Hi, Any help on following questions is appreciated. 1) Can the function PKCS5_PBKDF2_HMAC_SHA1() in 0.9.8zf be used to derive a key for AES-256-CBC encryption from user supplied passphrase? 2) Is PKCS5_PBKDF2_HMAC_SHA1() preferable to EVP_BytesToKey() and why ? I see PKCS5_PBKDF2_HMAC_SHA1() uses HMACs and is part of standard. On debugging, could see PKCS5_PBKDF2_HMAC_SHA1() working with 256-bit key but after returning from the function, the data in the stack frame gets corrupted for me and overwrites few other parameters leading to Seg Fault. Thank you, Deepak -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150410/14578b04/attachment-0001.html>