I didn't see it before, but in fact, it is stated in the 'bugs' section :
|RSA_generate_key()| goes into an infinite loop for illegal input values.

Did you read :
http://www.openssl.org/docs/crypto/RSA_generate_key.html
||
Le 21/01/2014 17:50, Michel a écrit :
Hi Nischal,

As previously mentioned, I solved my problem using what I assume to be the appropriate parameters.
So, it won't help you directly.
I was only suggesting that infinite loop in those funtions seems to occur because of misuse/bad call/bad context, ... we would normally expect to return immediatly with an error code and that it may be possible to code the underlying logic with clear end/exit loop condition(s). I was also hoping to draw attention to more qualified people on this matter.


Le 21/01/2014 10:45, Nischal a écrit :
Hi Michel,
In my case, 'add' and 'rem' parameters are NULL
I also agree with you, that 'goto' should be avoided, but that is written by
OpenSSL guys.
Can you please let me know, how did you get rid of this problem.
I have checked everywhere, but did not get any solution, which can solve my
problem.

______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org




Reply via email to