I just committed a change, which will appear in tomorrow's snapshots. 
Thanks for the report.  Ticket resolved.

[levitte - Wed Jun 11 20:16:02 2003]:

> [EMAIL PROTECTED] - Wed Jun 11 09:21:46 2003]:
> 
> > Possible bug in OpenSSL 0.9.6h on Solaris 2.8 with /dev/urandom
> >
> > The rsa command fails strangely when attempting to use
> > both -passin fd:<int> and -passout fd:<int> together.  My code was
> >
> > openssl rsa -passin fd:5 -des3 -passout fd:7
> >
> > and it was reencoding the key with a bad passphrase.
> 
> I've figured it out.  The problem only occurs when the first
> passphrase
> is longer than the second.  In your example, you will see that the
> output key (tpk.pem) really is protected with the passphrase
> "bbbbbaaaaaaa" (5 bs followed by 7 as).
> 
> As you may have figured out by now, it's a NUL termination problem in
> the BIO gets routine that's called (looks like buffer_gets() in
> bf_buff.c.  I'm working on it.


-- 
Richard Levitte
[EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to