Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-26 Thread Hemant Ranvir
Hi Todd, That is exactly what I am trying to do. The final goal is to implement this in hardware. Anyways I figured out that the key expansion routine is slightly different, more specifically the equivalent inverse cipher routine defined in:

Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-15 Thread Viktor Dukhovni
> On Nov 15, 2018, at 9:30 AM, Short, Todd via openssl-users > wrote: > > I have seen this done for hardware acceleration; where the crypto chip can do > everything except the handshake. > (In fact, this mechanism protected at least one device that I know of from > the Heartbleed debacle,

Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-15 Thread Short, Todd via openssl-users
I have seen this done for hardware acceleration; where the crypto chip can do everything except the handshake. (In fact, this mechanism protected at least one device that I know of from the Heartbleed debacle, since the hardware crypto did not understand the record type.) Look at how the

Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-14 Thread Viktor Dukhovni
> On Nov 14, 2018, at 6:54 AM, Hemant Ranvir wrote: > > My main goal here is to use openssl for initial handshake sequence. Once the > connection is established between server and client, decrypt the incoming > message (this time not using the openssl api but rather by using the decrypt >

[openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-14 Thread Hemant Ranvir
I have implemented AES 128 encrypt and decrypt functions and tested it with sample data and it checks out perfectly. I used the following reference: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf Next I implemented a dummy SSL client and SSL server which uses openssl to send and receive