I don't understand what is happening. Thanks in advance.
Robert Relyea wrote:
Antonio Andres Espallardo wrote:
Hi. I'm developing a pkcs11 module, which offeir support for RC2 algorithm and some algorithm more. The behavior of Netscape 7.2 when I make use of the pkcs11 module is like this:
1) Netscape creates an RC2 Secret Key of 16 bytes length
2) It inits an encrypt operation, calling the method C_EncryptInit
3) It calls the method C_EncryptUpdate of the pkcs11, but the out buffer is too small, consecuently the pkcs11 return CKR_BUFFER_TOO_SMALL. Well, now Netscape detroy the secret key object and finalizes, when it should retry with a bigger buffer.
How big of a buffer is NSS providing? The spec says for CKM_RC2_CBC you need a buffer which is equal to the input data size. (and input data should be a multiple of 8). What are you seeing from NSS?
bob
_______________________________________________ mozilla-crypto mailing list mozilla-crypto@mozilla.org http://mail.mozilla.org/listinfo/mozilla-crypto