[openssl-users] Password based key derivation
Deepak
dpb795795 at gmail.com
Thu Apr 9 19:13:05 UTC 2015
Hi,
Any help on following questions is appreciated.
1) Can the function PKCS5_PBKDF2_HMAC_SHA1() in 0.9.8zf be used to derive a key for AES-256-CBC encryption from user supplied passphrase?
2) Is PKCS5_PBKDF2_HMAC_SHA1() preferable to EVP_BytesToKey() and why ? I see PKCS5_PBKDF2_HMAC_SHA1() uses HMACs and is part of standard.
On debugging, could see PKCS5_PBKDF2_HMAC_SHA1() working with 256-bit key but after returning from the function, the data in the stack frame gets corrupted for me and overwrites few other parameters leading to Seg Fault.
Thank you,
Deepak
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150410/14578b04/attachment-0001.html>
More information about the openssl-users
mailing list