I didn't see it before, but in fact, it is stated in the 'bugs' section :
|RSA_generate_key()| goes into an infinite loop for illegal input values.
Did you read :
http://www.openssl.org/docs/crypto/RSA_generate_key.html
||
Le 21/01/2014 17:50, Michel a écrit :
Hi Nischal,
As previously mentioned, I solved my problem using what I assume to be
the appropriate parameters.
So, it won't help you directly.
I was only suggesting that infinite loop in those funtions seems to
occur because of misuse/bad call/bad context, ... we would normally
expect to return immediatly with an error code and that it may be
possible to code the underlying logic with clear end/exit loop
condition(s).
I was also hoping to draw attention to more qualified people on this
matter.
Le 21/01/2014 10:45, Nischal a écrit :
Hi Michel,
In my case, 'add' and 'rem' parameters are NULL
I also agree with you, that 'goto' should be avoided, but that is
written by
OpenSSL guys.
Can you please let me know, how did you get rid of this problem.
I have checked everywhere, but did not get any solution, which can
solve my
problem.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org