Hi, openssl hackers!
I wrote little program that demonstrates problem, see attached file.
It's a bit long but it shows that only EVP_PKEY_decrypt() fails with 4K
keys. Rest of functions are just fine.
See evp_decrypt_with_pvtk() function for failure.
06.06.12 05:40, Dave Thompson написав(ла):
Hi.
Here is a result on my Cygwin + OpenSSL 1.0.1c 10 May 2012
Reading keys...keys are ready.
Encrytion/decryption with RSA-based function is OK.
Encrytion/decryption with EVP-based function is OK.
Signature chek is OK.
It seems it works fine.
Best regards,
Andrey Koltsov
13.06.2012
Hi again!
Andrey, thanks for testing. Seems it is platform-depended bug. My
development platform is Linux, Fedora 17, x86_64
I just tested It on OpenBSD 5.0/x86, it works fine too.
To OpenSSL developers: If you find my program useful as an example of
EVP/PK, please feel free to publish it.
On Wed, Jun 13, 2012, Oleksiy Lukin wrote:
Hi again!
Andrey, thanks for testing. Seems it is platform-depended bug. My
development platform is Linux, Fedora 17, x86_64
I just tested It on OpenBSD 5.0/x86, it works fine too.
I've answered this before. The problem is your cast to (size_t
Hi, crypto guys!
I have problem with EVP_PKEY_decrypt() function and 4K RSA private key
decrypting data encrypted with EVP_PKEY_encrypt() and corresponding
public key. Keys generated using openssl CA shell script.
EVP_PKEY_decrypt() just returns -2 saying that this key is not
supported. BUT!
From: owner-openssl-us...@openssl.org On Behalf Of Oleksiy Lukin
Sent: Tuesday, 05 June, 2012 03:59
I have problem with EVP_PKEY_decrypt() function and 4K RSA
private key
decrypting data encrypted with EVP_PKEY_encrypt() and corresponding
public key. Keys generated using openssl CA shell