From: Ben Laurie <[EMAIL PROTECTED]> ben> The proximate cause is that fails the padding check (in fact, appears to ben> not be padded at all). Tricky to say more than that - but it'd be ben> interesting to compare the numbers in RSA_eay_public_decrypt() for the ben> two runs.
OK, something is way wrong. In RSA_padding_check_PKCS1_type_1, after the look that walks past all the 0xff, the following values just can't be right: i: 219 j: 254 That's a *lot* of padding... I'll see what happens if I recompile without the BN assembler routines... -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] Redakteur@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47 \ SWEDEN \ or +46-733-72 88 11 Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Software Engineer, GemPlus: http://www.gemplus.com/ Unsolicited commercial email is subject to an archival fee of $400. See <http://www.stacken.kth.se/~levitte/mail/> for more info. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]