Displaying 5 results from an estimated 5 matches for "rsa_no_padding".
2000 May 10
4
openssl w/ rsaref openssh won't configure
...a.h>
int main(void)
{
RSA *key; char a[2048],b[2048];;
memset(a, 0, sizeof(a));memset(b, 0, sizeof(b));
RAND_add(a, sizeof(a), sizeof(a));
key=RSA_generate_key(32,3,NULL,NULL);
if (key==NULL) return(1);
return(-1==RSA_private_decrypt(RSA_size(key),a,b,key,RSA_NO_PADDING));
}
2000 Mar 17
2
Problem with 1.2.3pre4 and RSAref
The following code snippet will not compile support for RSAref on NetBSD even
if it exists on the system (which breaks OpenSSL):
for WANTS_RSAREF in "" 1 ; do
if test -z "$WANTS_RSAREF" ; then
LIBS="$saved_LIBS -lcrypto"
else
LIBS="$saved_LIBS -lcrypto -lRSAglue
2001 Mar 06
3
crashing on receiving connection
...ceived signal SIGSEGV, Segmentation fault.
0x40075a30 in BN_MONT_CTX_set () from /usr/lib/libcrypto.so.0.9.6
Running step-for-step, I saw it crashing in the following line in
protocol.c:
/* Encrypt the random data */
if(RSA_public_encrypt(len, cl->hischallenge, buffer, cl->rsa_key, RSA_NO_PADDING) != len) /* NO_PADDING because the message size equals the RSA key size and it is totally random */
I have no idea, I am not a very good debuging expert.
BTW, the client on the other side says:
Mar 6 18:34:21 isdn tinc.vpn[3114]: Terminating
Mar 6 18:34:22 isdn tinc.vpn[3120]: tincd 1.0pre3 st...
2000 Jul 19
2
Why do I *still* need RSA?
OpenSSH Developers,
I'm researching whether or not OpenSSH is a viable commercial
alternative to F-SECURE SSH or SSH.COM's ssh, but I'm not getting the
kind of results that I expected from a "Non patent encumbered ssh
client".
When I attempt to build OpenSSH against an OpenSSL build without rc5,
idea, or rsa it bombs since OpenSSL doesn't place the header files in
the
2000 May 14
0
OpenSSH 2.1.0+OpenSSL 0.9.5a+RSAref 2.0 trouble
...t main(void)
{
RSA *key; char a[2048],b[2048];;
memset(a, 0, sizeof(a));memset(b, 0, sizeof(b));
RAND_add(a, sizeof(a), sizeof(a));
key=RSA_generate_key(32,3,NULL,NULL);
---> if (key==NULL) return(1);
return(-1==RSA_private_decrypt(RSA_size(key),a,b,key,RSA_NO_PADDING));
}
The arrowhead points to the line that fails.
I built this exact code on a Linux system, then wrote a Perl wrapper to
get the return code. I got the 1 return code per that arrowheaded line.
It should also be noted that I used the standard RSARef 2.0 code with and
without the modulus bug pat...