrote:
> Hi, thanks for answer.
> At the moment in my application I create an random IV and a random KEY.
> Client after this creation send them to Server encrpyting all with RSA
> public key.
> Client decrypt the message with private key, and from this point t
On 17 June 2013 13:25, Matt Caswell wrote:
>>
>> Take a random IV, and use it.
>> Encrypt a message, and save last cipher-text ( Let be C).
>> Re-call EncryptInit using C as IV.
>>
>
> IVs must be random and not predictable in advance. Using the last
> bloc
On 17 June 2013 12:57, enrico d'urso wrote:
> Hi, thanks for your answer.
>
> I didn't call them all times, just first time.
> The fact is that I would like to use 'cbc' scheme, so I Could make this way,
CBC is a mode used within an individual message. It cannot be used
across multiple messages i
On 16 June 2013 10:41, enrico d'urso wrote:
> Client send to Server encrypt data, first time all works fine, but second
> time no.
> For example if I first time send:
> "Stack Overflow" server print "Stack Overflow",
> but second time anything client sends, server always print "erflow".
> Note tha
On 14 June 2013 01:55, Jakob Bohm wrote:
> On 6/12/2013 11:35 PM, Matt Caswell wrote:
>>
>> On 12 June 2013 21:15, Jakob Bohm wrote:
>>>>>
>>>>>
>>>>>> As for the DH_check_pub_key() function, checking if pubkey is in the
>>
On 14 June 2013 20:12, Steve Tarzia wrote:
> I am having some trouble finding documentation or examples showing how to
> perform Elliptic Curve crypto operations using the openssl command line
> tool. Is possible to perform EC encryption and decryption using the openssl
> command line tool?
>
> I
On 12 June 2013 21:15, Jakob Bohm wrote:
>>>
As for the DH_check_pub_key() function, checking if pubkey is in the
range "two to large prime minus 2, inclusive" is an insufficient check
against accepting degenerate keys. For instance NIST SP 800-56A
requires the following check
On 31 May 2013 21:07, Matt Caswell wrote:
> On 31 May 2013 16:42, Jakob Bohm wrote:
>> Interesting, I don't seem to be able to find code that calls dh_check
>> or equivalent on received DH group parameters, but then the check in
>> that function is too strict in its cr
On 31 May 2013 16:42, Jakob Bohm wrote:
> Interesting, I don't seem to be able to find code that calls dh_check
> or equivalent on received DH group parameters, but then the check in
> that function is too strict in its criteria (for instance, some
> standards (such as X9.42 and NIST SP 800-56A) r
On 31 May 2013 10:58, Jakob Bohm wrote:
> According to a server testing service I have tried, OpenSSL 0.9.8
> fails to reject degenerate ephemeral DH keys, while OpenSSL 1.0.0
> does this rejection. They do not provide a CVE number for this
> issue, and I cannot find it in the OpenSSL CHANGES fil
On 24 May 2013 05:45, Matt Caswell wrote:
> On 24 May 2013 03:21, wrote:
>> Can one use HMAC through EVP? If so, can someone point me to an example?
>>
>> It seems that when the OpenSSL module is in FIPS mode, it doesn't like
>> programs using HMAC_*() fu
On 24 May 2013 03:21, wrote:
> Can one use HMAC through EVP? If so, can someone point me to an example?
>
> It seems that when the OpenSSL module is in FIPS mode, it doesn't like
> programs using HMAC_*() functions directly:
>
> "OpenSSL internal error, assertion failed: Low level API call to di
On 15 May 2013 20:15, Bin Lu wrote:
> Hi,
>
> Could somebody tell me what names I should use in EVP_get_cipherbyname() to
> return the AES_128_GCM and AES_256_GCM ciphers? I looked into openssl code
> but got lost.
>
aes-128-gcm and aes-256-gcm
Matt
__
On 11 May 2013 05:05, Lunar Mushrooms wrote:
> Hello I can see a call to OBJ_bsearch_pmeth() in openssl source. By I could
> not find the definition of OBJ_bsearch_pmeth(). I greped the entire source.
> Can somebody help me to find the definition ?
