In message <[EMAIL PROTECTED]> on Tue, 23 Mar 2004 10:48:00 -0800, Jose 
Castejon-Amenedo <[EMAIL PROTECTED]> said:

Jose.Castejon-Amenedo>  OK. I would like to add to what you
Jose.Castejon-Amenedo> (correctly) wrote earlier on: a 1,024-bit RSA
Jose.Castejon-Amenedo> key works on 1,024 bits of input and returns
Jose.Castejon-Amenedo> 1,024 bits of output. The actual numerical
Jose.Castejon-Amenedo> value of the input can be any positive integer
Jose.Castejon-Amenedo> smaller than the RSA modulus. In order to have
Jose.Castejon-Amenedo> 1,024 bits worth of input, a left-padding with
Jose.Castejon-Amenedo> zeros is assumed by RSA_NO_PADDING.

Since this seems to be a little bit confusing, I made a change to
doc/crypto/RSA_public_encrypt.pod to make things a bit clearer.  The
relevant paragraph now says this:

B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
based padding modes, less than RSA_size(B<rsa>) - 41 for
RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
The random number generator must be seeded prior to calling
RSA_public_encrypt().

-----
Please consider sponsoring my work on free software.
See http://www.free.lp.se/sponsoring.html for details.

-- 
Richard Levitte   \ Tunnlandsvägen 52 \ [EMAIL PROTECTED]
[EMAIL PROTECTED]  \ S-168 36  BROMMA  \ T: +46-708-26 53 44
                    \      SWEDEN       \
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to