[EMAIL PROTECTED] - Wed Jun 11 09:21:46 2003]: > Possible bug in OpenSSL 0.9.6h on Solaris 2.8 with /dev/urandom > > The rsa command fails strangely when attempting to use > both -passin fd:<int> and -passout fd:<int> together. My code was > > openssl rsa -passin fd:5 -des3 -passout fd:7 > > and it was reencoding the key with a bad passphrase.
I've figured it out. The problem only occurs when the first passphrase is longer than the second. In your example, you will see that the output key (tpk.pem) really is protected with the passphrase "bbbbbaaaaaaa" (5 bs followed by 7 as). As you may have figured out by now, it's a NUL termination problem in the BIO gets routine that's called (looks like buffer_gets() in bf_buff.c. I'm working on it. -- Richard Levitte [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]