Re: ECDSA - Signature verify

2014-06-11 Thread Anant Rao
we just get the EVP_PKEY data structure filled with the public key correctly and call in a sequence ending up with a call to EVP_VerifyFinal. Is that correct? Thanks again! Anant On Tue, Jun 10, 2014 at 3:51 PM, Matt Caswell wrote: > On 10 June 2014 15:24, Anant Rao wrote: > >

ECDSA - Signature verify

2014-06-10 Thread Anant Rao
Hi, Objective in one-line: = Verify a signature, given an ECDSA public key in X509 format. Details: == I read an X509 cert stored on disk. The following are some of its contents: Public Key Algorithm: id-ecPublicKey Public-Key: (256 bit) ... ASN1 OID: prime2

Re: AES-GCM

2014-06-05 Thread Anant Rao
On Tue, May 27, 2014 at 12:33 AM, Jens Hiller wrote: > On 05/27/2014 09:00 AM, Anant Rao wrote: > > Hi, > > > > I have ciphertext encrypted in Java (using BouncyCastle - BC) with > > "AES/GCM/NoPadding" cipher. > > > > When I t

AES-GCM

2014-05-27 Thread Anant Rao
Hi, I have ciphertext encrypted in Java (using BouncyCastle - BC) with "AES/GCM/NoPadding" cipher. When I tried to decrypt it using OpenSSL in a 'c' program, the last call 'EVP_DecryptFinal_ex' fails. Somehow, ERR_print_errors_fp is not printing anything either. I do have the IV that is used in

Re: Java and C/OpenSSL

2014-04-26 Thread Anant Rao
t all. On Sat, Apr 26, 2014 at 4:58 PM, Tom Francis wrote: > > > On Apr 26, 2014, at 6:25 PM, Anant Rao wrote: > > Hi, > > I see the doc. But, I'm afraid to say my question is still unanswered. Is > this function (PKCS5_PBKDF2_HMAC) supposed to generate same or diff

Re: Java and C/OpenSSL

2014-04-26 Thread Anant Rao
your help/favor! Anant On Sat, Apr 26, 2014 at 2:12 PM, Matt Caswell wrote: > On 26 April 2014 20:38, Jeffrey Walton wrote: > > On Sat, Apr 26, 2014 at 3:18 PM, Anant Rao wrote: > >> I'm doing password encryption (and decryption) in Java. I need to port > this >

Java and C/OpenSSL

2014-04-26 Thread Anant Rao
Hi, I'm doing password encryption (and decryption) in Java. I need to port this to C. In Java, I'm doing this: PBEKeySpec ("somepassphrase", some_salt, some iterations, 128 /*key_length*/); Algorithm is "PBKDF2WithHmacSHA1" If I generate a secret key with the above data, I get the same output wi