>
> ./openssl-1.0.1d/crypto/evp/pmeth_lib.c:
On 25 April 2013 21:42, Taraniteja Vishwanatha wrote:
> Hey guys,
>
> I was using the low level aes APIs and now have switched to EVP ones. My
Good. That is (in most cases) the correct approach.
> string encryption and decryption always work fine. But when it comes to
> files, I am getting mall
On 15 April 2013 12:48, Anil Kumar K K wrote:
> Hi OpenSSL Team,
>
> I am Anil, trying to code aes encryption and decryption program using
> openssl library.
>
> I have coded a program which takes key and data as inputs and computes
> AES-128 cipher text and decrypt the same. If the size of the da
Hi Jeff
Is FHMQV covered by any patents? I've always assumed that was the
reason MQV was not in OpenSSL.
Matt
On 22 January 2012 20:03, Jeffrey Walton wrote:
> Hi All,
>
> Is anyone interested in implementing FHMQV in OpenSSL?
>
> I recently implemented FHMQV in Crypto++ (hopefully the patch wi
On 1 April 2013 23:30, Zach wrote:
> RSA* x = PEM_read_bio_RSA_PUBKEY(bio, NULL, NULL, NULL);
>
Try using this instead:
PEM_read_bio_PUBKEY
Matt
On 29 March 2013 15:09, Zach wrote:
> I'm trying to do the following:
> 1) Put a base64-encoded key (the normal one generated by openssl command
> line tools) into a header file
Do you mean to put the actual key itself hardcoded into the header
file?? This seems like a strange thing to do.
PEM f
On 26 March 2013 16:45, tos iro wrote:
> Hello
> I'm sorry when there is an impoliteness.
>
> I want you to tell me a *correct way to* call the EVP_CIPHER_CTX_cleanup().
>
> I'm writing the program for encrypt independent data one by one.
>
> Should I call EVP_CIPHER_CTX_cleanup() at each EVP_Encr
See:
http://wiki.opensslfoundation.com/index.php/EVP
http://wiki.opensslfoundation.com/index.php/EVP_Symmetric_Encryption_and_Decryption
http://wiki.opensslfoundation.com/index.php/EVP_Authenticated_Encryption_and_Decryption
Matt
On 22 March 2013 19:15, Jevin Sonut wrote:
> Can anyone post a sa
On 21 March 2013 21:04, steveRX04 wrote:
> I'm using DES so the cipher block size is 8 bytes. Padding is enabled.
DES? Really? Are you sure you want to use that? It is no longer
considered secure.
>
> I know that if the input buffer is 14 bytes, then by calling
> EVP_EncryptUpdate the first 8 b
On 20 March 2013 19:21, azhar jodatti wrote:
> One more query :).
>
> After generating secret key :
> byte[] bobSharedSecret = bobKeyAgree.generateSecret();//this generates
> secret key. Note : this key matches with C client secret key :)
>
> I am doing below stuff in JAVA :
>SecretKeyFac
On 20 March 2013 11:25, azhar jodatti wrote:
> byte[] bobPubKeyEnc = bobKpair.getPublic().getEncoded();
This is providing an encoded form of the public key, whereas your code
is expecting it as an integer. Use the following instead:
DHPublicKey dhpubkey = (DHPublicKey)(bobKpair.getPublic());
Big
On 20 March 2013 07:37, azhar jodatti wrote:
>> Public key :
>> 510930286596310951521275475612102569543976030982320596660271226159732273824290276894393668009018948652558944129592742623399736587550878753266525193164086412911472101163507241794456000621904406552477307648348188701130736756595973501460
On 19 March 2013 14:18, azhar jodatti wrote:
> On Tue, Mar 19, 2013 at 6:24 PM, Matt Caswell wrote:
>> On 19 March 2013 12:22, azhar jodatti wrote:
>> >PEM_write_bio_DHparams(out, temp);//this prints public key in
>> > base64
>> > (this is what i t
On 19 March 2013 12:22, azhar jodatti wrote:
>PEM_write_bio_DHparams(out, temp);//this prints public key in base64
> (this is what i think :) )
This is NOT a base64 representation of the public key. This is
printing out the parameters only (which does not include the public
key)
>
On 19 March 2013 10:37, azhar jodatti wrote:
>
>
> On Tue, Mar 19, 2013 at 2:58 PM, Matt Caswell wrote:
>>
>> On 19 March 2013 09:01, azhar jodatti wrote:
>>
>> > And possibly relevant here, the standard Suncle JCE provider actually
>> > uses DSA
On 19 March 2013 09:01, azhar jodatti wrote:
> And possibly relevant here, the standard Suncle JCE provider actually
> uses DSA paramgen for DH and thus imposes the DSA size restrictions
> on DH -- 512 to 1024 in steps of 64 -- although they aren't required
> by any standard I know of. I don't re
On 18 March 2013 21:44, Matt Caswell wrote:
> However, you are correct that the DH computation does not use q, although
> I do not
>
> know whether JCE requires it to be specified (not having used JCE).
