Bugs item #13034, was opened at 2007-08-13 22:59 You can respond by visiting: http://rubyforge.org/tracker/?func=detail&atid=7857&aid=13034&group_id=2014
Category: None Group: None Status: Open Resolution: None Priority: 3 Submitted By: Vince Jones (bugmenot) Assigned to: Nobody (None) Summary: jruby-openssl random_key and random_iv are too big Initial Comment: random_key and random_iv is calculating size by byte length instead of bit length, thus the generates values are 8x too large. the resultant error of using the incorrectly sized key and iv is a "illegal key size" exception. mri calculates this correctly. ---------------------------------------------------------------------- >Comment By: Vince Jones (bugmenot) Date: 2007-08-13 23:33 Message: also, for aes key sizes larger than 128, an "illegal key size" is also reported despite being set correctly. for example for 256, a key size of 32 bytes is set and the IV is also set appropriately to 16 bytes. ---------------------------------------------------------------------- You can respond by visiting: http://rubyforge.org/tracker/?func=detail&atid=7857&aid=13034&group_id=2014 _______________________________________________ Jruby-extras-devel mailing list [email protected] http://rubyforge.org/mailman/listinfo/jruby-extras-devel
