Thanks for that.... how does Padding fit into this I have been using RSA_NO_PADDING with RSA_public_encrypt.... man pages say this is not such a good idea
but my call to RSA_public_encrypt fails if i use any of the other PADDING options....i am assuming this is because my msg(to be encrypted) is as big as the key. What are the dangers/consequences of using RSA_NO_PADDING ? --- "Wade L. Scholine" <[EMAIL PROTECTED]> wrote: > > sharun santhosh asks: > > > In openssl-0.9.6g/demos/maurice/example2.c > > > > why is a check performed after calling > > RSA_public_encrypt > > > > > > if (len != EVP_PKEY_size(pubKey)) > > { > > fprintf(stderr,"Error: ciphertext should > match > > length of key\n"); > > exit(1); > > } > > Because RSA is a block cipher with the block size > equal to the key size. > __________________________________________________ Do you Yahoo!? Yahoo! Mail Plus - Powerful. Affordable. Sign up now. http://mailplus.yahoo.com ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]