bug tracker? arcfour problem

Howard Chu hyc at highlandsun.com
Fri Apr 16 18:11:39 CEST 2010

I looked all over this page http://directory.fsf.org/project/libgcrypt/ and 
www.gnupg.org and didn't find a relevant link, so my apologies if this is the 
wrong place.

I've adapted rtmpdump's librtmp to use either OpenSSL or gcrypt/gnutls for its 
crypto support and initially it seemed that everything was fine. However, when 
built with gnutls/gcrypt, I see problems in the resulting data that generally 
only crop up after ~51MB or more has been transferred in a single rtmpe 
session. It kind of implies there's a problem with the arcfour cipher, but I 
frankly can't imagine what kind of bug could exist in such a simple cipher 
code, which only manifests after so much data has been successfully 
transferred. Has anyone else ever reported this kind of issue?

Running on an Ubuntu 10 (Lucid) beta x86-64, gcrypt 1.4.4, gnutls 2.8.5. The 
relevant code can be obtained from http://rtmpdump.mplayerhq.hu.

More information about the Gcrypt-devel mailing list