I seem to be getting an extra block of output for AES-128 in CBC and ECB modes
when using the EVP_EncryptUpdate mode. When using the BIO interface it appears
to work fine, and if I leave padding enabled and provide less than 1 block of
input (15 bytes instead of 16) then it seems to work fine.
Hello,
Change line:
> returnvalue=RSA_private_decrypt(8,pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING);
>
to someting like that:
returnvalue=RSA_private_decrypt(RSA_size(mykey),pubenc,recovered,mykey,RSA_PKCS1_OAEP_PADDING);
Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>
Hi,
I am working on a program that does bulk encryption key exchange similar
to SSH. I am running into a problem with RSA_private_decrypt, it
returns -1 and tells me padding error, no matter which padding scheme I
use. The main goal is to encrypt a Blowfish key to send over the wire
and t
Hi,
I have a problem with RSA padding.
I'm trying to generate a "low level" signature with a smart card using the
functions RSA_private_encrypt. I think the Smart card RSA padding is wrong
because the decryption (RSA_public_decrypt() ) not return the exact value of
the digest but it returns a buffe