diff options
Diffstat (limited to 'other/openssh-2.1.1p4/rsa.c')
| -rw-r--r-- | other/openssh-2.1.1p4/rsa.c | 191 |
1 files changed, 0 insertions, 191 deletions
diff --git a/other/openssh-2.1.1p4/rsa.c b/other/openssh-2.1.1p4/rsa.c deleted file mode 100644 index 46ad6b6..0000000 --- a/other/openssh-2.1.1p4/rsa.c +++ /dev/null | |||
| @@ -1,191 +0,0 @@ | |||
| 1 | /* | ||
| 2 | * | ||
| 3 | * rsa.c | ||
| 4 | * | ||
| 5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | ||
| 6 | * | ||
| 7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | ||
| 8 | * All rights reserved | ||
| 9 | * | ||
| 10 | * Created: Fri Mar 3 22:07:06 1995 ylo | ||
| 11 | * | ||
| 12 | * Description of the RSA algorithm can be found e.g. from the following sources: | ||
| 13 | * | ||
| 14 | * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994. | ||
| 15 | * | ||
| 16 | * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to | ||
| 17 | * Computer Security. Prentice-Hall, 1989. | ||
| 18 | * | ||
| 19 | * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill, | ||
| 20 | * 1994. | ||
| 21 | * | ||
| 22 | * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications | ||
| 23 | * System and Method. US Patent 4,405,829, 1983. | ||
| 24 | * | ||
| 25 | * Hans Riesel: Prime Numbers and Computer Methods for Factorization. | ||
| 26 | * Birkhauser, 1994. | ||
| 27 | * | ||
| 28 | * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995. | ||
| 29 | * | ||
| 30 | * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as included | ||
| 31 | * below: | ||
| 32 | * | ||
| 33 | * [gone - had to be deleted - what a pity] | ||
| 34 | * | ||
| 35 | */ | ||
| 36 | |||
| 37 | #include "includes.h" | ||
| 38 | RCSID("$OpenBSD: rsa.c,v 1.15 2000/06/20 01:39:44 markus Exp $"); | ||
| 39 | |||
| 40 | #include "rsa.h" | ||
| 41 | #include "ssh.h" | ||
| 42 | #include "xmalloc.h" | ||
| 43 | #include "entropy.h" | ||
| 44 | |||
| 45 | int rsa_verbose = 1; | ||
| 46 | |||
| 47 | int | ||
| 48 | rsa_alive() | ||
| 49 | { | ||
| 50 | RSA *key; | ||
| 51 | |||
| 52 | seed_rng(); | ||
| 53 | key = RSA_generate_key(32, 3, NULL, NULL); | ||
| 54 | if (key == NULL) | ||
| 55 | return (0); | ||
| 56 | RSA_free(key); | ||
| 57 | return (1); | ||
| 58 | } | ||
| 59 | |||
| 60 | /* | ||
| 61 | * Key generation progress meter callback | ||
| 62 | */ | ||
| 63 | void | ||
| 64 | keygen_progress(int p, int n, void *arg) | ||
| 65 | { | ||
| 66 | const char progress_chars[] = ".o+O?"; | ||
| 67 | |||
| 68 | if ((p < 0) || (p > (sizeof(progress_chars) - 2))) | ||
| 69 | p = sizeof(progress_chars) - 2; | ||
| 70 | |||
| 71 | putchar(progress_chars[p]); | ||
| 72 | fflush(stdout); | ||
| 73 | } | ||
| 74 | |||
| 75 | /* | ||
| 76 | * Generates RSA public and private keys. This initializes the data | ||
| 77 | * structures; they should be freed with rsa_clear_private_key and | ||
| 78 | * rsa_clear_public_key. | ||
| 79 | */ | ||
| 80 | |||
| 81 | void | ||
| 82 | rsa_generate_key(RSA *prv, RSA *pub, unsigned int bits) | ||
| 83 | { | ||
| 84 | RSA *key; | ||
| 85 | |||
| 86 | seed_rng(); | ||
| 87 | |||
| 88 | if (rsa_verbose) { | ||
| 89 | printf("Generating RSA keys: "); | ||
| 90 | fflush(stdout); | ||