>
> One other point on this - X9.42 describes an optional validation proced
On 18 March 2013 21:02, Dave Thompson wrote:
> >I also just noticed that in your JSON sample there is only one
> >prime number provided. There are in fact two required: p and q.
>
> No. *DSA* uses p,q,g. DH requires p,g which effectively determines
> q, but DH computation doesn't use q and standa
On 18 March 2013 15:05, azhar jodatti wrote:
>
> I also just noticed that in your JSON sample there is only one prime
> number provided. There are in fact two required: p and q.
> well, I think other prime number is g and not q. other prime number is
> base generator i.e g in above JSON sample.
>
On 18 March 2013 12:15, azhar jodatti wrote:
> 2) Is this sample from the *same* key exchange? The parameters are
> different which are obviously going to cause it to fail.
> When I run both programs it calculates the params (p,g,pk) every time on
> execution . that's the reason both key values a
On 16 March 2013 18:00, azhar jodatti wrote:
>
>
> Thompson,
>
> Really thanks for the reply. appreciate your time.
>
> Yes it was JCE and not JCF. it was typo :)
>
> I am working on application which has android and iPhone client. Both the
> client talk to my server which is written in JAVA. I
On 6 March 2013 11:40, Dr. Stephen Henson wrote:
> On Wed, Mar 06, 2013, Matej Kenda wrote:
>
> >
> > I am working on a solution which includes encryption of files of
> arbitrary
> > size (at least up to 2 GB) to be encrypted with AES CCM with 256-bit key
> > and uploaded to a server.
> >
>
> CCM
See the README for instructions, under the SUPPORT section:
http://git.openssl.org/gitweb/?p=openssl.git;a=blob_plain;f=README;hb=refs/heads/master
Matt
On 6 March 2013 23:10, Dennis Clarke wrote:
> Is there a bugzilla site or similar for openssl ?
> __
It is a feature of GCM that the ciphertext (excluding the authentication
tag) is identical length to the plaintext. Therefore no padding is required.
Matt
On 8 February 2013 14:27, Dirk Menstermann wrote:
> Hi,
>
> I'm playing around with "EVP_aes_128_gcm". This works, but it seems that
> EVP_*
I have previously submitted a largish patch for documentation around the
OpenSSL EC library. Unfortunately there seems little interest in it, and it
has been hanging around in RT for some while:
https://rt.openssl.org/Ticket/Display.html?id=2799 (username guest,
password guest)
This documentatio
tion for all the modes supported by openssl??
>
> Regards,
> Rohit Bansal
>
>
> On Mon, Jan 14, 2013 at 1:16 PM, Matt Caswell wrote:
>
>> The EVP API is documented here:
>> https://www.openssl.org/docs/crypto/EVP_EncryptInit.html#
>>
>> There is some e
t; On Mon, Jan 14, 2013 at 12:22 PM, Matt Caswell wrote:
>
>> Yes, you can use CTR mode for AES-256: use the EVP interface with the
>> EVP_CIPHER of EVP_aes_256_ctr().
>>
>> However it is a fundamental requirement of CTR mode that the IV must be
>> unique across mes
Yes, you can use CTR mode for AES-256: use the EVP interface with the
EVP_CIPHER of EVP_aes_256_ctr().
