I didn't see it before, but in fact, it is stated in the 'bugs' section :
|RSA_generate_key()| goes into an infinite loop for illegal input values.
Did you read :
http://www.openssl.org/docs/crypto/RSA_generate_key.html
||
Le 21/01/2014 17:50, Michel a écrit :
Hi Nischal,
As previously mentione
Hi Nischal,
As previously mentioned, I solved my problem using what I assume to be
the appropriate parameters.
So, it won't help you directly.
I was only suggesting that infinite loop in those funtions seems to
occur because of misuse/bad call/bad context, ... we would normally
expect to ret
Hi Michel,
In my case, 'add' and 'rem' parameters are NULL
I also agree with you, that 'goto' should be avoided, but that is written by
OpenSSL guys.
Can you please let me know, how did you get rid of this problem.
I have checked everywhere, but did not get any solution, which can solve my
problem.
On Thu, Jan 16, 2014 at 10:35:41AM +, Nischal wrote:
> We are using openSSL in OpenAT-FXT modem. the version used is 0.9.8h. When I
> am calling function to generate keys, it goes into infinite loop inside the
> function and system got crashed.
You should be using OpenSSL 0.9.8y, or if possib
Hi,
I also experienced going into an infinite loop using
BN_generate_prime_ex() function.
I my case it was because I didn't fully understand how to use 'add' and
'rem' parameters.
I am now assuming they should be used as in dh_builtin_genparams(), in
dh_gen.c.
I am not qualified to discuss ho
Hi,
We are using openSSL in OpenAT-FXT modem. the version used is 0.9.8h. When I
am calling function to generate keys, it goes into infinite loop inside the
function and system got crashed.
By entering traces, I checked the flow of code
Code is given below
const int kBits = 4096;
RSA *rsa = RS