Changes between Version 1 and Version 2 of Ticket #162
- Timestamp:
- 09/20/11 10:47:35 (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Ticket #162 – Description
v1 v2 5 5 org.bouncycastle.crypto.DataLengthException: input too large for RSA cipher. 6 6 }}} 7 I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and BouncyCastledoes not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase).7 I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and {{{BouncyCastle}}} does not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase). 8 8 9 9 More info on this issue: [http://stackoverflow.com/questions/2579103/too-much-data-for-rsa-block-fail-what-is-pkcs7 Too much data for RSA block fail]