Opened 13 years ago

Last modified 13 years ago

#162 accepted defect

crypto incompatibilities between pycrypto and bouncycastle — at Initial Version

Reported by: Antoine Martin Owned by: Antoine Martin
Priority: major Milestone: 0.12
Component: Android Keywords:
Cc:

Description

There are at least two things that need addressing:

  • verify_key(...) sometimes fails and we therefore the identity of the server is rejected, not sure why this is intermittent
  • When decrypting encrypted messages: {{{

org.bouncycastle.crypto.DataLengthException?: input too large for RSA cipher.
}}}
I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and BouncyCastle? does not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase).

More info on this issue: Too much data for RSA block fail

Change History (0)

Note: See TracTickets for help on using tickets.