You can subscribe to this list here.
2004 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
(3) |
Jun
|
Jul
(1) |
Aug
(3) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2006 |
Jan
|
Feb
(3) |
Mar
(2) |
Apr
(5) |
May
|
Jun
(4) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(6) |
Dec
(2) |
2007 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(3) |
2008 |
Jan
(1) |
Feb
(1) |
Mar
(2) |
Apr
(4) |
May
(1) |
Jun
(1) |
Jul
(5) |
Aug
(2) |
Sep
(12) |
Oct
(7) |
Nov
|
Dec
(38) |
2009 |
Jan
(3) |
Feb
(19) |
Mar
(12) |
Apr
(19) |
May
(42) |
Jun
(17) |
Jul
(22) |
Aug
(5) |
Sep
(4) |
Oct
|
Nov
(1) |
Dec
(9) |
2010 |
Jan
(3) |
Feb
(5) |
Mar
(1) |
Apr
(2) |
May
(4) |
Jun
(1) |
Jul
(5) |
Aug
(2) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
2011 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
2013 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
(3) |
Jul
(1) |
Aug
(1) |
Sep
(1) |
Oct
|
Nov
(2) |
Dec
(1) |
2014 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
(1) |
Dec
|
2015 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
(4) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
(1) |
Sep
|
Oct
(1) |
Nov
|
Dec
|
2017 |
Jan
(1) |
Feb
(1) |
Mar
(1) |
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2018 |
Jan
|
Feb
(5) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2020 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
2022 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(1) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2024 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
From: Daniel C. <cam...@on...> - 2004-08-05 18:59:21
|
I have looked all over and have yet to find an example of the key for the key_string parameter. I have tried many different openssl public keys and all of them fail with the wrong format. The documentation says " new_public_key Create a new Crypt::OpenSSL::RSA object by loading a public key in from a string containing Base64/DER-encoding of either the PKCS1 or X.509 representation of the key. The string should include the -----BEGIN...----- and -----END...----- lines. The padding is set to PKCS1_OAEP, but can be changed with the use_xxx_padding methods new_private_key Create a new Crypt::OpenSSL::RSA object by loading a private key in from an string containing the Base64/DER encoding of the PKCS1 representation of the key. The string should include the -----BEGIN...----- and -----END...----- lines. The padding is set to PKCS1_OAEP, but can be changed with use_xxx_padding. " What is the openssl command to generate the public and private keys needed for the following script: use Crypt::OpenSSL::Random; use Crypt::OpenSSL::RSA; # not necessary if we have /dev/random: Crypt::OpenSSL::Random::random_seed($good_entropy); Crypt::OpenSSL::RSA->import_random_seed(); $rsa_pub = Crypt::OpenSSL::RSA->new_public_key($key_string); $rsa_pub->use_sslv23_padding(); # use_pkcs1_oaep_padding is the default $ciphertext = $rsa->encrypt($plaintext); $rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string); $plaintext = $rsa->encrypt($ciphertext); $rsa = Crypt::OpenSSL::RSA->generate_key(1024); # or $rsa = Crypt::OpenSSL::RSA->generate_key(1024, $prime); print "private key is:\n", $rsa->get_private_key_string(); print "public key (in PKCS1 format) is:\n", $rsa->get_public_key_string(); print "public key (in X509 format) is:\n", $rsa->get_public_key_x509_string(); $rsa_priv->use_md5_hash(); # use_sha1_hash is the default $signature = $rsa_priv->sign($plaintext); print "Signed correctly\n" if ($rsa->verify($plaintext, $signature)); Thanks. -- Daniel Campbell Director of Networking On2 Technologies |
From: Neil G. <ne...@ni...> - 2004-07-04 16:55:25
|
The current CPAN documentation for this module (v 0.21) says that there is a small memory leak when generating keys larger than 512 bits. I would like to use it to generate 1024 or larger keys from Apache/mod_perl, which means persistent processes, so a memory leak would not be good over time. Can anyone tell me if this memory leak is still around, and if so what kind of leak we are talking about? This will be used on a production server, which I don't want to have to restart regularly in order to purge memory leaks. I have also looked at Crypt::RSA, which works very well too but seems to be extremely slow at generating longer keys. TIA, -Neil |
