-
From https://www.openssl.org/docs/man1.1.0/man3/RSA_public_encrypt.html
> RSA_PKCS1_OAEP_PADDING
>
> EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding parameter. This …
-
Two things that I'm trying to achieve: Creating the signing keys when starting a server. And being able to have access to the original signing key so that it can be used in other libraries (e.g for ht…
-
Issue description:
I have a full certificate chain (root + intermediate + client) in the YubiKey.
- Client cert is stored in slot 9a
- Intermediate cert is stored in slot 83
- Root cert is stor…
-
The streaming service fails when using the private key content. It seems to require a PKCS1 key that starts with "BEGIN RSA PRIVATE KEY" but there is no way to generate a PKCS1. Nor does it accepts th…
-
JSON Web Encryption ([RFC7516](https://datatracker.ietf.org/doc/html/rfc7516)) specifies tokens encrypted with RSAES-PKCS1-v1_5 padding using `RSA1_5`.
Based on recent results in the [Marvin Attack…
-
**Describe the bug**
After redeploying a previously working SWB we can no longer get connections to rdp workspaces
**To Reproduce**
Steps to reproduce the behavior:
1. Go to workspaces
2. Click…
mrgum updated
3 months ago
-
`s_server`和`s_client`打印出的信息中,将签名机制`sm2sig_sm3`显示为了`UNKNOWN`,尽管显示的`ID`(`0x0708`)是正确的。
```
extension_type=signature_algorithms(13), length=32
ecdsa_secp256r1_sha256 (0x0403)
…
-
```
cd credentials-decrypt/test
ubuntu@x:/opt/czdap-tools/credentials-decrypt/test$ python test-decrypt.py
Traceback (most recent call last):
File "test-decrypt.py", line 5, in
from Crypto.Ciph…
-
The default/fips provider RSA implementations support a new padding mode called RSA_PKCS1_WITH_TLS_PADDING. This has not been added to the legacy RSA EVP_PKEY_METHOD. However libssl now requires this …
-
As a follow-up from #13167, there was an unresolved [discussion](https://github.com/openssl/openssl/pull/13167#discussion_r516464407) about using macros for certain strings which are currently hard-co…