[11592] in Kerberos-V5-bugs
[krbdev.mit.edu #6747] openssl k5crypto back end should not require
daemon@ATHENA.MIT.EDU (Tom Yu via RT)
Tue Jun 29 11:39:56 2010
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Tom Yu via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6747@krbdev.mit.edu>
Message-ID: <rt-6747-32975.6.19294789628562@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6747'":;"'AdminCc of krbdev.mit.edu Ticket #6747'":;@MIT.EDU
Date: Tue, 29 Jun 2010 11:39:52 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
Currently, the OpenSSL k5crypto back end requires the use of openssl-1.0, because earlier
releases did not support CTS mode. For portability reasons (and minor performance
improvement in the IOV case), we should implement CTS mode using CBC mode interfaces that
already exist in older OpenSSL releases.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs