In message <5720fd7d.3050...@gmail.com> on Wed, 27 Apr 2016 12:57:17 -0500, Douglas E Engert <deeng...@gmail.com> said:
deengert> You can call it a documentation problem. The problem only showed up deengert> with trying to update d deengert> in an existing rsa key. RSA_set0_key requires n, e, and d == NULL OR deengert> n, e, and d to all be set at the same time. Not any more, just the first time (and then only n and e, d can be left NULL). So that makes this particular sequence perfectly legal: RSA_set0_key(rsa, n, e, NULL); /* calculate d */ RSA_set0_key(rsa, NULL, NULL, d); (sloppy code, btw... return codes should really be checked) Cheers, Richard -- Richard Levitte levi...@openssl.org OpenSSL Project http://www.openssl.org/~levitte/ -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev