Hi Experts, I am using openssl 1.0.2 I recently moved my app from a PPC to x86 platform (application is compiled on the respective platform) where I met an issue with BIO_read(). I read a 20bytes of data using BIO_read like following.. int res = BIO_read(bio, buf, 20);char *ptr = buf; The content that I send as input is a signed file content that I get from a different source. The issue is that the output 'buf' is not as expected on my x86. The behavior is different on different architectures. For e.g. on intel x86 platform I get the following output with additional 0xffffff padded.>> For me this is not the expected result. 22,ffffff82,2b,28,06,09,2a,ffffff86,48,ffffff86,fffffff7,0d,02,09,02,ffffffa0,ffffff82,3b,12,30 This is what I was getting on my PPC platform which is as expected with the same app code.22,82,2b,28,06,09,2a,86,48,86,f7,0d,02,09,02,a0,82,3b,12,30 Ofcourse, I need to further check on the source where/how the signed file was generated, but does anyone have any idea if BIO_read() has any specific handling with repsect to architectures?. I'd rule out the endianess factor as I would expect the entire byte order to be reversed if so. I print the above output using the following code. INFO( STR(" ..> Header@%02d: %02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x," "%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x,%02x", ptr-buf, *(ptr+0),*(ptr+1),*(ptr+2),*(ptr+3),*(ptr+4), *(ptr+5),*(ptr+6),*(ptr+7),*(ptr+8),*(ptr+9), *(ptr+10),*(ptr+11),*(ptr+12),*(ptr+13),*(ptr+14), *(ptr+15),*(ptr+16),*(ptr+17),*(ptr+18),*(ptr+19)));
Does BIO_read() behave differently on diff architectures?
Venkata Veldanda via openssl-users Fri, 09 Aug 2019 02:21:44 -0700
- Does BIO_read() behave differently on d... Venkata Veldanda via openssl-users
- RE: Does BIO_read() behave differe... Lynch, Andrew
- Re: Does BIO_read() behave dif... Venkata Veldanda via openssl-users