Mercurial > dropbear
comparison genrsa.c @ 511:582cb38e4eb5 insecure-nocrypto
propagate from branch 'au.asn.ucc.matt.dropbear' (head cdcc3c729e29544e8b98a408e2dc60e4483dfd2a)
to branch 'au.asn.ucc.matt.dropbear.insecure-nocrypto' (head 0ca38a1cf349f7426ac9de34ebe4c3e3735effab)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 06 Nov 2008 13:16:55 +0000 |
parents | 657c045054ab |
children | b50f0107e505 76097ec1a29a |
comparison
equal
deleted
inserted
replaced
361:461c4b1fb35f | 511:582cb38e4eb5 |
---|---|
60 if (mp_set_int(key->e, RSA_E) != MP_OKAY) { | 60 if (mp_set_int(key->e, RSA_E) != MP_OKAY) { |
61 fprintf(stderr, "rsa generation failed\n"); | 61 fprintf(stderr, "rsa generation failed\n"); |
62 exit(1); | 62 exit(1); |
63 } | 63 } |
64 | 64 |
65 /* PuTTY doesn't like it if the modulus isn't a multiple of 8 bits, | |
66 * so we just generate them until we get one which is OK */ | |
67 getrsaprime(key->p, &pminus, key->e, size/2); | 65 getrsaprime(key->p, &pminus, key->e, size/2); |
68 do { | 66 getrsaprime(key->q, &qminus, key->e, size/2); |
69 getrsaprime(key->q, &qminus, key->e, size/2); | |
70 | 67 |
71 if (mp_mul(key->p, key->q, key->n) != MP_OKAY) { | 68 if (mp_mul(key->p, key->q, key->n) != MP_OKAY) { |
72 fprintf(stderr, "rsa generation failed\n"); | 69 fprintf(stderr, "rsa generation failed\n"); |
73 exit(1); | 70 exit(1); |
74 } | 71 } |
75 } while (mp_count_bits(key->n) % 8 != 0); | |
76 | 72 |
77 /* lcm(p-1, q-1) */ | 73 /* lcm(p-1, q-1) */ |
78 if (mp_lcm(&pminus, &qminus, &lcm) != MP_OKAY) { | 74 if (mp_lcm(&pminus, &qminus, &lcm) != MP_OKAY) { |
79 fprintf(stderr, "rsa generation failed\n"); | 75 fprintf(stderr, "rsa generation failed\n"); |
80 exit(1); | 76 exit(1); |