Hello all,
first of all i am new to crypto++ but i know something about cryptography 
and i have managed to run your ECMQV example, but according to all 
documents about this algorithm in a real world party A and B, static (long 
term) keys' pairs are not being generated during ECMQV process and because 
i wanted to check if i can' give values of those keys directly from files i 
have generated them from via openssl terminal command. Than with PEM pack i 
was able to read these files and get private and public keys. Unfortunately 
this was not working and by displaying via openssl values of keys and in 
the main program i was able to discover that DEREncodePrivateKEy generates 
me an extra 7 bytes long buffer at the beginning of it. When i have cut 
this 7 bytes i was finally able to get the agreement which was correct 
behavior. My question now is what are those 7 bytes for (i don' know if it 
is always 7 but for secp256k1 curve it is always that long) and is there 
other way to get the real value of private key without some extra buffer?

-- 
-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.
--- 
You received this message because you are subscribed to the Google Groups 
"Crypto++ Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to