file librsaconverter.c from its source
> (http://sourceforge.net/p/rsaconverter/code/HEAD/tree/Trunk/src/librsaconverter.c).
>
> In your case, you can use the function SfmToCrt in order to compute
> the CRT parameters, thus making RSA_check_key happy.
>
> ...
>
> I don't if there a
onverter.c).
In your case, you can use the function SfmToCrt in order to compute the
CRT parameters, thus making RSA_check_key happy.
Before calling SfmToCrt, I advice to call CheckRsaSfmKey to verify that
the triplet (n,e,d) are valid for RSA otherwise SfmToCrt can't find the
CRT
On Sat, Jun 7, 2014 at 7:30 PM, Tim Hudson wrote:
> On 8/06/2014 8:25 AM, Jeffrey Walton wrote:
>
> I've got n,e,d and loaded them into a RSA*. When I call RSA_check_key,
> I get an 0x407b093 error:
>
> $ openssl errstr 0x407b093
> error:0407B093:rsa routines:R
On 8/06/2014 8:25 AM, Jeffrey Walton wrote:
> I've got n,e,d and loaded them into a RSA*. When I call RSA_check_key,
> I get an 0x407b093 error:
>
> $ openssl errstr 0x407b093
> error:0407B093:rsa routines:RSA_check_key:value missing
>
> How do I instruct h
I've got n,e,d and loaded them into a RSA*. When I call RSA_check_key,
I get an 0x407b093 error:
$ openssl errstr 0x407b093
error:0407B093:rsa routines:RSA_check_key:value missing
How do I instruct he library to solve for the missing parameters so
the key can be ver
Hi,
I am seeing a core dump in RSA_check_key() function. The backtrace is as below.
I am unable to understand what is causing the issue. The core dump is
intermittent (not always reproduced).
Could someone please provide any pointers if I am missing any check?
--
Thanks,
Nilesh
P.S.
The code
On Mon, Mar 07, 2005, T. Quirin wrote:
> Hi,
> thank you Steve my verification function works now. But I want to check
> the RSA key before I use it. If I run "if(RSA_check_key(r) != 1) return
> -5;" I get a "Segmentation fault ". It works without this line.
Hi,
thank you Steve my verification function works now. But I want to check
the RSA key before I use it. If I run "if(RSA_check_key(r) != 1) return
-5;" I get a "Segmentation fault ". It works without this line.
#include
#include
#include
#include
#include
#include
a wrong password is given to decrypt the stored private key, the
resulting key is obviously invalid.
Using RSA_check_key() in that cases sometimes gives an error (right !)
but sometimes leads to an endless loop.
Does anybody knows if there's a workaround for this ?
To reproduce the situation
On Donnerstag, 29. August 2002 16:58, [EMAIL PROTECTED] wrote:
> Hi Nils,
Hi Vignesh,
[...]
> >RSA_Keys->n=BN_new();
> >BN_init(RSA_Keys->n);
>
> BN_init() is unnecessary, because BN_new() initialize
> the BIGNUM structure.
>
> [...]
>
> > else if( !(RSA_Keys->n->d = (BN_ULONG *)malloc((
PROTECTED] wrote:
>
> Hi friends,
>
> RSA_check_key() cores.
RSA_check_key() expects a private key => the RSA structure
must contain valid rsa->p and rsa->q entries otherwise
RSA_check_key() will always produce a core dump
( without p and q you can not verify that a RSA key is
[EMAIL PROTECTED] wrote:
>
> Hi friends,
>
> RSA_check_key() cores.
RSA_check_key() expects a private key => the RSA structure
must contain valid rsa->p and rsa->q entries otherwise
RSA_check_key() will always produce a core dump
( without p and q you can not verify th
Ricardo Guerra wrote:
>
> hi,
>
> when i do this, i get a segfault on "RSA_check_key(&pubKey)", the public key
> is generated via cat priv.key | openssl rs -pubout > pub.key .. the real
> problem is using rsa_public_decrypt(), the decrypted data makes no se
hi,
when i do this, i get a segfault on "RSA_check_key(&pubKey)", the public key
is generated via cat priv.key | openssl rs -pubout > pub.key .. the real
problem is using rsa_public_decrypt(), the decrypted data makes no sense.. so
i wondered if the public key was c
out this.
Steven
> -Original Message-
> From: Andrey Kubyshev [SMTP:[EMAIL PROTECTED]]
> Sent: Monday, February 26, 2001 12:16 PM
> To: Reddie, Steven
> Subject: Re[2]: RSA_check_key (pub_rsa) crashes
>
> Hello Steven,
>
> Thank you for quick answer!
&g
Hello Steven,
Thank you for quick answer!
Steven> RSA_check_key checks the consistency of private RSA key's only. Since this
Steven> function fails to check that the key contains the necessary values, it
Steven> dereferences a NULL pointer (rsa->p) and promptly crashes. Try
16 matches
Mail list logo