PROTECTED] On Behalf Of Michael Sierchio
Sent: 17 September 2008 22:48
To: openssl-users@openssl.org
Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA
encryption
Kenneth Goldman wrote:
What padding are you specifying? I suspect that you are specifying
no padding
the stuff anyway ;)
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ger Hobbelt
Sent: 18 September 2008 10:21
To: openssl-users@openssl.org
Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA
encryption
:-)
Well, the 'funny' bit in your
@openssl.org
Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA
encryption
Kenneth Goldman wrote:
What padding are you specifying? I suspect that you are specifying
no padding, in which case the size of the input must be the same
as the size of the key.
No. The input
Peter Walker wrote:
The purpose of my application is to send a credit card number in
encrypted format.
Then use OAEP.
- M
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
But the peer uses RSA_PKCS1_PADDING. Is this interchangeable with OAEP?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael Sierchio
Sent: 18 September 2008 10:02
To: openssl-users@openssl.org
Subject: Re: Do you have to pre-pend 16 bytes to a raw
| Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA
| encryption
|
| Peter Walker wrote:
|
| The purpose of my application is to send a credit card number in
| encrypted format.
|
| Then use OAEP.
For that the upstream server must also use OAEP.
Since it obviously doesn't, OAEP
Peter Walker wrote:
Sorry if this sounds ultra noobish but you guys lost me, even though you
probably did answer my question ;)
The purpose of my application is to send a credit card number in
encrypted format.
So the parent companies webservice issues me a X509 certificate which
19:25
To: openssl-users@openssl.org
Subject: RE: Do you have to pre-pend 16 bytes to a raw value before RSA
encryption
Peter Walker wrote:
Sorry if this sounds ultra noobish but you guys lost me, even though
you
probably did answer my question ;)
The purpose of my application is to send
I just completed writing my first program using libcrypto to handle RSA
encryption sing a public key extracted from a X509 certificate. This
program communicates with a service created by our parent company.
The first attempts that I made to run my program against the service,
resulted in an
[EMAIL PROTECTED] wrote on 09/17/2008 08:10:09 AM:
I just completed writing my first program using libcrypto to handle
RSA encryption sing a public key extracted from a X509 certificate.
This program communicates with a service created by our parent company.
The first attempts that I made to
Goldman
Sent: 17 September 2008 15:47
To: openssl-users@openssl.org
Subject: Re: Do you have to pre-pend 16 bytes to a raw value before RSA
encryption
[EMAIL PROTECTED] wrote on 09/17/2008 08:10:09 AM:
I just completed writing my first program using libcrypto to handle
RSA encryption sing
Kenneth Goldman wrote:
What padding are you specifying? I suspect that you are specifying
no padding, in which case the size of the input must be the same
as the size of the key.
No. The input is the same size as the *modulus*.
When used in encryption the recommended approach for RSA is to
12 matches
Mail list logo