Hi -- I'm not sure which list to send it to, or if this has
been addressed, but I searched the openssl-user and openssl-dev
archives with no luck.
        I just noticed that using des_random_key does not usually
produce a valid key, since after the final

des_cbc_cksum(key,&data,sizeof(key),ks,&key);

it does not fix the parity on the new data (which is then copied into
the return value). Is this the desired behavior? Of, course, adding

des_set_odd_parity(&data);

after the above line fixes the problem. Thanks for the help.

                                        -Jef
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to