search for: rsa_no_pad

Displaying 5 results from an estimated 5 matches for "rsa_no_pad".

2000 May 10
4
openssl w/ rsaref openssh won't configure
...a.h> int main(void) { RSA *key; char a[2048],b[2048];; memset(a, 0, sizeof(a));memset(b, 0, sizeof(b)); RAND_add(a, sizeof(a), sizeof(a)); key=RSA_generate_key(32,3,NULL,NULL); if (key==NULL) return(1); return(-1==RSA_private_decrypt(RSA_size(key),a,b,key,RSA_NO_PADDING)); }
2000 Mar 17
2
Problem with 1.2.3pre4 and RSAref
The following code snippet will not compile support for RSAref on NetBSD even if it exists on the system (which breaks OpenSSL): for WANTS_RSAREF in "" 1 ; do if test -z "$WANTS_RSAREF" ; then LIBS="$saved_LIBS -lcrypto" else LIBS="$saved_LIBS -lcrypto -lRSAglue
2001 Mar 06
3
crashing on receiving connection
...ceived signal SIGSEGV, Segmentation fault. 0x40075a30 in BN_MONT_CTX_set () from /usr/lib/libcrypto.so.0.9.6 Running step-for-step, I saw it crashing in the following line in protocol.c: /* Encrypt the random data */ if(RSA_public_encrypt(len, cl->hischallenge, buffer, cl->rsa_key, RSA_NO_PADDING) != len) /* NO_PADDING because the message size equals the RSA key size and it is totally random */ I have no idea, I am not a very good debuging expert. BTW, the client on the other side says: Mar 6 18:34:21 isdn tinc.vpn[3114]: Terminating Mar 6 18:34:22 isdn tinc.vpn[3120]: tincd 1.0pre...
2000 Jul 19
2
Why do I *still* need RSA?
OpenSSH Developers, I'm researching whether or not OpenSSH is a viable commercial alternative to F-SECURE SSH or SSH.COM's ssh, but I'm not getting the kind of results that I expected from a "Non patent encumbered ssh client". When I attempt to build OpenSSH against an OpenSSL build without rc5, idea, or rsa it bombs since OpenSSL doesn't place the header files in the
2000 May 14
0
OpenSSH 2.1.0+OpenSSL 0.9.5a+RSAref 2.0 trouble
...t main(void) { RSA *key; char a[2048],b[2048];; memset(a, 0, sizeof(a));memset(b, 0, sizeof(b)); RAND_add(a, sizeof(a), sizeof(a)); key=RSA_generate_key(32,3,NULL,NULL); ---> if (key==NULL) return(1); return(-1==RSA_private_decrypt(RSA_size(key),a,b,key,RSA_NO_PADDING)); } The arrowhead points to the line that fails. I built this exact code on a Linux system, then wrote a Perl wrapper to get the return code. I got the 1 return code per that arrowheaded line. It should also be noted that I used the standard RSARef 2.0 code with and without the modulus bug...