Hi Kai Ji,
Debugged it using openssl source code used in these distros and the failure 
found due to below
Implicit rejection added in PKCS padding.

https://github.com/openssl/openssl/pull/13817/commits/3b99dcb1a6df6853581d3035c6d9a23a831716bb

As part of the above fix, rsa_ossl_private_decrypt() would additionally need 
private exponent
rsa->d, assuming that d is already part of RSA session, to derive kdk used in 
implicit rejection.
We did not have it in CRT test vectors today. I'll send patch to fix these.

Thanks,
Gowrishankar
> 
> Hi Kai Ji,
> >
> > Hi Gowrishankar,
> >
> > Thanks for reach out, I don't have those environments setup on my end,
> > but Ubuntu 20.04 and RHEL8  are old but still common LTS packages.
> > Are you able to dump the actual msg buffer ?
> >
> 
> RSA_private_decrypt fails and return code is -1. Output buffer is untouched.
> 
> I dumped error code of it:
> error:04067084:rsa routines:rsa_ossl_public_decrypt:data too large for
> modulus
> 
> When I used same openssl library that I compiled, no error is seen. Also, 
> public
> decrypt function is called, but it should be private decrypt to be called.
> 
> JFYI end of life for full support already over for the above distros. Not 
> sure if
> the Openssl 1.1.1 in them need some fix for above.
> 
> Thanks,
> Gowrishankar
> 

Reply via email to