However it is a fundamental requirement of CTR mode that the IV must be
unique across messages. If you reuse the IV then your messages can be
broken quite trivially. Therefore, if by a fixed IV,
With PKCS padding there is always between 1 and 16 padding bytes added (for
AES). The value of the padding bytes is equal to the number of padding
bytes added, so if one padding byte has been added then the value "0x01"
will be added, for two padding bytes then "0x0202" will be added, for three
"0x
You should just be able to create an ECDSA_SIG structure using:
ECDSA_SIG *mysig;
if(!(mysig = ECDSA_SIG_new())) goto err;
And then simply copy your r and s values directly into the ECDSA_SIG
structure (assuming they are BIGNUMs):
if(!BN_copy(mysig->r, r)) goto err;
if(!BN_copy(mysig->s, s)) go
On 18 December 2012 05:30, jeetendra gangele wrote:
> Ok,
>
> can you expain me how ec_compute_key work and specially this last argument.
> Why its need hash value to calculate the secret key.
> I need to generate the 56 BYtes shred key.
>
A KDF (Key Derivation Function) is typically used to gen
>
> Yes i did same thanks for all ur support.
> Is there any relation between curve parameter and private key or
> private key can be any random number?
>
Yes there is a relationship. The private key must be a random number
between 0 and the order of the curve.
> As far I remeber there is relati
On 14 December 2012 15:02, jeetendra gangele wrote:
> On 14 December 2012 20:18, Matt Caswell (fr...@baggins.org)
> wrote:
> >
> >
> > On 14 December 2012 14:20, jeetendra gangele
> wrote:
> >>
> >> it looks very odd loading of public key during si
On 14 December 2012 14:20, jeetendra gangele wrote:
> it looks very odd loading of public key during sign operation.
> Ok tell me one thing I can load any valid point on the curve during sign.
>
An ECDSA sign operates on the curve and associated parameters, the private
key, and the message, and
On 14 December 2012 13:36, jeetendra gangele wrote:
> Ok,
> So is there any way after setting these parameters I can get the
> public key(point) on curve.?
>
Setting the parameters just gets you a curve, not a private/public key
pair. To create a private/public key pair create an EC_KEY object (
marlin and I wanted to load these parameter.
> > Its must for me to load these parameters.
> >
> >
> > On 14 December 2012 17:37, Matt Caswell (fr...@baggins.org)
> > wrote:
> >>
> >>
> >> On 14 December 2012 11:47, jeetendra gangele
> wr
On 14 December 2012 12:37, jeetendra gangele wrote:
> I got these parameters from marlin and I wanted to load these parameter.
> Its must for me to load these parameters.
>
> I am not familiar with what marlin is, so I cannot advise on that. I would
double check that the parameters do not corresp
On 14 December 2012 11:47, jeetendra gangele wrote:
> Thanks
> But i have these parameters and I wanted to load them p,a,b,q
> Do u know how can i load them?
>
>
The parameters are related to the definition of the curve. Where did you
get the parameters from? Are you sure they are not just the pa
On 14 December 2012 11:14, jeetendra gangele wrote:
> Okay,
> Thankd for ur reply.
>
> If i have only private key in my ECC_key object Will be able to sign the
> data?.
>
I've not tried it, so I'm not sure. I've had a quick review of the code and
I can't see any reason why not, but I wouldn't re
On 14 December 2012 10:32, jeetendra gangele wrote:
> But why we need to load the public key for signing the data?
> for signing I need only private key.
> When I load the public and private both key I could sign the data.
> but when I load only private key and calling Key_check function its
> fa
char b1[] =
> "18679335321211177614181391980475641049275229937844945546185683145837";
>
Where did you get this value from? Is this a private key you have been
provided with that you *must* use?
Unless you particularly need to use a specific private key it is better to
use
EC_KEY_generate_key
See:
http://marc.info/?l=openssl-users&m=134867395821086&w=2
On 11 October 2012 17:19, e...@mit.edu wrote:
> Hello,
> I am trying to encrypt and decrypt a string using command-line openssl
> (1.0.1c) with the id-aes256-GCM algorithm, but every time it fails
>
> echo -n "bla" | openssl enc -e -i
1301 - 1400 of 1436 matches
Mail list logo