Hi Marc,

On Wed, Sep 27, 2006 at 02:50:13PM +0200, Marc Lehmann wrote:
> aespipe pads data to the cipher blocksize on encryption. as aespipe has no
> container format there is no way this cna be avoided, but many programs
> barf on the extra data appended (and give ghastly error messages), so this
> should be mentioned in the manpage.

Thanks for your bug report. I think this is in fact already
mentioned in the man page:

| If input size is not
| multiple of 16 or 512 bytes, input data is padded with null bytes so
| that both input and output sizes are multiples of 16 or 512 bytes.

If you can think of a wording that makes it more clear
(which I cannot right now), I'd be happy to apply a patch and
forward it to aespipe upstream.

cheers,
Max


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to