> Actually, there are only security implications if the input size is so
>  small that M^e < kn (M is the message, e is the public exponent, n is
>  the modulus, and k is a small factor - probably less than five).  For

Right, but this is the caller's problem. It's why other padding schemes 
exist and why, presumably, NO_PADDING exists too (ie. to let them get 
directly to raw RSA).

> Why not steal a page from Microsoft's playbook, and have a parallel
> API? Call the function RSA_public_encrypt_ext, and have it take an
> explicit input AND output buffer length.  This function would be pretty
> much the same as the existing RSA_public_encrypt function, and the
> original function could be eventually implement in terms of the new
> one, so the support burden wouldn't be that big.

Well we already have plenty of _ex functions of this nature, but as 
Richard pointed out (correcting my stupidity in the process) the current 
prototypes are probably ok after all because the single "length" 
parameter is for the input.

Cheers,
Geoff

-- 
Geoff Thorpe
[EMAIL PROTECTED]
http://www.geoffthorpe.net/

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to