Actually, calling
RSA_blinding_off(rsa)
resolves the issue. Thanks for the hint!
-Brad
Nils Larsch wrote:
Brad House wrote:
In OpenSSL 0.9.7, you could successfully perform RSA decryption
without needing a seeded RNG (think systems like AIX, SCO, Solaris
which may not have /dev/urandom). In OpenSSL 0.9.8a,
RSA_private_decrypt() returns -1 unless the RNG is seeded. Is
there a particular reason this change has been made, or was it
in error?
I guess the reason for the behaviour is the modified rsa
blinding code (in case you use blinding). Could it be that
RSA::d is NULL in your private key ?
What does ERR_print_errors() give you ?
Cheers,
Nils
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [email protected]
Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [email protected]
Automated List Manager [EMAIL PROTECTED]