Your answers lie here:http://tools.ietf.org/html/rfc2246The RFC for TLS 1.0OpenSSL implements that, as per specification. And incidentally, as rfc2246 pre-dates (Jan 1999) SHA-256 (2001) the answers aren't the ones you want to hear.NOT an OpenSSL problem that, simply the fact that time has passed
-Original Message-
From: Venkataragavan Narayanaswamy
Sender: owner-openssl-us...@openssl.org
Date: Tue, 23 Apr 2013 00:29:17
To: openssl-dev@openssl.org;
openssl-us...@openssl.org
Reply-To: openssl-us...@openssl.org
Subject: MD5 in openSSL internals
Hi,
We are currently analyzing
Careful about this. The technically correct answer is misleading.
Yes, MD5 is used in the PRF, but it is XORed with SHA1. So you get at
least the strength of stronger of the two.
--David Jacobson
On 4/23/13 3:31 AM, Erwann Abalea wrote:
MD5 is used in TLS1.0 for RSA signing and random d
You're right.
PRF in TLS1.0 is done by splitting the secret in 2 parts, hashing the
first with MD5, hashing the second with SHA1, and XORing the 2 results.
RSA signing in TLS1.0 is done by hashing the data with MD5 and SHA1,
concatenating the 2 hash results, and signing the 36 bytes result (wit
MD5 is used in TLS1.0 for RSA signing and random derivation (PRF). See
RFC2246.
(Please note that OpenSSL hasn't been mentioned in this sentence).
SHA256 used for the PRF is available with TLS1.2 only. SHA256 used for
the HMAC is available for some ciphersuites defined for TLS1.2 only (but
I t
Hi,
We are currently analyzing and understanding the security strength of the
openSSL internal implementation to certify the products.
In version 0.9.8d, TLSv1.0 alone is supported. Can you please answer the
following or provide me with the documentation reference
1. Does openSSL library