Felix, the real security hole is your key length. For a key length greater 1024 p and q should never be identical. The chance of p being not a prime is probably greater. In case p=q the Euler function will be p(p-1), whereas OpenSSL uses (p-1)(q-1) , i.e. (p-1)^2. In this case RSA, i.e. c:=m^e, m:=c^d, will not work. /Ann. _______________________________________________ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
- [openssl-dev] [openssl.org #4190] Missing Check for... Felix via RT
- Re: [openssl-dev] [openssl.org #4190] Missing ... Ann
- [openssl-dev] [openssl.org #4190] Missing Chec... Rich Salz via RT
- Re: [openssl-dev] [openssl.org #4190] Miss... Felix via RT
- Re: [openssl-dev] [openssl.org #4190] ... Kurt Roeckx via RT
- Re: [openssl-dev] [openssl.org #41... Felix via RT
- Re: [openssl-dev] [openssl.or... Viktor Dukhovni
- [openssl-dev] [openssl.org #4190] ... Richard Levitte via RT
- Re: [openssl-dev] [openssl.or... Felix via RT
- [openssl-dev] [openssl.org #4190] Miss... Richard Levitte via RT
- Re: [openssl-dev] [openssl.org #41... Felix via RT