| 91 | key = RSA_generate_key(bits, 35, keygen_progress, NULL); | ||
| 92 | printf("\n"); | ||
| 93 | } else { | ||
| 94 | key = RSA_generate_key(bits, 35, NULL, NULL); | ||
| 95 | } | ||
| 96 | if (key == NULL) | ||
| 97 | fatal("rsa_generate_key: key generation failed."); | ||
| 98 | |||
| 99 | /* Copy public key parameters */ | ||
| 100 | pub->n = BN_new(); | ||
| 101 | BN_copy(pub->n, key->n); | ||
| 102 | pub->e = BN_new(); | ||
| 103 | BN_copy(pub->e, key->e); | ||
| 104 | |||
| 105 | /* Copy private key parameters */ | ||
| 106 | prv->n = BN_new(); | ||
| 107 | BN_copy(prv->n, key->n); | ||
| 108 | prv->e = BN_new(); | ||
| 109 | BN_copy(prv->e, key->e); | ||
| 110 | prv->d = BN_new(); | ||
| 111 | BN_copy(prv->d, key->d); | ||
| 112 | prv->p = BN_new(); | ||
| 113 | BN_copy(prv->p, key->p); | ||
| 114 | prv->q = BN_new(); | ||
| 115 | BN_copy(prv->q, key->q); | ||
| 116 | |||
| 117 | prv->dmp1 = BN_new(); | ||
| 118 | BN_copy(prv->dmp1, key->dmp1); | ||
| 119 | |||
| 120 | prv->dmq1 = BN_new(); | ||
| 121 | BN_copy(prv->dmq1, key->dmq1); | ||
| 122 | |||
| 123 | prv->iqmp = BN_new(); | ||
| 124 | BN_copy(prv->iqmp, key->iqmp); | ||
| 125 | |||
| 126 | RSA_free(key); | ||
| 127 | |||
| 128 | if (rsa_verbose) | ||
| 129 | printf("Key generation complete.\n"); | ||
| 130 | } | ||
| 131 | |||
| 132 | void | ||
| 133 | rsa_public_encrypt(BIGNUM *out, BIGNUM *in, RSA *key) | ||
| 134 | { | ||
| 135 | unsigned char *inbuf, *outbuf; | ||
| 136 | int len, ilen, olen; | ||
| 137 | |||
| 138 | if (BN_num_bits(key->e) < 2 || !BN_is_odd(key->e)) | ||
| 139 | fatal("rsa_public_encrypt() exponent too small or not odd"); | ||
| 140 | |||
| 141 | olen = BN_num_bytes(key->n); | ||
| 142 | outbuf = xmalloc(olen); | ||
| 143 | |||
| 144 | ilen = BN_num_bytes(in); | ||
| 145 | inbuf = xmalloc(ilen); | ||
| 146 | BN_bn2bin(in, inbuf); | ||
| 147 | |||
| 148 | if ((len = RSA_public_encrypt(ilen, inbuf, outbuf, key, | ||
| 149 | RSA_PKCS1_PADDING)) <= 0) | ||
| 150 | fatal("rsa_public_encrypt() failed"); | ||
| 151 | |||
| 152 | BN_bin2bn(outbuf, len, out); | ||
| 153 | |||
| 154 | memset(outbuf, 0, olen); | ||
| 155 | memset(inbuf, 0, ilen); | ||
| 156 | xfree(outbuf); | ||
| 157 | xfree(inbuf); | ||
| 158 | } | ||
| 159 | |||
| 160 | void | ||
| 161 | rsa_private_decrypt(BIGNUM *out, BIGNUM *in, RSA *key) | ||
| 162 | { | ||
| 163 | unsigned char *inbuf, *outbuf; | ||
| 164 | int len, ilen, olen; | ||
| 165 | |||
| 166 | olen = BN_num_bytes(key->n); | ||
| 167 | outbuf = xmalloc(olen); | ||
| 168 | |||
| 169 | ilen = BN_num_bytes(in); | ||
| 170 | inbuf = xmalloc(ilen); | ||
| 171 | BN_bn2bin(in, inbuf); | ||
| 172 | |||
| 173 | if ((len = RSA_private_decrypt(ilen, inbuf, outbuf, key, | ||
| 174 | RSA_PKCS1_PADDING)) <= 0) | ||
| 175 | fatal("rsa_private_decrypt() failed"); | ||
| 176 | |||
| 177 | BN_bin2bn(outbuf, len, out); | ||
| 178 | |||
| 179 | memset(outbuf, 0, olen); | ||
| 180 | memset(inbuf, 0, ilen); | ||
| 181 | xfree(outbuf); | ||
| 182 | xfree(inbuf); | ||
| 183 | } | ||
| 184 | |||
| 185 | /* Set whether to output verbose messages during key generation. */ | ||
| 186 | |||
| 187 | void | ||
| 188 | rsa_set_verbose(int verbose) | ||
| 189 | { | ||
| 190 | rsa_verbose = verbose; | ||
| 191 | } | ||
