On 06/22/2011 05:51 PM, Crypto User wrote:
> On Jun 22, 11:56 am, Robert Relyea wrote:
>>
>>> Can anybody pl. provide any pointer.
>>> Thanks
Below I made some guesses based on the description I had from you, but
now that I've reviewed the code, I think the problem is just a basic
programming issu
On Jun 22, 11:56 am, Robert Relyea wrote:
> On 06/22/2011 10:54 AM, Crypto User wrote:> Ok. So I got it that Encrypt and
> decrypt Raw supports no padding . So
> > the data has to be exactly the length of modulus. Correct?
>
> Right. If you try to encrypt something smaller than the modulus, it wi
On 06/22/2011 10:54 AM, Crypto User wrote:
> Ok. So I got it that Encrypt and decrypt Raw supports no padding . So
> the data has to be exactly the length of modulus. Correct?
Right. If you try to encrypt something smaller than the modulus, it will
assume it's zero padded.
> But , PK11_pubEncryptPK
Ok. So I got it that Encrypt and decrypt Raw supports no padding . So
the data has to be exactly the length of modulus. Correct?
But , PK11_pubEncryptPKCS1/ PK11_PrivDecryptPKCS1 gives error -8023.
Can anybody pl. provide any pointer.
Thanks
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.
Hi ,
I have a couple of questions regarding the RSa encrypt/decrypt
operations.
1. PK11PubencryptRaw does not support any padding , So it will
Encrypt data only = to the modulus length .is that correct? So what
happens if data is less than modulus length? It does not seem to fail
if you give th
Hi ,
I have a couple of questions regarding the RSa encrypt/decrypt
operations.
1. PK11PubencryptRaw does not support any padding , So it will
Encrypt data only = to the modulus length .is that correct? So what
happens if data is less than modulus length? It does not seem to fail
if you give th
6 matches
Mail list logo