Hi all. 

I'm running into a curious thing. I am sending encrypted data over a socket 
connection. When I send the data, I am using blocking mode, where the commands 
look like this:

         if tCurrentConnectionA ["ssl"] is true then
            put slyEncrypt(tSocketData) into tSocketData
         end if
         
         close socket tSocket -- in case it was left open
         open socket to tSocket
         write tSocketData & linefeed to socket tSocket
         read from socket tSocket until linefeed
         put it into tReceivedData
         
         if the last char of tReceivedData is linefeed then \
               delete last char of tReceivedData
         
         close socket tSocket
         
         if tCurrentConnectionA ["ssl"] is true then
            put slyDecrypt(tReceivedData) into tReceivedData
         end if

Now just to belay questions that might be asked, I know that the read from 
socket is working because I get a salted hash back, so the server is doing what 
it is supposed to on the other end. 

However when I go to decrypt the hash I am SOMETIMES getting the dreaded Wrong 
final block length as an error. Curiously, sometimes it works! 

My suspicion is that the hash contains a linefeed (sometimes). So the question 
I have is, what character is GUARANTEED to NOT be in an aes256 hash? I need a 
delimiter. Read from socket until eof fails with a timeout. That is intensly 
unfortunate by the way, it ought to work. 

Bob S


_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to