#include "ssh.h"
-#define RSA_EXPONENT 37 /* we like this prime */
+#define RSA_EXPONENT 37 /* we like this prime */
-#if 0 /* bignum diagnostic function */
-static void diagbn(char *prefix, Bignum md) {
+#if 0 /* bignum diagnostic function */
+static void diagbn(char *prefix, Bignum md)
+{
int i, nibbles, morenibbles;
static const char hex[] = "0123456789ABCDEF";
printf("%s0x", prefix ? prefix : "");
- nibbles = (3 + ssh1_bignum_bitcount(md))/4; if (nibbles<1) nibbles=1;
- morenibbles = 4*md[0] - nibbles;
- for (i=0; i<morenibbles; i++) putchar('-');
- for (i=nibbles; i-- ;)
- putchar(hex[(bignum_byte(md, i/2) >> (4*(i%2))) & 0xF]);
+ nibbles = (3 + bignum_bitcount(md)) / 4;
+ if (nibbles < 1)
+ nibbles = 1;
+ morenibbles = 4 * md[0] - nibbles;
+ for (i = 0; i < morenibbles; i++)
+ putchar('-');
+ for (i = nibbles; i--;)
+ putchar(hex[(bignum_byte(md, i / 2) >> (4 * (i % 2))) & 0xF]);
- if (prefix) putchar('\n');
+ if (prefix)
+ putchar('\n');
}
#endif
-int rsa_generate(struct RSAKey *key, struct RSAAux *aux, int bits,
- progfn_t pfn, void *pfnparam) {
+int rsa_generate(struct RSAKey *key, int bits, progfn_t pfn,
+ void *pfnparam)
+{
Bignum pm1, qm1, phi_n;
/*
* time. We do this in 16-bit fixed point, so 29.34 becomes
* 0x1D.57C4.
*/
- pfn(pfnparam, -1, -0x1D57C4/(bits/2));
- pfn(pfnparam, -2, -0x1D57C4/(bits-bits/2));
+ pfn(pfnparam, -1, -0x1D57C4 / (bits / 2));
+ pfn(pfnparam, -2, -0x1D57C4 / (bits - bits / 2));
pfn(pfnparam, -3, 5);
/*
* general that's slightly more fiddly to arrange. By choosing
* a prime e, we can simplify the criterion.)
*/
- aux->p = primegen(bits/2, RSA_EXPONENT, 1, 1, pfn, pfnparam);
- aux->q = primegen(bits - bits/2, RSA_EXPONENT, 1, 2, pfn, pfnparam);
+ key->p = primegen(bits / 2, RSA_EXPONENT, 1, 1, pfn, pfnparam);
+ key->q = primegen(bits - bits / 2, RSA_EXPONENT, 1, 2, pfn, pfnparam);
/*
* Ensure p > q, by swapping them if not.
*/
- if (bignum_cmp(aux->p, aux->q) < 0) {
- Bignum t = aux->p;
- aux->p = aux->q;
- aux->q = t;
+ if (bignum_cmp(key->p, key->q) < 0) {
+ Bignum t = key->p;
+ key->p = key->q;
+ key->q = t;
}
/*
* and (q^-1 mod p).
*/
pfn(pfnparam, 3, 1);
- key->modulus = bigmul(aux->p, aux->q);
+ key->modulus = bigmul(key->p, key->q);
pfn(pfnparam, 3, 2);
- pm1 = copybn(aux->p);
+ pm1 = copybn(key->p);
decbn(pm1);
- qm1 = copybn(aux->q);
+ qm1 = copybn(key->q);
decbn(qm1);
phi_n = bigmul(pm1, qm1);
pfn(pfnparam, 3, 3);
freebn(qm1);
key->private_exponent = modinv(key->exponent, phi_n);
pfn(pfnparam, 3, 4);
- aux->iqmp = modinv(aux->q, aux->p);
+ key->iqmp = modinv(key->q, key->p);
pfn(pfnparam, 3, 5);
/*