similar to: AES algorithm package

Displaying 20 results from an estimated 100000 matches similar to: "AES algorithm package"

2013 Nov 04
2
transform one probability distribution into another
Hi guys Given a exponential curve, is there any function on r that can generate exponential distributed random numbers? in General I want an function that can transform one probability distribution into another?? Regards ****************************************************************** Bander ************************************* [[alternative HTML version deleted]]
2007 Jan 22
2
aes unsupported algorithm for ipsec?
Hi all, I''m trying to create a IPsec tunnel from a Debian Etch machine to a Cisco PIX. Part of my config is the following: add x.x.x.x x.x.x.x esp 34501 -m tunnel -E aes-ctr "abcdefghijklmnop"; When I try to set this using setkey, it fails with the following message: line 9: unsupported algorithm at [abcdefghijklmnop] parse failed, line 9. Can anyone tell me what
2009 Jun 02
3
UTF-8, AES encryption, the works - help !
Hi, I would like to store some sensitive data into my DB using Rails, it has to be encrypted. I''ve tried a lot of methods of encryption, they all work. Fine by now, yet when I try to store the results into my DB (tables are UTF-8, SET NAMES UTF8; is there, server UTF-8, DB Connection UTF-8) -- I can cmd (yeah, Windows..) and enter a UTF-8 record into the table, so that''s not
2011 Apr 05
5
IAS trunk error AES encryption disabled. Install OpenSSL.
Hey Guys! I am getting this wired error when i am calling IAX trunk. Everything works! but i want to get rid on these RED WARNING messages.. what is wrong here ? I have func_aes.so module loaded. also i remove and test but still same error. -Satish == Using SIP RTP CoS mark 5 -- Executing [7623 at from-sip:1] Macro("SIP/7527-0000000d", "orasebcamdial,7623") in
2005 Jun 30
1
Forcing tinc to use aes-128 cipher
I am trying to get tinc to use aes-128-cbc for it's encryption algorythm for network traffic. So far, I'm not having any luck. I've tried putting it into the tinc.conf file, and it turns out that tinc is ignoring that code completely. I'm using tinc 1.0.4 (in TCP mode). Openssl version 0.9.7d. I've made some initial investigation into the source, and in net_setup.c I
2018 Sep 21
0
AES-GCM with AES-NI
This is in regards to: https://bugzilla.samba.org/show_bug.cgi?id=11451 https://bugzilla.samba.org/show_bug.cgi?id=13008 Would it be possible to find out the current state of AES-GCM mode for file shares? Outside of Samba, CCM is typically slower and considered inferior to GCM I apologize for formatting issues, I typically don’t use email lists. In /source3/smbd/smb2_negprot.c lines 494 to
2015 Aug 19
0
Samba 4 DC - no AES kerberos tickets - only arcfour
On 08/18/2015 02:28 PM, Ritter, Marcel (RRZE) wrote: > Hi, > > I’ve been running a samba 4 DC for quite some time now, and while testing some kerberos related stuff, I noticed that all kerberos tickets I can get from the DC are of encryption type ?arcfour-hmac-md5“: > > # kinit testuser1 > testuser1 at S4DOM.TEST's Password: > > # klist -v > Credentials cache:
2009 Jan 20
1
OpenSSH private key encryption: time for AES?
