Hi Experts,
I am using openssl 1.0.2 
I recently moved my app from a PPC to x86 platform (application is compiled on 
the respective platform) where I met an issue with BIO_read(). 
I read a 20bytes of data using BIO_read like following..
int    res = BIO_read(bio, buf, 20);char *ptr = buf;
The content that I send as input is a signed file content that I get from a 
different source. The issue is that the output 'buf' is not as expected on my 
x86. The behavior is different on different architectures. 
For e.g. on intel x86 platform I get the following output with additional 
0xffffff padded.>> For me this is not the expected result. 
22,ffffff82,2b,28,06,09,2a,ffffff86,48,ffffff86,fffffff7,0d,02,09,02,ffffffa0,ffffff82,3b,12,30
This is what I was getting on my PPC platform which is as expected with the 
same app code.22,82,2b,28,06,09,2a,86,48,86,f7,0d,02,09,02,a0,82,3b,12,30
Ofcourse, I need to further check on the source where/how the signed file was 
generated, but does anyone have any idea if BIO_read() has any specific 
handling with repsect to architectures?. I'd rule out the endianess factor as I 
would expect the entire byte order to be reversed if so. 
I print the above output using the following code. 
 INFO( STR(" ..> Header@%02d: 
%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,"                             
       "%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x",                     
ptr-buf, *(ptr+0),*(ptr+1),*(ptr+2),*(ptr+3),*(ptr+4),                          
    *(ptr+5),*(ptr+6),*(ptr+7),*(ptr+8),*(ptr+9),                              
*(ptr+10),*(ptr+11),*(ptr+12),*(ptr+13),*(ptr+14),                              
*(ptr+15),*(ptr+16),*(ptr+17),*(ptr+18),*(ptr+19))); 

Reply via email to