From: SourceForge.net <no...@so...> - 2005-06-10 19:38:14
|
Bugs item #1212602, was opened at 2005-06-01 05:59 Message generated for change (Comment added) made by akuchling You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=120937&aid=1212602&group_id=20937 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: None Group: None Status: Open Resolution: None Priority: 5 Submitted By: Nobody/Anonymous (nobody) Assigned to: Nobody/Anonymous (nobody) Summary: Wrong RSA encryption Initial Comment: A big file is split up in chunks smaller than ((size()+1)/8 - 11). The modules contains 64 bytes so a chunk is 53 bytes. In front I add 0x00 0x02 PS 0x00 (the PKCS1 standard?). PS is pseudo non zero random padding of at least 8 bytes. Sometimes (seems irregular) encrypt() returns 63 bytes. 64 bytes are expected. Then I call encrypt() again for the same data. This second time the correct 64 bytes are returned. ---------------------------------------------------------------------- >Comment By: A.M. Kuchling (akuchling) Date: 2005-06-10 15:38 Message: Logged In: YES user_id=11375 Please provide a small test script that demonstrates the problem. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=120937&aid=1212602&group_id=20937 |