From: [EMAIL PROTECTED]

itojun>         i see (checked original blowfish paper)...
itojun>         BF_encrypt() takes host byteorder values, while most
itojun>         of the other algorithms takes values in network
itojun>         byteorder.  it makes it very hard to use BF_encrypt()
itojun>         as core logic in stream cipher.  i don't understand
itojun>         why this decision was made.  at least it must be
itojun>         documented. 

Well, in a way it is documented, but you're right, it's not documented
as clearly as it could.  The document blowfish.pod does say that
BF_encrypt() should not be used directly unless you're implementing a
mode of Blowfish.  If all you want to do is encrypt in non-chaining
mode, you should use BF_ecb_encrypt().

I've now extended blowfish.pod to be a little bit more informative on
the quirks of BF_encrypt() and BF_decrypt().

-- 
Richard Levitte   \ Spannv�gen 38, II \ [EMAIL PROTECTED]
Chairman@Stacken   \ S-168 35  BROMMA  \ T: +46-8-26 52 47
Redakteur@Stacken   \      SWEDEN       \ or +46-709-50 36 10
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, Celo Communications: http://www.celocom.com/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to