Hello, > > Of course, but you should be aware that RSA private key is a pair > > or (d,n) - private exponent and modulus. > Thank you, Marek! > Do I get it right - I have to try only the two values for "n" - > "RSA_3" and "RSA_F4" ? This two values are for public exponent, not for number n which is p*q. If you have (from some place) RSA private key (in any form) then this key should have at least d AND n, and you should read both this numbers to RSA structure. d is not enough to RSA operation.
> > In your code you generated RSA key and replaced d with your > > data, but p,q and others are from "old" key and because private > > key operation using CRT do not require d then you can have impression > > that this number is recreated when in practice ... is not used. > How can I disable the usage of CRT? Is it possible to do by zeroing > the "p" and "q" elements? Or there is another library function for > that? You may for example just do BN_free() one of p, q, dmp1, dmq1, iqmp (and place NULL after that operation) and CRT will not be used. But for me, using RSA_new() and proper d AND n should be enough to get usable (but slow) private key. Best regards, -- Marek Marcola <[EMAIL PROTECTED]> ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [email protected] Automated List Manager [EMAIL PROTECTED]
