Jan 2017
$ openssl help
[...]
Message Digest commands (see the `dgst' command for more details)
md4 md5 mdc2 rmd160
sha sha1
[...]
$ openssl dgst -sha256 .bash_history
SHA256(.bash_history)=
b8f9308c4b9141993b4af1cee6cdffe36339bc2e05c0bf16206f9944
/usr/local/openssl10/bin/openssl dgst -sha256 /tmp/test.txt
SHA256(/tmp/test.txt)=
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
/usr/local/openssl11/bin/openssl dgst -sha256 /tmp/test.txt
SHA256(/tmp/test.txt)=
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca49
> Then I've misunderstood the presence of the "-DSHA256_ASM" flag.
>
> What's it specifically used for?
To remind me to double-check my answers? :(
Sorry, they are present. The difference is that the help message in 1.0.2
isn't complete. Did you try the commands directly?
--
openssl-users
On 30/05/2017 17:20, PGNet Dev wrote:
I'm building separate local instances of latest Openssl v1.1.0 & v1.0.2 on
linux64, to keep not-yet-v110-compliant apps happy.
The results are both functional, but the v102l build is missing
sha{224|256|384|512} digests
v 1.0.2l
On 5/30/17 8:25 AM, Salz, Rich wrote:
The results are both functional, but the v102l build is missing
sha{224|256|384|512} digests
Right; those digests are not in 1.0.2
Then I've misunderstood the presence of the "-DSHA256_ASM" flag.
What's it specifically used for?
--
openssl-users
> The results are both functional, but the v102l build is missing
> sha{224|256|384|512} digests
Right; those digests are not in 1.0.2
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
I'm building separate local instances of latest Openssl v1.1.0 & v1.0.2 on
linux64, to keep not-yet-v110-compliant apps happy.
The results are both functional, but the v102l build is missing
sha{224|256|384|512} digests
v 1.0.2l
/usr/local/openssl10/bin/openssl version
Maybe different encodings like here:
http://stackoverflow.com/questions/6839969/md5-hash-with-different-results
2016-10-25 7:36 GMT+02:00 shanthi thomas :
> Hi,
> I read that this happens because openssl is treating the input as
> characters as opposed to binary data. But
Hi, I read that this happens because openssl is treating the input as
characters as opposed to binary data. But how do I rectify it so that openssl
gives the same digest output as BouncyCastle?
thanks,Elizabeth--
openssl-users mailing list
To unsubscribe:
Even a small convenience is still a convenience.
And eventually they add up.
Thanks for the comments - it's appreciated.
--
View this message in context:
http://openssl.6102.n7.nabble.com/SHA256-to-EVP-tp57774p57826.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
From: openssl-users On Behalf Of jonetsu
Sent: Wednesday, April 29, 2015 10:07
snip
The man page (the one online from OpenSSL project - SHA256.html)
gives a description using SHA1() which computes a message digest.
Note this is the same page for
SHA{1,224,256,384,512}{,_Init,_Update,_Final
Thanks for the comments.
If you are implementing HMAC, perhaps for PBKDF2 (which does
that prehash-if-too-long), I hope you mean the code does...
Yes it does.
The man page (the one online from OpenSSL project - SHA256.html)
gives a description using SHA1() which computes a message digest
From: openssl-users On Behalf Of jonetsu
Sent: Tuesday, April 28, 2015 13:53
What would be the equivalent of the SHA256() function in the EVP
class of methods ? EVP_sha256() could be it, although from the
short description in manual page it does not seemingly fit in,
returning a EVP_MD
Hello,
What would be the equivalent of the SHA256() function in the EVP
class of methods ? EVP_sha256() could be it, although from the
short description in manual page it does not seemingly fit in,
returning a EVP_MD which is, if not mistaken, a env_md_st
structure.
The code I'm adapting to EVP
Please consider including other message digest algorithms like sha256
For example here: https://www.openssl.org/docs/apps/ca.html
Thank you!
Szépe Viktor
--
+36-20-4242498 s...@szepe.net skype: szepe.viktor
Budapest, XX. kerület
___
What version of openssl started supporting sha256 ? Also in what version of
openssl was bug CVE-2005-1730 no longer an issue? I have version OpenSSL
0.9.7d and above. Thanks for any info.
Nick Patetta
From: Scott Wilson excell...@hotmail.com
Date: 01/18/2012 01:52 PM
Does openssl support SHA256?
Yes
If SHA256 is supported, how do I get it to work? Thanks!!
SHA256_Init/Update/Final()
it was there.
Subject: Re: openssl and SHA256
From: w...@omnigroup.com
Date: Wed, 18 Jan 2012 12:03:38 -0800
To: openssl-users@openssl.org
On Jan 18, 2012, at 11:47 AM, Scott Wilson wrote:
Does openssl support SHA256?
