Programming and Scripting :: C question
Um, I didn't know rsa used blowfish?
I dunno. I'm just using openssl on a blowfish encrypted file to test the thing so I don't muck around with keys. Change it to do rsa.
And I was wrong about cat. Wonder where I got that idea .. back in a minute with another way to discard false positives.
I think it's not needed. With rsa, if the phrase is correct, it outputs the unencrypted contents to stdin, but I've never seen it output binary garbage. For returning 0 with certain passphrases, I've yet to see that..
How would you implement the signal trap for SIGUSR1 to print $result?
Hey, changing Vulcanian to Finnish...
Ei jaksa uskoa että tämä muka näyttää oudolta :P
No offence intended about Finnish - if it reads like Perl to me it must be a very nice language! But I don't speak it.
RSA: That's good to know, so not a problem. Are you sure? With a 3-char passphrase I hit about 7 false positives out of many thousands before hitting the real passphrase. It doesn't do it on all incorrect passphrases. Perhaps only with certain ciphers, I don't know. Have seen that complain before but I can't recall the cipher. Of course, it can be seen as a benefit precisely because it can slow brute forcing.
Next Page...
original here.