Test PKCS#1 v1.5 padding as well.
diff --git a/rsaref/rsaref.c b/rsaref/rsaref.c
index 90cda46..84486dd 100644
--- a/rsaref/rsaref.c
+++ b/rsaref/rsaref.c
@@ -283,6 +283,11 @@
 	int i,outlen= -1;
 	RSArefPrivateKey RSAkey;
 
+	if (padding != RSA_PKCS1_PADDING)
+		{
+		RSAREFerr(RSAREF_F_RSA_REF_PRIVATE_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE);
+		goto err;
+	}
 	if (!RSAref_Private_eay2ref(rsa,&RSAkey))
 		goto err;
 	if ((i=RSAPrivateEncrypt(to,&outlen,from,len,&RSAkey)) != 0)
@@ -328,9 +333,12 @@
 	RSARandomState rnd;
 	unsigned char buf[16];
 
-	if (padding == RSA_PKCS1_OAEP_PADDING) 
+	if (padding != RSA_PKCS1_PADDING && padding != RSA_SSLV23_PADDING) 
+		{
+		RSAREFerr(RSAREF_F_RSA_REF_PUBLIC_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE);
 		goto err;
-
+		}
+	
 	R_RandomInit(&rnd);
 	R_GetRandomBytesNeeded((unsigned int *)&i,&rnd);
 	while (i > 0)