Mercurial > dropbear
comparison genrsa.c @ 1692:1051e4eea25a
Update LibTomMath to 1.2.0 (#84)
* update C files
* update other files
* update headers
* update makefiles
* remove mp_set/get_double()
* use ltm 1.2.0 API
* update ltm_desc
* use bundled tommath if system-tommath is too old
* XMALLOC etc. were changed to MP_MALLOC etc.
author | Steffen Jaeckel <s@jaeckel.eu> |
---|---|
date | Tue, 26 May 2020 17:36:47 +0200 |
parents | f52919ffd3b1 |
children |
comparison
equal
deleted
inserted
replaced
1691:2d3745d58843 | 1692:1051e4eea25a |
---|---|
51 | 51 |
52 key = m_malloc(sizeof(*key)); | 52 key = m_malloc(sizeof(*key)); |
53 m_mp_alloc_init_multi(&key->e, &key->n, &key->d, &key->p, &key->q, NULL); | 53 m_mp_alloc_init_multi(&key->e, &key->n, &key->d, &key->p, &key->q, NULL); |
54 m_mp_init_multi(&pminus, &lcm, &qminus, NULL); | 54 m_mp_init_multi(&pminus, &lcm, &qminus, NULL); |
55 | 55 |
56 if (mp_set_int(key->e, RSA_E) != MP_OKAY) { | 56 mp_set_ul(key->e, RSA_E); |
57 fprintf(stderr, "RSA generation failed\n"); | |
58 exit(1); | |
59 } | |
60 | 57 |
61 while (1) { | 58 while (1) { |
62 getrsaprime(key->p, &pminus, key->e, size/16); | 59 getrsaprime(key->p, &pminus, key->e, size/16); |
63 getrsaprime(key->q, &qminus, key->e, size/16); | 60 getrsaprime(key->q, &qminus, key->e, size/16); |
64 | 61 |