r generating public key?
>
> I dint find any sample programs for this problem. It would be great if
> anyone suggest some sample programs related to my above mentioned task!!
>
>
> Thanks and Regards,
> Yamini.
>
--
Prashant Batra
Hi,
I am observing a seg-fault with following back-trace-
#0 0x089277fe in _int_malloc ()
#1 0x08926a72 in malloc ()
#2 0x087df811 in default_malloc_ex (num=4, file=0x89eda40 "bn_lib.c",
line=336) at mem.c:79
#3 0x087dfe30 in CRYPTO_malloc (num=4, file=0x89eda40 "bn_lib.c",
line=336) at mem.
Hello,
DH_generate_key and DH_compute_key seems to take lot of CPU for key and
secret generation respectively.
I think this is the most CPU intensive task in all of the IKEV2 exchanges.
Is there some way to optimize the same, particularly secret computation.
Regards,
Prashant
Thanks Steve a ton. I think I was missing some basic design understanding.
-Prashant
On Fri, Jul 22, 2011 at 5:08 PM, Dr. Stephen Henson wrote:
> On Thu, Jul 21, 2011, Prashant Batra wrote:
>
> > Hello,
> >
> > I am using DH exchange in ikev2 for generating secret key
Hello,
I am using DH exchange in ikev2 for generating secret key b/w 2 parties.
I am observing some awkward thing,
in some of the cases, the secret calculated by both the parties is not the
same, although the input (public key, private key and peer public key ) is
same.
Hexdump: Length [128]
[0
44 02 00 00 00 18 01 00 00 00 07 84 00 10 0c a0 0c a0 c0 a8 65 65 c0 a8 65
65 7b 8b 73 41 12 05
--
Prashant Batra
is the case, how to determine the output length for decrypt?
>
> Best Regards,
> Tony
>
--
Prashant Batra
Follow the dreams!!
Thanks Steve.
On Thu, May 5, 2011 at 6:11 PM, Dr. Stephen Henson wrote:
> On Thu, May 05, 2011, Prashant Batra wrote:
>
> > Hi,
> >
> > One question regarding EVP_Encrypt APIs.
> >
> >
> > EVP_EncryptInit_ex(&ctx, cipher, NULL, (unsigned char *)e
Thanks everyone for help,
It was a sad issue with my library linking. Resolved the problem.
Regards,
Prashant
On Thu, May 5, 2011 at 9:45 AM, Jeffrey Walton wrote:
> 2011/5/4 Prashant Batra :
> > http://pastebin.com/0BG97RDH
> > This does not contain complete source code, but
)enc_key->v,
NULL)
Step-2 EncryptData-> //Can call this many times
EVP_EncryptUpdate();
EVP_EncrpyFinal();
One solution is to use the same IV for all calls to Encrypt, but I guess
this defeats the purpose of random IV.
Similarly case for for decrypt also.
Thanks,
Prashant.
--
Pras
>
> Regards
>
>
> -
> Дизайнерски обувки с до -70%. Регистрирай се и пазарувай.
> <http://a.abv.bg/www/delivery/ck.php?oaparams=2__bannerid=4884__zoneid=63__oadest=http://clk.tradedoubler.com/click?p=191500&a=1875689&g=19425934>
>
--
Prashant Batra
Follow the dreams!!
Hi all,
I am finding a strange problem with HMAC_Init_ex.
After the call to this function the stack is getting corrupted.
The sequence of functions used are-
HMAC_CTX ctx ;
HMAC_CTX_init(&ctx);
HMAC_Init_ex(&ctx, hash_key->v, hash_key->l, EVP_sha1(), NULL);
Key->v points to 20 bytes of memory,
Yes I used the same generator,'5'. So that means I need to use the
same prime too for both the parties
On 4/22/11, Dave Thompson wrote:
>> From: owner-openssl-us...@openssl.org On Behalf Of Prashant Batra
>> Sent: Thursday, 21 April, 2011 09:16
>
>>
Hi, I tried the dhtest sample provided in the test folder of openssl-0.9.8g.
What it does is-
Creates 2 DH objects using a single prime and generator value. It then
calculates the public, private keys pairs using the 2 DH's.
Then computes the secret for each DH using the public key of the other DH.
14 matches
Mail list logo