On Sat, Nov 23, 2013 at 03:53:32PM +0300, Ayman Al Shorman wrote:
> ssl_ciph.c(386): OpenSSL internal error, assertion failed:
> ssl_mac_secret_size[SSL_MD_MD5_IDX] >= 0.
>
> I have *openssl-1.0.0-27.el6_4.2.x86_64* and
> *openssl-devel-1.0.0-27.el6_4.2.x86_64* installed on centos 6.3.
>
> There
Hi Steve,
Thanks for the suggestion. It worked.
*ssh_aes_ctr_iv: no context [preauth]* message was coming because i was
checking against EVP_aes_128_ctr for the type.
It should be:
Cipher.c:385 if (c->evptype == evp_aes_128_ctr)
ssh_aes_ctr_iv(&cc->evp, 0, iv, len);
Thanks,
Hi Steve,
Thanks for the suggestion. It worked.
*ssh_aes_ctr_iv: no context [preauth]* message was coming because i was
passing EVP type to that function. Now its fine after passing evp.
Thanks,
Cipher
--
View this message in context:
http://openssl.6102.n7.nabble.com/OpenSSL-internal-error-a
I changed evp_*_ctr to EVPs in cipher.c . Now SSH connection takes place, but
after authentication connection gets closed.
Here is the debug mode log.
[root@PC]# ssh -p 2024 localhost
root@localhost's password:
Write failed: Broken pipe
[root@PC]#
debug1: sshd version OpenSSH_6.1p1
debug1: read
On Wed, Apr 24, 2013, Cipher wrote:
> Hi,
>
> I complied and installed FIPS capable OPENSSL 1.0.1c and OPENSSH 6.1p1 with
> FIPS.
> While debugging i found that SSH fails for *ctr* mode of cipher operation.
> Here is what i get when i connect using aes256-ctr or aes128-cbc
>
>
> FIPS mode ini