[openssl-users] Password based key derivation

Deepak dpb795795 at gmail.com
Thu Apr 9 19:13:05 UTC 2015


Hi,

Any help on following questions is appreciated.

 1)      Can the function PKCS5_PBKDF2_HMAC_SHA1() in 0.9.8zf be used to derive a key for AES-256-CBC encryption from user supplied passphrase?

 

2)     Is PKCS5_PBKDF2_HMAC_SHA1() preferable to EVP_BytesToKey()  and why ? I see PKCS5_PBKDF2_HMAC_SHA1() uses HMACs and is part of standard.

 

On debugging, could see PKCS5_PBKDF2_HMAC_SHA1() working with 256-bit key but after returning from the function, the data in the stack frame gets corrupted for me and overwrites few other parameters leading to Seg Fault.

 

Thank you,

Deepak
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150410/14578b04/attachment-0001.html>


More information about the openssl-users mailing list