I forgot to mention: the original application uses the Enhanced Cryptography Provider (http://msdn.microsoft.com/en-us/library/aa386986%28v=vs.85%29.aspx) which supports 128 bit RC4 keys. The application sets the RC4 cipher from a full 128 bit key and a 128 bit salt.
On May 6, 2011, at 10:41 PM, Bugcollect.com wrote: > Hello, > > I need to exchange encrypted content with an existing application on Windows > with an RC4 key that is salted as per > http://msdn.microsoft.com/en-us/library/aa387782%28v=vs.85%29.aspx > (KP_SALT_EX). Note that this is not a passphrase and salt key derivation, but > a cipher initialized with some a known key and known initialization vector, > similar to a block cipher. > > I think technically RC4 does not have an IV, but what is the equivalent > operation I can perform in openssl to get the cipher in the desired state? > Specifying the salt as the iv param in EVP_EncryptInit does not work. > > TIA, > ~ Remus > > > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager majord...@openssl.org