In message <[email protected]> on Wed, 27 Apr 2016 12:57:17 -0500,
Douglas E Engert <[email protected]> said:
deengert> You can call it a documentation problem. The problem only showed up
deengert> with trying to update d
deengert> in an existing rsa key. RSA_set0_key requires n, e, and d == NULL OR
deengert> n, e, and d to all be set at the same time.
Not any more, just the first time (and then only n and e, d can be
left NULL). So that makes this particular sequence perfectly legal:
RSA_set0_key(rsa, n, e, NULL);
/* calculate d */
RSA_set0_key(rsa, NULL, NULL, d);
(sloppy code, btw... return codes should really be checked)
Cheers,
Richard
--
Richard Levitte [email protected]
OpenSSL Project http://www.openssl.org/~levitte/
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev