[11592] in Kerberos-V5-bugs

home help back first fref pref prev next nref lref last post

[krbdev.mit.edu #6747] openssl k5crypto back end should not require

daemon@ATHENA.MIT.EDU (Tom Yu via RT)
Tue Jun 29 11:39:56 2010

Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Tom Yu via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6747@krbdev.mit.edu>
Message-ID: <rt-6747-32975.6.19294789628562@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6747'":;"'AdminCc of krbdev.mit.edu Ticket #6747'":;@MIT.EDU
Date: Tue, 29 Jun 2010 11:39:52 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu

Currently, the OpenSSL k5crypto back end requires the use of openssl-1.0, because earlier 
releases did not support CTS mode.  For portability reasons (and minor performance 
improvement in the IOV case), we should implement CTS mode using CBC mode interfaces that 
already exist in older OpenSSL releases.
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs

home help back first fref pref prev next nref lref last post