Hi -- I'm not sure which list to send it to, or if this has
been addressed, but I searched the openssl-user and openssl-dev
archives with no luck.
I just noticed that using des_random_key does not usually
produce a valid key, since after the final
des_cbc_cksum(key,&data,sizeof(key),ks,&key);
it does not fix the parity on the new data (which is then copied into
the return value). Is this the desired behavior? Of, course, adding
des_set_odd_parity(&data);
after the above line fixes the problem. Thanks for the help.
-Jef
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]