Hello,
> > Of course, but you should be aware that RSA private key is a pair
> > or (d,n) - private exponent and modulus.
> Thank you, Marek!
> Do I get it right - I have to try only the two values for "n" -
> "RSA_3" and "RSA_F4" ?
This two values are for public exponent, not for number n
which is p*q. If you have (from some place) RSA private key
(in any form) then this key should have at least d AND n, 
and you should read both this numbers to RSA structure. 
d is not enough to RSA operation. 

> > In your code you generated RSA key and replaced d with your
> > data, but p,q and others are from "old" key and because private
> > key operation using CRT do not require d then you can have impression
> > that this number is recreated when in practice ... is not used.
> How can I disable the usage of CRT? Is it possible to do by zeroing
> the "p" and "q" elements? Or there is another library function for
> that?
You may for example just do BN_free() one of p, q, dmp1, dmq1, iqmp
(and place NULL after that operation) and CRT will not be used.
But for me, using RSA_new() and proper d AND n should be enough
to get usable (but slow) private key.

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to