> Perhaps the solution for you would be to use the RSA_NONE padding
> method and make yourself sure that the buffer you want to encrypt
> is equal the the size of the modulus.
RSA_NONE should be used only if you have implemented a cryptographically
sound padding method in your application. OpenSSL supports PKCS#1 v1.5
and PKCS#1 v2.0 padding, which should be sufficient for almost all purposes.
If the modulus size causes problems, why not just use a larger key?
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]