RC4-MD5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Openssl team,

We are currently facing an issue with RC4-MD5 cipher suite after upgrading
from openssl0.9.8q to openssl1.0.1j.

We see that on few platforms, RC4-MD5 cipher negotiation is returning bad
mac record error after receiving "Client Key Exchange" message.

Currently we are using proprietary md5 functions with following
configuration .


static const EVP_MD ios_md5_md=
{
    NID_md5,
    NID_md5WithRSAEncryption,
    MD5_LEN,
    0,
    md5init,
    md5update,
    md5final,
    NULL,
    NULL,
    EVP_PKEY_RSA_method,
    MD5_CBLOCK,
    sizeof(EVP_MD *)+sizeof(MD5_CTX),
};

 Is there any consideration for MD5 based on platform bits? Can anyone
share?

Thanks,
Rajeswari.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150708/a1d61e62/attachment.html>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux