Hi,

I was not able to reproduce your problem using the same snapshot.  I run 
your commands a dozen times with no error. Tested under Linux 32-bit 
(Centos 5, gcc 4.1.2) and Linux 64-bit (Debian 5, gcc 4.3.2).
What platform/compiler are you using?
How does your openssl.cnf look like? In my tests, I use the one 
installed by the snapshot build.

Is anyone else able to reproduce this problem?

--
Mounir IDRASSI
IDRIX
http://www.idrix.fr


On 8/8/2010 9:40 PM, Hanno Boeck via RT wrote:
> It seems that openssl has a problem with pss certificates and uncommon rsa key
> sizes. For all keysizes with "keysize mod 8 = 1" (or keysize = n*8+1),
> verification of a self-signed test cert fails.
>
> I've not yet investigated if it's the generation or the verification code that
> is wrong, it's probably related to the emBits variable from the emsa-pss-
> verify/encode-code.
>
> Check with this:
> openssl genrsa 2007>  test.key
> openssl req -batch -new -x509 -sigopt rsa_padding_mode:pss -nodes -days 99999
> -key test.key>  test.crt
> openssl verify -check_ss_sig -CAfile test.crt test.crt
>
> Output of the last command is:
> 139831192893096:error:0407E06D:rsa routines:RSA_verify_PKCS1_PSS:data too
> large:rsa_pss.c:127:
> 139831192893096:error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP
> lib:a_verify.c:215:
>
>
> Tested with openssl-SNAP-20100808.
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [email protected]
> Automated List Manager                           [email protected]


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to