This sounds like the same old problem with passing an RSA public key to this
function and getting a segv, which seems to bite new users quite often.  Can
this function be fixed to do a sanity check on the key before proceeding?  I
assume it's the same with a hardware key.  If a user ends up with an RSA key
(public, private, or HSM), how are they to know whether they can safey call
this function?  Do they need intimate enough knowledge of the RSA structure
to check if d is NULL, or check some flag to determine if it's a hardware
key?

Regards,

Steven

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to