Hello all, first of all i am new to crypto++ but i know something about cryptography and i have managed to run your ECMQV example, but according to all documents about this algorithm in a real world party A and B, static (long term) keys' pairs are not being generated during ECMQV process and because i wanted to check if i can' give values of those keys directly from files i have generated them from via openssl terminal command. Than with PEM pack i was able to read these files and get private and public keys. Unfortunately this was not working and by displaying via openssl values of keys and in the main program i was able to discover that DEREncodePrivateKEy generates me an extra 7 bytes long buffer at the beginning of it. When i have cut this 7 bytes i was finally able to get the agreement which was correct behavior. My question now is what are those 7 bytes for (i don' know if it is always 7 but for secp256k1 curve it is always that long) and is there other way to get the real value of private key without some extra buffer?
-- -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com. --- You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
