mentioned task!!
Thanks and Regards,
Yamini.
--
Prashant Batra
Hi,
I am observing a seg-fault with following back-trace-
#0 0x089277fe in _int_malloc ()
#1 0x08926a72 in malloc ()
#2 0x087df811 in default_malloc_ex (num=4, file=0x89eda40 bn_lib.c,
line=336) at mem.c:79
#3 0x087dfe30 in CRYPTO_malloc (num=4, file=0x89eda40 bn_lib.c,
line=336) at
Hello,
DH_generate_key and DH_compute_key seems to take lot of CPU for key and
secret generation respectively.
I think this is the most CPU intensive task in all of the IKEV2 exchanges.
Is there some way to optimize the same, particularly secret computation.
Regards,
Prashant
Thanks Steve a ton. I think I was missing some basic design understanding.
-Prashant
On Fri, Jul 22, 2011 at 5:08 PM, Dr. Stephen Henson st...@openssl.orgwrote:
On Thu, Jul 21, 2011, Prashant Batra wrote:
Hello,
I am using DH exchange in ikev2 for generating secret key b/w 2 parties
Hello,
I am using DH exchange in ikev2 for generating secret key b/w 2 parties.
I am observing some awkward thing,
in some of the cases, the secret calculated by both the parties is not the
same, although the input (public key, private key and peer public key ) is
same.
Hexdump: Length [128]
44 02 00 00 00 18 01 00 00 00 07 84 00 10 0c a0 0c a0 c0 a8 65 65 c0 a8 65
65 7b 8b 73 41 12 05
--
Prashant Batra
,
Tony
--
Prashant Batra
Follow the dreams!!
Thanks Steve.
On Thu, May 5, 2011 at 6:11 PM, Dr. Stephen Henson st...@openssl.orgwrote:
On Thu, May 05, 2011, Prashant Batra wrote:
Hi,
One question regarding EVP_Encrypt APIs.
EVP_EncryptInit_ex(ctx, cipher, NULL, (unsigned char *)enc_key,
(unsigned
char *)iv
,
NULL)
Step-2 EncryptData- //Can call this many times
Set the IV value
EVP_EncryptUpdate();
EVP_EncrpyFinal();
One solution is to use the same IV for all calls to Encrypt, but I guess
this defeats the purpose of random IV.
Similarly case for for decrypt also.
Thanks,
Prashant.
--
Prashant
Thanks everyone for help,
It was a sad issue with my library linking. Resolved the problem.
Regards,
Prashant
On Thu, May 5, 2011 at 9:45 AM, Jeffrey Walton noloa...@gmail.com wrote:
2011/5/4 Prashant Batra prashant0...@gmail.com:
http://pastebin.com/0BG97RDH
This does not contain complete
Hi all,
I am finding a strange problem with HMAC_Init_ex.
After the call to this function the stack is getting corrupted.
The sequence of functions used are-
HMAC_CTX ctx ;
HMAC_CTX_init(ctx);
HMAC_Init_ex(ctx, hash_key-v, hash_key-l, EVP_sha1(), NULL);
Key-v points to 20 bytes of memory,
%. Регистрирай се и пазарувай.
http://a.abv.bg/www/delivery/ck.php?oaparams=2__bannerid=4884__zoneid=63__oadest=http://clk.tradedoubler.com/click?p=191500a=1875689g=19425934
--
Prashant Batra
Follow the dreams!!
Yes I used the same generator,'5'. So that means I need to use the
same prime too for both the parties
On 4/22/11, Dave Thompson dthomp...@prinpay.com wrote:
From: owner-openssl-us...@openssl.org On Behalf Of Prashant Batra
Sent: Thursday, 21 April, 2011 09:16
Hi, I tried
Hi, I tried the dhtest sample provided in the test folder of openssl-0.9.8g.
What it does is-
Creates 2 DH objects using a single prime and generator value. It then
calculates the public, private keys pairs using the 2 DH's.
Then computes the secret for each DH using the public key of the other
14 matches
Mail list logo