In message <[EMAIL PROTECTED]> on Tue, 23 Mar 2004 10:48:00 -0800, Jose Castejon-Amenedo <[EMAIL PROTECTED]> said:
Jose.Castejon-Amenedo> OK. I would like to add to what you Jose.Castejon-Amenedo> (correctly) wrote earlier on: a 1,024-bit RSA Jose.Castejon-Amenedo> key works on 1,024 bits of input and returns Jose.Castejon-Amenedo> 1,024 bits of output. The actual numerical Jose.Castejon-Amenedo> value of the input can be any positive integer Jose.Castejon-Amenedo> smaller than the RSA modulus. In order to have Jose.Castejon-Amenedo> 1,024 bits worth of input, a left-padding with Jose.Castejon-Amenedo> zeros is assumed by RSA_NO_PADDING. Since this seems to be a little bit confusing, I made a change to doc/crypto/RSA_public_encrypt.pod to make things a bit clearer. The relevant paragraph now says this: B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 based padding modes, less than RSA_size(B<rsa>) - 41 for RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. The random number generator must be seeded prior to calling RSA_public_encrypt(). ----- Please consider sponsoring my work on free software. See http://www.free.lp.se/sponsoring.html for details. -- Richard Levitte \ Tunnlandsvägen 52 \ [EMAIL PROTECTED] [EMAIL PROTECTED] \ S-168 36 BROMMA \ T: +46-708-26 53 44 \ SWEDEN \ Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Unsolicited commercial email is subject to an archival fee of $400. See <http://www.stacken.kth.se/~levitte/mail/> for more info. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]