Hi, all. So, in reviewing my OpenSSH keypairs and evaluating the size my RSA keys should be, i realized that, if i update my 2048-bit keypairs to 4096 bits, it really doesn't matter that much, because they're still only encrypted with 3DES, which provides an effective 112 bits of symmetric encryption strength: $ head -4 ~/.ssh/id_rsa -----BEGIN RSA PRIVATE KEY----- Proc-Type:
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-05:19.ipsec Security Advisory The FreeBSD Project Topic: Incorrect key usage in AES-XCBC-MAC Category: core Module: netinet6 Announced:
2005 Jul 27
0
FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-05:19.ipsec Security Advisory The FreeBSD Project Topic: Incorrect key usage in AES-XCBC-MAC Category: core Module: netinet6 Announced:
2015 Aug 18
2
Samba 4 DC - no AES kerberos tickets - only arcfour
Hi, I’ve been running a samba 4 DC for quite some time now, and while testing some kerberos related stuff, I noticed that all kerberos tickets I can get from the DC are of encryption type ?arcfour-hmac-md5“: # kinit testuser1 testuser1 at S4DOM.TEST's Password: # klist -v Credentials cache: FILE:/tmp/krb5cc_0 Ticket etype: arcfour-hmac-md5, kvno 1 I can create keytabs containing
2015 Aug 19
2
Samba 4 DC - no AES kerberos tickets - only arcfour
Hi Trever, things improved after resetting user/machine passwords, however only the session key is using aes256 now, the ticket itself is still arcfour: root at ubuntu1:~# kinit user09999 user09999 at S4DOM.TEST's Password: root at ubuntu1:~# klist -v Credentials cache: FILE:/tmp/krb5cc_0 Principal: user09999 at S4DOM.TEST Cache version: 4 Server: krbtgt/S4DOM.TEST at
2009 Oct 16
0
AES CTR mode
I'm looking at replacing some algorithms with different implementations, and I'm having some problems with the AES CTR mode algorithms. I can see where encryption is done, but I can't figure out where decryption occurs. I'm looking at cipher-ctr.c ---- Scott Neugroschl XYPRO Technology Corporation scott_n at xypro.com 805-583-2874
2011 Nov 11
2
Encryption package of R
Dear all: Is there any encryption package of R? For instance, 3DES or AES algorithm package or whatever... Thanks a lot in advance. Best regards, Jason [[alternative HTML version deleted]]
2010 Aug 26
1
Change of kerberos encryption from DES to AES
Hello all, as our Windows DCs will switch off DES encryption in the near future I have to change our Samba-Server to AES encryption. If I understand it correctly I have to change kerberos-configuration to new encryption type (aes256-cts-hmac-sha1-96) and then re-join my Samba-Server to the domain. Is this correct? Any other things to consider? Thanks a lot, Christian
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
https://bugzilla.mindrot.org/show_bug.cgi?id=1550 Summary: Move from 3DES to AES-256 for private key encryption Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: All Status: NEW Keywords: patch Severity: enhancement Priority: P2 Component: ssh-keygen AssignedTo:
2015 Aug 19
0
Samba 4 DC - no AES kerberos tickets - only arcfour
On 08/19/2015 12:02 AM, Ritter, Marcel (RRZE) wrote: > Hi Trever, > > things improved after resetting user/machine passwords, however only the session key is using aes256 now, the ticket itself is still arcfour: > > root at ubuntu1:~# kinit user09999 > user09999 at S4DOM.TEST's Password: > root at ubuntu1:~# klist -v > Credentials cache: FILE:/tmp/krb5cc_0 >
2017 Mar 25
7
[Bug 2699] New: PKCS#8 private keys with AES-128-CBC stopped working
https://bugzilla.mindrot.org/show_bug.cgi?id=2699 Bug ID: 2699 Summary: PKCS#8 private keys with AES-128-CBC stopped working Product: Portable OpenSSH Version: 7.5p1 Hardware: amd64 OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh-keygen Assignee:
2001 Sep 12
0
AES update..
I've done a decent size update of the OpenSSH portable from the upstream tree. There is an AES upgrade that needs to take place, but I need people to test and tell me what endedness changes need to be applied (if any). Attached is the patch. It is geared towards the latter snapshots..Unsure how it will patch (if at all) against 2.9pX series. Thanks. - Ben "This is dark day in
2004 Jul 09
3
Strong Encryption
Does anyone knows which one is the strongest and which is the fastest encryption algorithms used in OpenSSH 3.7.1p2 from the list below aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael-cbc at lysator.liu.se, aes128-ctr, aes192-ctr, aes256-ctr Strong Encryption OpenSSH supports 3DES, Blowfish, AES and arcfour as encryption algorithms. These are patent