From: Michael **UNKNOWN CHARSET** <[EMAIL PROTECTED]>

michael> Richard Levitte - VMS Whacker wrote:
michael> > 
michael> > From: "Pablo J. Royo" <[EMAIL PROTECTED]>
michael> > 
michael> > royop> So I�d like to know if there is a way to use the same b64
michael> > royop> functions to handle it, or what kind of modification should I
michael> > royop> do to bio64 or PEM routines. It would be easy?
michael> > 
michael> > What you want to do is hack in crypto/evp/encode.c.
michael> 
michael> Why? openssl base64 is working perfect with his certificate.

Hmm?  I've seen openssl base64 misbehave when the file didn't follow
the 64 chars/line limit, but then again, I may remember wrongly.

-- 
Richard Levitte   \ Spannv�gen 38, II \ [EMAIL PROTECTED]
Chairman@Stacken   \ S-168 35  BROMMA  \ T: +46-8-26 52 47
Redakteur@Stacken   \      SWEDEN       \ or +46-709-50 36 10
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, Celo Communications: http://www.celocom.com/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to