From: Ben Laurie <[EMAIL PROTECTED]>

ben> The proximate cause is that fails the padding check (in fact, appears to
ben> not be padded at all). Tricky to say more than that - but it'd be
ben> interesting to compare the numbers in RSA_eay_public_decrypt() for the
ben> two runs.

OK, something is way wrong.  In RSA_padding_check_PKCS1_type_1, after
the look that walks past all the 0xff, the following values just can't
be right:

        i: 219
        j: 254

That's a *lot* of padding...  I'll see what happens if I recompile
without the BN assembler routines...

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-733-72 88 11
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, GemPlus:             http://www.gemplus.com/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to