Whoa, time out. In Ivan's original message, it said below the patch that the patch was only to demonstrate that this was generally where the problem was, not that it was a fix! He said: >- if ((v == B64_EOF) || (n >= 64)) >+ if ((v == B64_EOF) || (n >= 68)) >- if ((v != B64_EOF) && (n >= 64)) exp_nl=1; >+ if ((v != B64_EOF) && (n >= 68)) exp_nl=1; >(i.e., the constant 64 is changed to 68), then the decoding will fail >for data that was 49 or 50 bytes long before encoding. So this applying this as a patch (which I see in the CVS tree has been done) wasn't the right thing to do at all, was it, Ivan? -Cliff Cliff Woolley Central Systems Software Administrator Washington and Lee University http://www.wlu.edu/~jwoolley/ Work: (540) 463-8089 Pager: (540) 462-3472 >>> Ulf Moeller <[EMAIL PROTECTED]> 08/13/99 03:45PM >>> > echo "Has to be precisely forty-six characters long" | openssl enc -a \ > | openssl enc -d -a Now fixed. Thanks for the patch. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
