WikiLeaks - /server/polarssl-1.3.4/include/polarssl/pem.h

Target: Polarssl. Website + Product

Target
Proof of intent
Our minimum payout is 250 EURO (or an equivalent in bitcoin) for reporting a previously unknown remote security vulnerability in the PolarSSL library (that is the C code) to us
Our minimum payout is 25 EURO (or an equivalent in bitcoin) for reporting a previously unknown remote security vulnerability in the PolarSSL website to us
submitted by lolbitcoin to hackbit [link] [comments]

Gustavo Betarte  Certificación de algoritmos criptográficos constant-time

This key's fingerprint is A04C 5E09 ED02 B328 03EB 6116 93ED 732E 9231 8DBA-----BEGIN PGP PUBLIC KEY BLOCK----- mQQNBFUoCGgBIADFLp ... use the following search parameters to narrow your results: subreddit:subreddit find submissions in "subreddit" author:username find submissions by "username" site:example.com find submissions from "example.com" PolarSSL is a light-weight (embedded) open source cryptographic and SSL/TLS library written in C that is easy to understand, easy to use, easy to integrate and easy to expand.. Questions tagged polarssl should be directly related to the library, its API or its application to problems. Questions about SSL/TLS in general should not be tagged polarssl. Regarding an example, I'm not familiar with Bitcoin, but if you can point me to a document that describes what bitcoin addresses are and how they should be generated, I can at least point you to the relevant mbed TLS functions. Sep 7, 2015 13:10 Neil. It is possible, I've done it but I wrote a DLL to wrap the polarssl functions and did the rest of the work in a third party RAD language. You ... PolarSSL 1.3.4 adds some features required within Bitcoin applications, such as support for the RIPEMD-160 hash algorithm and support for Koblitz elliptic curves, and then specifically secp256k1. Features

[index] [25726] [10478] [7692] [14619] [12726] [38893] [3840] [13540] [9179] [44786]

Gustavo Betarte Certificación de algoritmos criptográficos constant-time

XII Jornadas de Ciencias de la Computación. Octubre de 2014 Abstract: Los ataques basados en cache constituyen una clase de ataques encubiertos que son parti...

#