Bugs item #13034, was opened at 2007-08-13 22:59
You can respond by visiting: 
http://rubyforge.org/tracker/?func=detail&atid=7857&aid=13034&group_id=2014

Category: None
Group: None
Status: Open
Resolution: None
Priority: 3
Submitted By: Vince Jones (bugmenot)
Assigned to: Nobody (None)
Summary: jruby-openssl random_key and random_iv are too big

Initial Comment:
random_key and random_iv is calculating size by byte length instead of bit 
length, thus the generates values are 8x too large.  the resultant error of 
using the incorrectly sized key and iv is a "illegal key size" exception. mri 
calculates this correctly.

----------------------------------------------------------------------

>Comment By: Vince Jones (bugmenot)
Date: 2007-08-13 23:33

Message:
also, for aes key sizes larger than 128, an "illegal key 
size" is also reported despite being set correctly.  for 
example for 256, a key size of 32 bytes is set and the IV 
is also set appropriately to 16 bytes.

----------------------------------------------------------------------

You can respond by visiting: 
http://rubyforge.org/tracker/?func=detail&atid=7857&aid=13034&group_id=2014
_______________________________________________
Jruby-extras-devel mailing list
[email protected]
http://rubyforge.org/mailman/listinfo/jruby-extras-devel

Reply via email to