I just committed a change, which will appear in tomorrow's snapshots. Thanks for the report. Ticket resolved.
[levitte - Wed Jun 11 20:16:02 2003]: > [EMAIL PROTECTED] - Wed Jun 11 09:21:46 2003]: > > > Possible bug in OpenSSL 0.9.6h on Solaris 2.8 with /dev/urandom > > > > The rsa command fails strangely when attempting to use > > both -passin fd:<int> and -passout fd:<int> together. My code was > > > > openssl rsa -passin fd:5 -des3 -passout fd:7 > > > > and it was reencoding the key with a bad passphrase. > > I've figured it out. The problem only occurs when the first > passphrase > is longer than the second. In your example, you will see that the > output key (tpk.pem) really is protected with the passphrase > "bbbbbaaaaaaa" (5 bs followed by 7 as). > > As you may have figured out by now, it's a NUL termination problem in > the BIO gets routine that's called (looks like buffer_gets() in > bf_buff.c. I'm working on it. -- Richard Levitte [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
