In the file ssl/ssl_rsa.c, there is a test for an error using
ERR_peel_last_error, which is followed by a call to ERR_get_error if the
error is to be ignored. However it is possible, if there is more than one
error on the stack, to end up with errors on the stack anyway. While this
seems an unli
[EMAIL PROTECTED] - Sat Sep 27 20:42:33 2003]:
> I have an application using the OpenSSL S/MIME interface. When I
>generate an encryptred message using DES, the DES key generated
>does not have odd parity. The key is generated in
>pk7_doit.c:PKCS7_dataInit by calling RAND_bytes().
>