On 8/06/2014 8:18 PM, Mounir IDRASSI wrote:
> On 6/8/2014 1:46 AM, Jeffrey Walton wrote:
>> OK, does the library provide the CRT solver (I don't believe so, but I
>> thought I would ask).
> Few years ago, I needed such solver to convert from RSA SFM format
> (n,e,d) to CRT representation. Obviously
On 6/8/2014 1:46 AM, Jeffrey Walton wrote:
OK, does the library provide the CRT solver (I don't believe so, but I
thought I would ask).
Few years ago, I needed such solver to convert from RSA SFM format
(n,e,d) to CRT representation. Obviously OpenSSL doesn't contain one so
I implemented it usi
On Sat, Jun 7, 2014 at 7:30 PM, Tim Hudson wrote:
> On 8/06/2014 8:25 AM, Jeffrey Walton wrote:
>
> I've got n,e,d and loaded them into a RSA*. When I call RSA_check_key,
> I get an 0x407b093 error:
>
> $ openssl errstr 0x407b093
> error:0407B093:rsa routines:RSA_check_key:value missing
>
On 8/06/2014 8:25 AM, Jeffrey Walton wrote:
> I've got n,e,d and loaded them into a RSA*. When I call RSA_check_key,
> I get an 0x407b093 error:
>
> $ openssl errstr 0x407b093
> error:0407B093:rsa routines:RSA_check_key:value missing
>
> How do I instruct he library to solve for the missing
On Donnerstag, 29. August 2002 16:58, [EMAIL PROTECTED] wrote:
> Hi Nils,
Hi Vignesh,
[...]
> >RSA_Keys->n=BN_new();
> >BN_init(RSA_Keys->n);
>
> BN_init() is unnecessary, because BN_new() initialize
> the BIGNUM structure.
>
> [...]
>
> > else if( !(RSA_Keys->n->d = (BN_ULONG *)malloc((
Hi Nils,
I have put my doubt in the mail trail below inside
__
my comments
__
Please let me know what you think.
Vignesh
[EMAIL PROTECTED] wrote:
>
> Hi friends,
>
> RSA_check_key() cores.
RSA_check_key() expects a private key => the RSA structure
must contain valid rsa->p and rsa->q entries otherwise
RSA_check_key() will always produce a core dump
( without p and q you can not verify that a RSA key is valid,
bu
Ricardo Guerra wrote:
>
> hi,
>
> when i do this, i get a segfault on "RSA_check_key(&pubKey)", the public key
> is generated via cat priv.key | openssl rs -pubout > pub.key .. the real
> problem is using rsa_public_decrypt(), the decrypted data makes no sense.. so
> i wondered if the public key