Yes, it does. I'm not sure why it doesn't show up in the output of
list
Does openssl support SHA256?
Current version: OpenSSL 1.0.0e 6 Sep 2011
This would indicate that it does not:
root@ubuntu:/# openssl list-message-digest-commands
md4
md5
rmd160
sha
sha1
This document (http://www.openssl.org/docs/apps/openssl.html) however lists it
as a
MESSAGE DIGEST
On Jan 18, 2012, at 11:47 AM, Scott Wilson wrote:
Does openssl support SHA256?
Yes, it does. I'm not sure why it doesn't show up in the output of
list-message-digest-commands or the usage message, but openssl sha256 will
compute a SHA256 digest, and openssl dgst --help lists
: default_md =
sha256. Anyway, I'm just wondering which version began supporting SHA256 or
what's wrong with my command such that it signs with SHA1? Thanks again!
Subject: Re: openssl and SHA256
From: w...@omnigroup.com
Date: Wed, 18 Jan 2012 12:03:38 -0800
To: openssl-users@openssl.org
On Thu August 14 2008 23:05, Rafiqul Ahsan wrote:
Hi David,
I believe 2048 could not be the issue (as you said because I am using
64 bit OS),
Which will probably run either 32bit or 64bit userland code.
Next question: Are you running 64bit openSSL?
(You could be running 32bit openSSL and
Mike,
I have installed openssl on 64 bit OS. I believe 64-bit libraries
produced by default if we try to build OpenSSL on a 64-bit platform.
I would still like to verify whether the installed openssl is 32, or
64 bit . Can you please let me know the necessary commands to verify
it ?
On
Hi Sergio,
I tried with SHA1, and it is working just fine (Signature Algorithm:
sha1WithRSAEncryption).
Now, sha256 is not really working...is really openssl 0.9.8h supports
this advanced algorithm ? I have given the output as below...but
freeradius suggests that with the patch it should work
Sergio wrote:
For the other side, i don't know anything about WiMAX, but i suposse
that credentials are the same. Hope this helps
__
I do. WiMAX certs (the ones uses in EAP-TLS and EAP-TTLS sessions over
the airlink to
Hi David,
Thanks for your reply...I believe I am running Freeradius, and
openssl0.9.8h on 64 bit OS. If you want I can post the certs output as
well. Pls let me know. I need to make this working, and I have been
working on this for last 2 weeks and seeing the same error.
Here is the command used
Hi David,
I believe 2048 could not be the issue (as you said because I am using
64 bit OS), this is about supporting sha256 algorithm either with
0.9.8h, or my Freeradius 2.0.5 (both are latest). Because sha1 works
well with my installation with even RSA 2048 key. And ofcourse, as per
my previous
We saw these same errors in a WiMAX test network with Free Radius.
Moving from an older 32 bit Fedora to a current 64 bit Fedora and the
stock freeradius and freeradius-util packages made it work and made the
errors you exhibit disappear.
openssl0.9.8h manifestly does support the necessary
Rafiqul Ahsan escribió:
Found a previous postings like this where Alan Dekok answered that
FreeRadius use SSL from openssl, and if SSL supports any advanced
algorithm FreeRadius should support it (I actually added a patch to
FreeRadius to make sure this supports all digests). I am currently
Thanks, I will try to figure out as you suggested.
Rafi
On 8/13/08, Sergio [EMAIL PROTECTED] wrote:
Rafiqul Ahsan escribió:
Found a previous postings like this where Alan Dekok answered that
FreeRadius use SSL from openssl, and if SSL supports any advanced
algorithm FreeRadius should
Ahsan
Sent: Wednesday, August 13, 2008 7:19 PM
To: openssl-users@openssl.org
Subject: Re: openssl 0.8.9h sha256
Thanks, I will try to figure out as you suggested.
Rafi
On 8/13/08, Sergio [EMAIL PROTECTED] wrote:
Rafiqul Ahsan escribió:
Found a previous postings like this where Alan Dekok
Rafiqul Ahsan escribió:
I see an error like below when trying to use EAP_TLS/TTLS
authentication with Certs that has Signature Algorithm:
sha256WithRSAEncryption . Can anybody tell me why SSL does not like
the TLS session ?
I would appreciate your help. here is the radiusd -X log:
++[suffix]
Found a previous postings like this where Alan Dekok answered that
FreeRadius use SSL from openssl, and if SSL supports any advanced
algorithm FreeRadius should support it (I actually added a patch to
FreeRadius to make sure this supports all digests). I am currently
trying to find out whether I
I see an error like below when trying to use EAP_TLS/TTLS
authentication with Certs that has Signature Algorithm:
sha256WithRSAEncryption . Can anybody tell me why SSL does not like
the TLS session ?
I would appreciate your help. here is the radiusd -X log:
++[suffix] returns noop
rlm_eap: EAP
34 matches
Mail list logo