At 09:29 PM 3/21/2002 +0000, S.Henson wrote:
>Is there some particular reason why such applications couldn't use the
>EVP layer? An attempt has been made to keep this consistent and to make
>any enhancements backwards compatible. In fact some of the more recent
>changes would have been substantially easier if EVP compatibility wasn't
>an issue.

EVP is yet another opportunity to abuse OpenSSL by pretending it's
a crypto library.  It doesn't do public key operations, and it doesn't
let you access the engines.  I had avoided it in the past (long ago,
0.9.4 era) and went straight for the low level routines.  I've just
clawed through the POD pages (which is not a process without pain...)
and I still don't see any reasonable public key operations.  Seal creates
a key, which I don't want, Sign presumes a hash is involved, which
I don't want, and give the pain it's taking to get an engine to
initialize I don't believe the text in evp.pod about
"Algorithms are loaded with OpenSSL_add_all_algorithms".

If I could do this:

   engine = "ubsec";
   output_buffer_length = /* e.g. */ sizeof (output_buffer);
   EVP_wishlist_private_key_encrypt (context, cleartext, cleartext_length,
     wrap_scheme, engine, output_buffer, &output_buffer_length);

then I'd use EVP, sure.

Now, last time I checked, the last three letters in OpenSSL are, um, SSL, 
so grumbling
about lack of cool crypto primitives seemed off-topic...

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to