Opened 13 years ago
Last modified 13 years ago
#162 accepted defect
crypto incompatibilities between pycrypto and bouncycastle — at Initial Version
Reported by: | Antoine Martin | Owned by: | Antoine Martin |
---|---|---|---|
Priority: | major | Milestone: | 0.12 |
Component: | Android | Keywords: | |
Cc: |
Description
There are at least two things that need addressing:
verify_key(...)
sometimes fails and we therefore the identity of the server is rejected, not sure why this is intermittent- When decrypting encrypted messages: {{{
org.bouncycastle.crypto.DataLengthException?: input too large for RSA cipher.
}}}
I am still a bit puzzled as to why pycrypto manages to decrypt such blocks and BouncyCastle? does not. Either we fix the data length using a specific padding scheme (as the length of the input looks fine as it is: <100bytes with 4096bit keys is ok), or we use a symmetric cipher for all encrypted packets (and exchange it during the login phase).
More info on this issue: Too much data for RSA block fail
Note: See
TracTickets for help on using
tickets.