Actually, calling

RSA_blinding_off(rsa)

resolves the issue.  Thanks for the hint!

-Brad

Nils Larsch wrote:
Brad House wrote:
In OpenSSL 0.9.7, you could successfully perform RSA decryption
without needing a seeded RNG (think systems like AIX, SCO, Solaris
which may not have /dev/urandom).  In OpenSSL 0.9.8a,
RSA_private_decrypt() returns -1 unless the RNG is seeded.  Is
there a particular reason this change has been made, or was it
in error?

I guess the reason for the behaviour is the modified rsa
blinding code (in case you use blinding). Could it be that
RSA::d is NULL in your private key ?
What does ERR_print_errors() give you ?

Cheers,
Nils
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to