Hi ,
We are writing some crypto applications using "AES_encrypt" method in aes.h
directly instead of using EVP layer .
When benchmarking for performance , we notice that AES-NI is much slower than
AES (contradicting the expectation that AES-NI should be faster ). To benchmark
We are using ope
On May 16, 2014, at 4:14 AM, Hooman Fazaeli wrote:
> On 5/16/2014 2:15 AM, Dave Thompson wrote:
>> EVP_BytesToKey implements (a tweak on) the original PKCS#5, which derived a
>> key and IV
>> by iterated hashing of a (reusable but secret) password with random (i.e.
>> unique) salt.
>> Given ra
Thanx for your reply,
mr.pierre delaage
-> i am install EVEC4 and evc4 PS4, WCE 420 SDK and openSSL source.
-> i was also set path variables and i have thoroughly knowledge about c/c++
socket ,ip.
->now, how i will test your lib?
[1] i copied lib(libeay32.lib and ssleay32.lib) in my project r
Hello,
I did check that page but I do think that it is very "light" on the core
of the Ravi Vyas question :
how to build openssl lib for WCE
Your page mainly refers to building FIPS module and canister...but it is
only useful if one has already built openssl lib for wce,
something which i
Have you checked out this on the wiki yet?
http://wiki.openssl.org/index.php/FIPS_Library_and_Windows_Mobile_6#Troubleshooting_OpenSSL_builds_for_WM6
-Ike-
John Eichenberger
Principal Engineer: Sustaining Engineering: Intermec by Honeywell
425.265.2108 john.eichenber...@intermec.com
-Ori
Hi,
It is PKCS5_PBKDF2_HMAC(), in crypto/evp/p5_crpt2.c
Le 16/05/2014 10:14, Hooman Fazaeli a écrit :
Which openssl function does key derivation based on PKCS#5v2?
Hey. Can I somehow know which algorithms are used in functions BN_GF2m_*
For example Montgomery reduction, Barrett reduction or something else
for BN_GF2m_mod_arr function.
Hmm,
Usually, what I have given on my webpage is enough for skilled people :
And in the worst case I already give precompiled version fo openssl dll
and stunnel for WCE.
But of course, unfortunately, I can NOT give you step by step
instructions to go back to the basics such as :
do you know
On 5/16/2014 2:15 AM, Dave Thompson wrote:
EVP_BytesToKey implements (a tweak on) the original PKCS#5, which derived a key
and IV
by iterated hashing of a (reusable but secret) password with random (i.e.
unique) salt.
Given random salt this gives effectively random IV, but is unnecessarily
I Followed The Same Steps Which are Mentioned in INSTALL.WCE TextFile.
At this Steps
nmake -f ms\cedll.mak got Error.
I also follow this Link
http://delaage.pierre.free.fr/
But This Dll and Lib not Works..
--
View this message in context:
http://openssl.6102.n7.nabble.com/BUILD-OPENSSL-
10 matches
Mail list logo