Subj : FTS-1027 Section 1.7 CRAM-MD5 Frame Exchange Example To : Jason Brady From : Andrew Leary Date : Wed Apr 24 2024 12:19 pm Hello Jason! 23 Apr 24 16:11, you wrote to all: JB> Question regarding FTS-1027 section 1.7 "Example of Frame Exchange JB> During CRAM Authentication" JB> In the example, the Originating side returns JB> M_PWD "CRAM-MD5-56be002162a4a15ba7a9064f0c93fd00" JB> This hex value appears to be incorrect. I tested with two JB> implementations of the CRAM-MD5 algorithm, and in both cases, the same JB> hex value was calculated using the password and challenge hex string JB> from the example, which differed from the value shown in the document. JB> Password: tanstaaftanstaaf JB> Challenge: f0315b074d728d483d6887d0182fc328 JB> Expected: 56be002162a4a15ba7a9064f0c93fd00 <- From section 1.7 JB> example JB> Result: 1503922bb6a38bc934bca7afeb522d28 <- From both MD5 JB> algorithms JB> Which is correct - the value shown in section 1.7 or the test result JB> value? I will do some testing and attempt to validate your concern. Andrew --- GoldED+/LNX 1.1.5-b20240209 * Origin: From the Desk of the FTSC Administrator (1:320/219) .