[EMAIL PROTECTED] - Wed Jun 11 09:21:46 2003]:

> Possible bug in OpenSSL 0.9.6h on Solaris 2.8 with /dev/urandom
> 
> The rsa command fails strangely when attempting to use
> both -passin fd:<int> and -passout fd:<int> together.  My code was
> 
> openssl rsa -passin fd:5 -des3 -passout fd:7
> 
> and it was reencoding the key with a bad passphrase. 

I've figured it out.  The problem only occurs when the first passphrase
is longer than the second.  In your example, you will see that the
output key (tpk.pem) really is protected with the passphrase
"bbbbbaaaaaaa" (5 bs followed by 7 as).

As you may have figured out by now, it's a NUL termination problem in
the BIO gets routine that's called (looks like buffer_gets() in
bf_buff.c.  I'm working on it.

-- 
Richard Levitte
[EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to