[gnutls-dev] bug in _gnutls_pkcs1_rsa_encrypt
    Matthias Urlichs 
    smurf at smurf.noris.de
       
    Wed Aug 18 11:58:19 CEST 2004
    
    
  
Hi,
Werner Koch:
> > This line doesn't make sense, IMHO.
> 
> The idea is that when requesting K new random bytes to replace zero
> bytes of the initial random string, we request a few bytes more so
> that we have some spare random bytes in case the K new bytes contain
> zero bytes.
> 
I thought so.
However, it would help a great deal if you'd actually skip zero bytes in
the new string when you replace the zeroes in the old string.  ;-)
> Agreed, requesting just one extra byte for replacing 128 zero bytes is
> too less. 
s/is too less/isn't enough/.  (OK, OK, I'll shut up now.)
To be reasonably safe, add three more bytes.
-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  smurf at smurf.noris.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: </pipermail/attachments/20040818/69b5e44a/attachment.pgp>
    
    
More information about the Gnutls-devel
mailing list