From: <ben...@id...> - 2004-05-25 07:57:36
|
Dear Open Source developer I am doing a research project on "Fun and Software Development" in which I kindly invite you to participate. You will find the online survey under http://fasd.ethz.ch/qsf/. The questionnaire consists of 53 questions and you will need about 15 minutes to complete it. With the FASD project (Fun and Software Development) we want to define the motivational significance of fun when software developers decide to engage in Open Source projects. What is special about our research project is that a similar survey is planned with software developers in commercial firms. This procedure allows the immediate comparison between the involved individuals and the conditions of production of these two development models. Thus we hope to obtain substantial new insights to the phenomenon of Open Source Development. With many thanks for your participation, Benno Luthiger PS: The results of the survey will be published under http://www.isu.unizh.ch/fuehrung/blprojects/FASD/. We have set up the mailing list fa...@we... for this study. Please see http://fasd.ethz.ch/qsf/mailinglist_en.html for registration to this mailing list. _______________________________________________________________________ Benno Luthiger Swiss Federal Institute of Technology Zurich 8092 Zurich Mail: benno.luthiger(at)id.ethz.ch _______________________________________________________________________ |
From: Ian R. <iro...@re...> - 2004-05-23 18:38:09
|
Stefan, The new_key_from_parameters method expects the parameters to be Crypt::OpenSSL::Bignum objects. Judging from the Math::Pari man page, you should be able to convert a Math::Pari bigint object $n to a C::O::Bignum object by: my $cob_n = Crypt::OpenSSL::Bignum->new_from_decimal($n->pari2pv()); You'll have to do this for each of the values; alternatively, you can do it just for n and e, and let C::O::RSA compute the rest for you. This latter approach will take a bit longer (in the millisecond range), but if it's an infrequent operation, might be Good Enough For You. - Ian On Thu, 2004-05-20 at 14:22, Stefan Zasada wrote: > Hi, > > I'm trying to load in a key from a file (using Crypt::Keys), and then use > that key with OpenSSH::RSA. Im not sure if this is the best way to do it, > but since Crypt::Keys gives you values for n, e, d, p and q I thought I > could use these with new_key_from_parameters. When I tried it I got the > error: > > `pointer_copy' is not a Pari function name at > /home/M03/acs/zasadas/perl/lib/site_perl/5.8.3/i686-linux-thread-multi/Math/Pari.pm > line 973. > > Is this a bug, or am I doing something wrong. > > Cheers, > > Stefan. |
From: Stefan Z. <za...@cs...> - 2004-05-20 18:22:13
|
Hi, I'm trying to load in a key from a file (using Crypt::Keys), and then use that key with OpenSSH::RSA. Im not sure if this is the best way to do it, but since Crypt::Keys gives you values for n, e, d, p and q I thought I could use these with new_key_from_parameters. When I tried it I got the error: `pointer_copy' is not a Pari function name at /home/M03/acs/zasadas/perl/lib/site_perl/5.8.3/i686-linux-thread-multi/Math/Pari.pm line 973. Is this a bug, or am I doing something wrong. Cheers, Stefan. |
From: Ian R. <iro...@re...> - 2004-02-17 00:39:22
|
This release adds the long-asked for ability to import public keys in the format outputted by the openssl command-line rsa utility ("openssl rsa -pubout"). Additionally, public keys can be output in this format by using the new get_public_key_x509_string method. - Ian ------------------------------------------------------- SF.Net is sponsored by: Speed Start Your Linux Apps Now. Build and deploy apps & Web services for Linux with a free DVD software kit from IBM. Click Now! http://ads.osdn.com/?ad_id=1356&alloc_id=3438&op=click _______________________________________________ Perl-openssl-announce mailing list Per...@li... https://lists.sourceforge.net/lists/listinfo/perl-openssl-announce |