From: owner-openssl-...@openssl.org On Behalf Of Stephan Mueller
Sent: Friday, November 14, 2014 15:00
snip
I agree allowing to choose an arbitrary e is not so good. However, what
kind
of threats do you see when we would:
- use 2**16+1 per default
- allow 17 (-F4) as a legacy
F4 is
On Fri, Nov 14, 2014 at 11:47:11AM -0600, Quentin Gouchet wrote:
@@ -139,6 +140,22 @@ int MAIN(int argc, char **argv)
f4=3;
else if (strcmp(*argv,-F4) == 0 || strcmp(*argv,-f4) == 0)
f4=RSA_F4;
+ else if
On 11/14/2014 07:47 AM, Quentin Gouchet wrote:
The user can call RSA key generation and specify the public
exponent exp in a hexadecimal format.
Example: openssl genrsa -choose 72bdf -out key.pem 4096
Signed-off-by: Quentin quentin.gouc...@gmail.com quentin.gouc...@gmail.com
This is an
Am Freitag, 14. November 2014, 08:08:00 schrieb Daniel Kahn Gillmor:
Hi Daniel,
On 11/14/2014 07:47 AM, Quentin Gouchet wrote:
The user can call RSA key generation and specify the public
exponent exp in a hexadecimal format.
Example: openssl genrsa -choose 72bdf -out key.pem 4096
Hi,
Am 14.11.2014 um 19:07 schrieb Viktor Dukhovni:
On Fri, Nov 14, 2014 at 11:47:11AM -0600, Quentin Gouchet wrote:
@@ -139,6 +140,22 @@ int MAIN(int argc, char **argv)
f4=3;
else if (strcmp(*argv,-F4) == 0 || strcmp(*argv,-f4) == 0)
Hi Ben,
I will add the proper validation for the exponent to be chosen by the user
then, taking in account everybody's comments.
Best,
Quentin
Quentin Gouchet
-
Mobile: +46(0)723-843256
2014-11-14 14:10 GMT-06:00 Benny Baumann be...@geshi.org:
Hi,