blob: e611d09bff977d7611c31f5342d6b27a8b6c9437 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<HTML>
<HEAD>
<TITLE> [pycrypto] PyCrypto Blowfish CFB limitation
</TITLE>
<LINK REL="Index" HREF="index.html" >
<LINK REL="made" HREF="mailto:pycrypto%40lists.dlitz.net?Subject=Re%3A%20%5Bpycrypto%5D%20PyCrypto%20Blowfish%20CFB%20limitation&In-Reply-To=%3CCAN6%2BgWEk-xR9B3FMn%3DO6DCuWHpDLxW%3DWRg8x9JEY1SEaiWdtiA%40mail.gmail.com%3E">
<META NAME="robots" CONTENT="index,nofollow">
<style type="text/css">
pre {
white-space: pre-wrap; /* css-2.1, curent FF, Opera, Safari */
}
</style>
<META http-equiv="Content-Type" content="text/html; charset=us-ascii">
<LINK REL="Previous" HREF="000594.html">
<LINK REL="Next" HREF="000596.html">
</HEAD>
<BODY BGCOLOR="#ffffff">
<H1>[pycrypto] PyCrypto Blowfish CFB limitation</H1>
<B>Webie</B>
<A HREF="mailto:pycrypto%40lists.dlitz.net?Subject=Re%3A%20%5Bpycrypto%5D%20PyCrypto%20Blowfish%20CFB%20limitation&In-Reply-To=%3CCAN6%2BgWEk-xR9B3FMn%3DO6DCuWHpDLxW%3DWRg8x9JEY1SEaiWdtiA%40mail.gmail.com%3E"
TITLE="[pycrypto] PyCrypto Blowfish CFB limitation">assie181 at gmail.com
</A><BR>
<I>Wed Jun 6 11:50:31 EDT 2012</I>
<P><UL>
<LI>Previous message: <A HREF="000594.html">[pycrypto] PyCrypto's output doesn't match OpenSSL's result
</A></li>
<LI>Next message: <A HREF="000596.html">[pycrypto] PyCrypto Blowfish CFB limitation
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#595">[ date ]</a>
<a href="thread.html#595">[ thread ]</a>
<a href="subject.html#595">[ subject ]</a>
<a href="author.html#595">[ author ]</a>
</LI>
</UL>
<HR>
<!--beginarticle-->
<PRE>Hi,
I am getting "ValueError: Input strings must be a multiple of the
segment size 8 in length" when trying to decrypt a file by using
Blowfish in CFB mode. The file length is not a multiple of 8. However,
OpenSSL doesn't require file length to be multiple of 8 and it
successfully decrypts the file.
You can see the problem in action by downloading and running
<A HREF="http://dl.dropbox.com/u/1522424/PyCrypto-limitation.tar">http://dl.dropbox.com/u/1522424/PyCrypto-limitation.tar</A>
(segment_size=64 is required for compatibility with OpenSSL).
1. Is this a limitation imposed by PyCrypto?
2. I could successfully decrypt and inflate the file by padding it
with "x" (randomly chosen). Is this safe and correct?
Thanks!
</PRE>
<!--endarticle-->
<HR>
<P><UL>
<!--threads-->
<LI>Previous message: <A HREF="000594.html">[pycrypto] PyCrypto's output doesn't match OpenSSL's result
</A></li>
<LI>Next message: <A HREF="000596.html">[pycrypto] PyCrypto Blowfish CFB limitation
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#595">[ date ]</a>
<a href="thread.html#595">[ thread ]</a>
<a href="subject.html#595">[ subject ]</a>
<a href="author.html#595">[ author ]</a>
</LI>
</UL>
<hr>
<a href="http://lists.dlitz.net/cgi-bin/mailman/listinfo/pycrypto">More information about the pycrypto
mailing list</a><br>
</body></html>
|