Richard Levitte via RT wrote:
> I've figured it out.  The problem only occurs when the first passphrase
> is longer than the second.  In your example, you will see that the
> output key (tpk.pem) really is protected with the passphrase
> "bbbbbaaaaaaa" (5 bs followed by 7 as).
Thanks, I would NEVER have figured that out :-)
that's the point, isn't it...  This showed up the way it did because
I use a machine-generated storage passphrase while the private keys
are escrowed, and either decrypt them or re-encrypt them with a pass
phrase given on the pick-up-your-key page, and the machine-generated
one is 12 characters long.  Perhaps it wasn't such a bad implementation
after all: if my users had used a reasonable pass phrase (more than 12
characters long) it wouldn't have bitten them at all.  It was only my
half-arsed testing with "bbbbb" as a pass phrase that brought the bug
out.

> As you may have figured out by now, it's a NUL termination problem in
> the BIO gets routine that's called (looks like buffer_gets() in
> bf_buff.c.  I'm working on it.

-- 
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to