Re: How to implement DH algorithm using openSSL library?

2012-12-20 Thread Prashant Batra
mentioned task!! Thanks and Regards, Yamini. -- Prashant Batra

seg-fault in malloc called from DH_compute_key

2012-01-22 Thread Prashant Batra
Hi, I am observing a seg-fault with following back-trace- #0 0x089277fe in _int_malloc () #1 0x08926a72 in malloc () #2 0x087df811 in default_malloc_ex (num=4, file=0x89eda40 bn_lib.c, line=336) at mem.c:79 #3 0x087dfe30 in CRYPTO_malloc (num=4, file=0x89eda40 bn_lib.c, line=336) at

DH_generate_key and DH_compute_key for IKEV2

2011-07-25 Thread Prashant Batra
Hello, DH_generate_key and DH_compute_key seems to take lot of CPU for key and secret generation respectively. I think this is the most CPU intensive task in all of the IKEV2 exchanges. Is there some way to optimize the same, particularly secret computation. Regards, Prashant

Re: DH_compute_key query

2011-07-22 Thread Prashant Batra
Thanks Steve a ton. I think I was missing some basic design understanding. -Prashant On Fri, Jul 22, 2011 at 5:08 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Thu, Jul 21, 2011, Prashant Batra wrote: Hello, I am using DH exchange in ikev2 for generating secret key b/w 2 parties

DH_compute_key query

2011-07-21 Thread Prashant Batra
Hello, I am using DH exchange in ikev2 for generating secret key b/w 2 parties. I am observing some awkward thing, in some of the cases, the secret calculated by both the parties is not the same, although the input (public key, private key and peer public key ) is same. Hexdump: Length [128]

3des-cbc

2011-07-06 Thread Prashant Batra
44 02 00 00 00 18 01 00 00 00 07 84 00 10 0c a0 0c a0 c0 a8 65 65 c0 a8 65 65 7b 8b 73 41 12 05 -- Prashant Batra

Re: question about des_ede3_cbc_encrypt()

2011-07-05 Thread Prashant Batra
, Tony -- Prashant Batra Follow the dreams!!

Re: evp_encrypt_init_ex

2011-05-06 Thread Prashant Batra
Thanks Steve. On Thu, May 5, 2011 at 6:11 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Thu, May 05, 2011, Prashant Batra wrote: Hi, One question regarding EVP_Encrypt APIs. EVP_EncryptInit_ex(ctx, cipher, NULL, (unsigned char *)enc_key, (unsigned char *)iv

evp_encrypt_init_ex

2011-05-05 Thread Prashant Batra
, NULL) Step-2 EncryptData- //Can call this many times Set the IV value EVP_EncryptUpdate(); EVP_EncrpyFinal(); One solution is to use the same IV for all calls to Encrypt, but I guess this defeats the purpose of random IV. Similarly case for for decrypt also. Thanks, Prashant. -- Prashant

Re: Problem with HMAC_Init_ex

2011-05-05 Thread Prashant Batra
Thanks everyone for help, It was a sad issue with my library linking. Resolved the problem. Regards, Prashant On Thu, May 5, 2011 at 9:45 AM, Jeffrey Walton noloa...@gmail.com wrote: 2011/5/4 Prashant Batra prashant0...@gmail.com: http://pastebin.com/0BG97RDH This does not contain complete

Problem with HMAC_Init_ex

2011-05-04 Thread Prashant Batra
Hi all, I am finding a strange problem with HMAC_Init_ex. After the call to this function the stack is getting corrupted. The sequence of functions used are- HMAC_CTX ctx ; HMAC_CTX_init(ctx); HMAC_Init_ex(ctx, hash_key-v, hash_key-l, EVP_sha1(), NULL); Key-v points to 20 bytes of memory,

Re: Problem with HMAC_Init_ex

2011-05-04 Thread Prashant Batra
%. Регистрирай се и пазарувай. http://a.abv.bg/www/delivery/ck.php?oaparams=2__bannerid=4884__zoneid=63__oadest=http://clk.tradedoubler.com/click?p=191500a=1875689g=19425934 -- Prashant Batra Follow the dreams!!

Re: DH key exchange issue

2011-04-24 Thread Prashant Batra
Yes I used the same generator,'5'. So that means I need to use the same prime too for both the parties On 4/22/11, Dave Thompson dthomp...@prinpay.com wrote: From: owner-openssl-us...@openssl.org On Behalf Of Prashant Batra Sent: Thursday, 21 April, 2011 09:16 Hi, I tried

DH key exchange issue

2011-04-21 Thread Prashant Batra
Hi, I tried the dhtest sample provided in the test folder of openssl-0.9.8g. What it does is- Creates 2 DH objects using a single prime and generator value. It then calculates the public, private keys pairs using the 2 DH's. Then computes the secret for each DH using the public key of the other