Whoa, time out.  In Ivan's original message, it said below the patch
that the patch was only to demonstrate that this was generally where the
problem was, not that it was a fix!  He said:

>-              if ((v == B64_EOF) || (n >= 64))
>+              if ((v == B64_EOF) || (n >= 68))
>-                      if ((v != B64_EOF) && (n >= 64)) exp_nl=1;
>+                      if ((v != B64_EOF) && (n >= 68)) exp_nl=1;
>(i.e., the constant 64 is changed to 68), then the decoding will fail
>for data that was 49 or 50 bytes long before encoding.

So this applying this as a patch (which I see in the CVS tree has been
done) wasn't the right thing to do at all, was it, Ivan?

-Cliff

Cliff Woolley
Central Systems Software Administrator
Washington and Lee University
http://www.wlu.edu/~jwoolley/

Work: (540) 463-8089
Pager: (540) 462-3472

>>> Ulf Moeller <[EMAIL PROTECTED]> 08/13/99 03:45PM >>>
> echo "Has to be precisely forty-six characters long" | openssl enc -a
\
>       | openssl enc -d -a

Now fixed. Thanks for the patch.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to