<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div lang="EN-US" link="blue" vlink="purple"><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);">Hi,</span></p><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);">Any help on following questions is appreciated.<u></u><u></u></span></p><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);"><u></u> </span><span style="background-color: rgba(255, 255, 255, 0);">1)</span><span style="background-color: rgba(255, 255, 255, 0);">     </span><span style="background-color: rgba(255, 255, 255, 0);"> </span><u style="background-color: rgba(255, 255, 255, 0);"></u><span style="background-color: rgba(255, 255, 255, 0);">Can the function PKCS5_PBKDF2_HMAC_SHA1() in 0.9.8zf be used to derive a key for AES-256-CBC encryption from user supplied passphrase?</span></p><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);"><u></u> <u></u></span></p><p><span style="background-color: rgba(255, 255, 255, 0);"><u></u>2)     Is PKCS5_PBKDF2_HMAC_SHA1() preferable to EVP_BytesToKey()  and why ? I see PKCS5_PBKDF2_HMAC_SHA1() uses HMACs and is part of standard.<u></u><u></u></span></p><p><span style="background-color: rgba(255, 255, 255, 0);"><u></u> <u></u></span></p><p class="MsoNormal" style="margin-left: 0.25in;"><span style="background-color: rgba(255, 255, 255, 0);">On debugging, could see PKCS5_PBKDF2_HMAC_SHA1() working with 256-bit key but after returning from the function, the data in the stack frame gets corrupted for me and overwrites few other parameters leading to Seg Fault.<u></u></span></p><p class="MsoNormal" style="margin-left: 0.25in;"><span style="background-color: rgba(255, 255, 255, 0);"><u></u> <u></u></span></p><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);">Thank you,</span></p><p class="MsoNormal"><span style="background-color: rgba(255, 255, 255, 0);">Deepak</span></p></div></body></html>