I noted that when generating a RSA public key pair using a non-standard public exponent (particularly, 65538, or 0x01, 0x00,0x02), the RSA_generate_key never returns, and the program keeps using 100% CPU until I kill it.

My question is: Is this behavior expected? If some non-standard publ. exponent is problematic, shouldn't we abort with error before attempting to use it?

Or, to put it in another way, should the caller validate the public exponent before issuing RSA_generate_key(), to avoid a potential DoS?

Thanks,

 -Klaus


--
Klaus Heinrich Kiwi | kla...@br.ibm.com | http://blog.klauskiwi.com
Open Source Security blog :     http://www.ratliff.net/blog
IBM Linux Technology Center :   http://www.ibm.com/linux/ltc

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to