as big as the key.
What are the dangers/consequences of using
RSA_NO_PADDING ?
--- "Wade L. Scholine" <[EMAIL PROTECTED]> wrote:
>
> sharun santhosh asks:
>
> > In openssl-0.9.6g/demos/maurice/example2.c
> >
> > why is a check performed after call
when i run the example1 all i get is junk
why?
__
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
__
OpenSSL Project
A is a block cipher with a block size equal to the
> key size (a little
> smaller, actually). Typical key sizes these days are
> 1024 or 2048 bits (128
> or 256 bytes). Common RSA applications (for example
> SSL) involve using it to
> encrypt one or a few blocks.
>
> >
I am new to this and have read somewhere that public
key algorithms are inappropriate for encrypting
'large' amounts of data.
How large is large?
thanks
__
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.c
Can someone please tell me the 'best' set/sequence of
functions I should use to extract a RSA public key
from a certificate and then use it to encrypt a file.
I am going crazy trying out various combinations here.
__
Do you Yahoo!?
Yahoo! Mail Pl