diff options
author | Sybren A. Stüvel <sybren@stuvel.eu> | 2011-07-09 23:55:38 +0200 |
---|---|---|
committer | Sybren A. Stüvel <sybren@stuvel.eu> | 2011-07-09 23:55:38 +0200 |
commit | 73e063c0617e55833d856b30f0c2f9290dbc9476 (patch) | |
tree | ff43a3a3bd792e1c8046c77647ed9fdab117c3f6 /rsa/core.py | |
parent | 62abca7fce2b3c4e9b16b43209371bf3c225fb6d (diff) | |
download | rsa-git-73e063c0617e55833d856b30f0c2f9290dbc9476.tar.gz |
Added support for padding blocks
Diffstat (limited to 'rsa/core.py')
-rwxr-xr-x[-rw-r--r--] | rsa/core.py | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/rsa/core.py b/rsa/core.py index f42801c..8f989df 100644..100755 --- a/rsa/core.py +++ b/rsa/core.py @@ -21,8 +21,8 @@ def encrypt_int(message, ekey, n): raise OverflowError("The message is too long") #Note: Bit exponents start at zero (bit counts start at 1) this is correct - safebit = rsa.common.bit_size(n) - 2 #compute safe bit (MSB - 1) - message += (1 << safebit) #add safebit to ensure folding + safebit = rsa.common.bit_size(n) - 2 # compute safe bit (MSB - 1) + message += (1 << safebit) # add safebit to ensure folding return pow(message, ekey, n) @@ -32,8 +32,8 @@ def decrypt_int(cyphertext, dkey, n): message = pow(cyphertext, dkey, n) - safebit = rsa.common.bit_size(n) - 2 #compute safe bit (MSB - 1) - message -= (1 << safebit) #remove safebit before decode + safebit = rsa.common.bit_size(n) - 2 # compute safe bit (MSB - 1) + message -= (1 << safebit) # remove safebit before decode return message |