Hi Viktor, I have assigned the task find out the root cause where the API is failing with this composite number. I see that with this composite number, the API
BN_mod_inverse(Ri, R, &tmod, ctx) is returning NULL. (This is being called in bn_mont.c). Can you explain what does the
BN_mod_inverse() actually does. Regards, Vishal
General From: openssl-users <openssl-users-bounces@xxxxxxxxxxx> On Behalf Of Viktor Dukhovni Sent: Friday, May 31, 2024 06:14 PM To: openssl-users@xxxxxxxxxxx Subject: Re: Issue in DH Algorithm Keys Generation in OpenSSL 3.3.0 [External email: Use caution with links and attachments] ________________________________ On Fri, May 31, 2024 at 12:39:12PM +0000, Vishal Kevat via openssl-users wrote: > Is there any way to make this prime number work by doing some
> modifications in the openssl source code. It ISN'T a *prime* number. > Like bypassing the OpenSSL DH prime check? Why do you want to use a broken DH group? Even if that 128-bit composite number were instead prime, it would still be way too small to offer any security. It is hard to imagine how what you're asking for makes any sense. -- Viktor. |