[prev in list] [next in list] [prev in thread] [next in thread]
List: openssl-dev
Subject: Problem of RSA in Openssl
From: changkun <changkun74 () sina ! com>
Date: 1998-07-10 8:14:12
[Download RAW message or body]
I use the rsa_test to test RSA in Openssl-0.9.5a. At the beginning it seems OK, but when I dump out the encrypted result, I find the results of rsa_test are different for every time. If I do not change the plain text or the key in the rsa_test.c, I think the output results of several time should be same. Can anyone tell me why ?
The dumped out results of encyrped data are as follows:
(First time)
---------------------
encrypted_data's fragment at bffffb0c.
length: 64 bytes.
data: 9e 4d 72 4e 03 b3 0b d5 8c ca 16 71 b6 ec 55 MrN q U
data: d2 0a d2 d0 d0 c9 f2 cd 7e f7 31 0b 09 f8 f0 ~ 1
data: 2a 58 d6 85 34 72 b2 3c ff a8 70 c3 d6 8b 39 *X 4r < p 9
data: fa 39 37 15 5e 78 7f d5 08 4c 27 89 74 91 5f 97 ^x L' t _
data: a3 c9 17 ac
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 50 bytes.
data: 3c 49 6b 8c 9b 6b 96 39 48 e3 28 4a 47 ce 70 <Ik k 9H (JG p
data: d7 11 20 0d 03 9d bd c5 0f 8f 16 8b c9 fc fd
data: c0 d4 b6 09 d1 5a 32 86 7c 79 d2 43 7b 94 1e Z2 |y C{
data: dd af ff 3b fb ;
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 128 bytes.
data: 47 79 ee 6a ea c9 b2 f0 f4 75 02 2d 31 0b 4d Gy j u -1 M
data: 51 8a 26 21 46 ff 62 f2 41 40 07 37 53 9e fc Q &!F b A@ 7S
data: 20 11 fd b5 b7 56 0c cb 0f e4 1b f9 83 c8 b8 V
data: b6 a6 8b b7 56 8e 01 b5 1a 67 a9 d0 63 55 e2 V g cU
data: 9e 94 14 d7 d0 e1 33 54 39 e9 3a 09 96 99 8a 3T9 :
data: cd 36 f2 16 0f e7 a8 54 62 55 63 ae 8b b9 e7 6 TbUc
data: 92 4f ce 80 f8 ed 0a d2 db cf 29 1b f3 6f fe O ) o
data: c3 80 02 9a 42 5a ea 21 d3 cf 34 c3 00 ac 25 BZ ! 4 %
data: 13 ca e3 1e 0c 22 f1 84 "
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
(Second time)
---------------------
encrypted_data's fragment at bffffb0c.
length: 64 bytes.
data: 72 4d 70 e2 ec 13 db d5 98 fe ac fa 3e 39 e8 rMp >9
data: bd f5 05 bf 89 34 46 11 c6 e3 f4 36 21 ab 01 4F 6!
data: 43 3d 07 71 8a 3f d5 87 52 9d bf 88 81 52 7f C= q ? R R
data: 45 e1 66 c5 33 45 cf 26 de 41 26 44 b7 6c 8e E f 3E & A&D l
data: a1 88 8d 67 g
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 50 bytes.
data: 7a f2 8f dc 6d 58 4b a8 37 00 fb 96 69 10 20 z mXK 7 i
data: 07 a5 d2 23 ec 68 07 6d 35 9d 49 95 d0 78 b6 # h m5 I x
data: 38 19 0b e8 73 36 a6 9a 10 76 6f 82 29 56 bf 8 s6 vo )V
data: 40 dd a8 48 e1 @ H
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 128 bytes.
data: 11 d3 79 de 23 8f 63 ac a9 5a 8c 8a c7 a9 af y # c Z
data: 3c e7 6e 19 93 da 10 0d bd e3 15 6f 56 de 84 < n oV
data: 62 a5 dc 98 52 c2 28 92 2e 98 0f 8d 3f 03 7c b R ( . ? |
data: dc 4e d8 d8 e1 b7 38 e7 30 ef 6a 03 03 1c af N 8 0 j
data: 12 3c e8 07 7c f3 2a a0 5f 72 03 de 47 10 4f < | * _r G O
data: 7e 51 93 0a 29 66 87 53 e7 1a 35 3a 0f f8 1f ~Q )f S 5:
data: a7 9b 3c b0 14 01 81 fd c9 34 c8 81 dc 43 ed < 4 C
data: 6f 58 3c 37 a8 8b 50 ec 0f c4 54 e3 8b de 58 oX<7 P T X
data: f1 85 a2 40 f7 eb b9 e7 @
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
(Third time)
---------------------
encrypted_data's fragment at bffffb0c.
length: 64 bytes.
data: 74 2b 0c 15 ce 94 c6 a7 08 ea 0c 95 7d 49 60 t+ }I`
data: a5 62 2d 44 7f bf 6d d5 92 6f be d2 58 4a b8 b-D m o XJ
data: 7d c1 11 cf 82 4b d9 ad 9d 08 a9 f1 21 57 0c } K !W
data: eb ef 36 1e 53 05 13 d4 c5 39 e3 12 6c c1 40 6 S 9 l @
data: 00 9c 4d 5f M_
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 50 bytes.
data: 3f f0 c5 ca ee 19 d2 ac 33 77 5a 08 3e 38 70 ? 3wZ >8p
data: 40 72 c9 a9 6d 41 5b d0 b8 8a fc 29 36 86 64 @r mA[ )6 d
data: 5f 78 51 72 33 16 ba b4 38 44 2e 58 02 3f d6 _xQr3 8D.X ?
data: c8 b5 54 4b e5 TK
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
---------------------
encrypted_data's fragment at bffffb0c.
length: 128 bytes.
data: 03 04 2a d8 a6 4d 70 d0 58 48 f6 a2 72 ee 79 * Mp XH r y
data: a5 87 a5 38 ab 88 02 73 da 30 9b df 79 0f 06 8 s 0 y
data: 32 72 ad e3 64 4f 9d 76 ce d4 ac 04 44 af d8 2r dO v D
data: 49 19 c1 08 04 d2 16 2f 48 2d ec 35 04 f4 8d I /H- 5
data: 21 04 ce da a9 2f bb 6e 37 a0 3a 87 62 cf 5a ! / n7 : b Z
data: 67 07 a7 82 f4 02 8f 4c 29 40 cb f8 b2 de 7c g L)@ |
data: 53 e5 db 92 67 9f 16 ea 65 96 1a 57 50 d2 cf S g e WP
data: b8 eb a6 c2 bc 6d 98 76 94 00 a3 7e 7e c8 d7 m v ~~
data: 81 7c ea d7 e2 0e 69 63 | ic
---------------------
PKCS #1 v1.5 encryption/decryption ok
OAEP encryption/decryption ok
changkun
changkun74@sina.com
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager majordomo@openssl.org
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic