comparison genrsa.c @ 511:582cb38e4eb5 insecure-nocrypto

propagate from branch 'au.asn.ucc.matt.dropbear' (head cdcc3c729e29544e8b98a408e2dc60e4483dfd2a) to branch 'au.asn.ucc.matt.dropbear.insecure-nocrypto' (head 0ca38a1cf349f7426ac9de34ebe4c3e3735effab)
author Matt Johnston <matt@ucc.asn.au>
date Thu, 06 Nov 2008 13:16:55 +0000
parents 657c045054ab
children b50f0107e505 76097ec1a29a
comparison
equal deleted inserted replaced
361:461c4b1fb35f 511:582cb38e4eb5
60 if (mp_set_int(key->e, RSA_E) != MP_OKAY) { 60 if (mp_set_int(key->e, RSA_E) != MP_OKAY) {
61 fprintf(stderr, "rsa generation failed\n"); 61 fprintf(stderr, "rsa generation failed\n");
62 exit(1); 62 exit(1);
63 } 63 }
64 64
65 /* PuTTY doesn't like it if the modulus isn't a multiple of 8 bits,
66 * so we just generate them until we get one which is OK */
67 getrsaprime(key->p, &pminus, key->e, size/2); 65 getrsaprime(key->p, &pminus, key->e, size/2);
68 do { 66 getrsaprime(key->q, &qminus, key->e, size/2);
69 getrsaprime(key->q, &qminus, key->e, size/2);
70 67
71 if (mp_mul(key->p, key->q, key->n) != MP_OKAY) { 68 if (mp_mul(key->p, key->q, key->n) != MP_OKAY) {
72 fprintf(stderr, "rsa generation failed\n"); 69 fprintf(stderr, "rsa generation failed\n");
73 exit(1); 70 exit(1);
74 } 71 }
75 } while (mp_count_bits(key->n) % 8 != 0);
76 72
77 /* lcm(p-1, q-1) */ 73 /* lcm(p-1, q-1) */
78 if (mp_lcm(&pminus, &qminus, &lcm) != MP_OKAY) { 74 if (mp_lcm(&pminus, &qminus, &lcm) != MP_OKAY) {
79 fprintf(stderr, "rsa generation failed\n"); 75 fprintf(stderr, "rsa generation failed\n");
80 exit(1); 76 exit(1);