> From: [email protected] On Behalf Of Stephen Henson via RT > Sent: Monday, 02 May, 2011 19:35
> > [[email protected] - Wed Apr 20 11:02:34 2011]: > > 21070064:PKCS7 routines:PKCS7_dataDecode:decrypted key is wrong length > > CMSAlgorithm.DES_EDE3_CBC ... works fine. > > > > Find attached the certificate, key and two messages used > for the test. > > > > > > The attached file is corrupted, please resend. > (I believe) I solved this 04-25; see maillist then. You don't need OP's cert/key and message; any example ones reproduce the problem using his code (plus scaffolding). (I used my dev system cert/key and "text/plain: example".) The problem is that BouncyCastle must be told both the AlgOID (AES128 or AES256) AND the keylength, else it apparently defaults to 192 bits which is wrong. Even though keylength could be determined from algOID. For TDEA, the apparent default to 192 is right. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [email protected] Automated List Manager [email protected]
