> Perhaps the solution for you would be to use the RSA_NONE padding
> method and make yourself sure that the buffer you want to encrypt
> is equal the the size of the modulus.

RSA_NONE should be used only if you have implemented a cryptographically
sound padding method in your application. OpenSSL supports PKCS#1 v1.5
and PKCS#1 v2.0 padding, which should be sufficient for almost all purposes.

If the modulus size causes problems, why not just use a larger key?

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to