/* * RSA implementation just sufficient for ssh client-side * initialisation step * * Rewritten for more speed by Joris van Rantwijk, Jun 1999. */ #include #include #include #if defined TESTMODE || defined RSADEBUG #ifndef DLVL #define DLVL 10000 #endif #define debug(x) bndebug(#x,x) static int level = 0; static void bndebug(char *name, Bignum b) { int i; int w = 50-level-strlen(name)-5*b[0]; if (level >= DLVL) return; if (w < 0) w = 0; dprintf("%*s%s%*s", level, "", name, w, ""); for (i=b[0]; i>0; i--) dprintf(" %04x", b[i]); dprintf("\n"); } #define dmsg(x) do {if(levelbits = 0; for (i=0; i<4; i++) result->bits = (result->bits << 8) + *p++; /* * order=0 means exponent then modulus (the keys sent by the * server). order=1 means modulus then exponent (the keys * stored in a keyfile). */ if (order == 0) p += ssh1_read_bignum(p, &result->exponent); result->bytes = (((p[0] << 8) + p[1]) + 7) / 8; if (keystr) *keystr = p+2; p += ssh1_read_bignum(p, &result->modulus); if (order == 1) p += ssh1_read_bignum(p, &result->exponent); return p - data; } int makeprivate(unsigned char *data, struct RSAKey *result) { return ssh1_read_bignum(data, &result->private_exponent); } void rsaencrypt(unsigned char *data, int length, struct RSAKey *key) { Bignum b1, b2; int w, i; unsigned char *p; debug(key->exponent); memmove(data+key->bytes-length, data, length); data[0] = 0; data[1] = 2; for (i = 2; i < key->bytes-length-1; i++) { do { data[i] = random_byte(); } while (data[i] == 0); } data[key->bytes-length-1] = 0; w = (key->bytes+1)/2; b1 = newbn(w); b2 = newbn(w); p = data; for (i=1; i<=w; i++) b1[i] = 0; for (i=key->bytes; i-- ;) { unsigned char byte = *p++; if (i & 1) b1[1+i/2] |= byte<<8; else b1[1+i/2] |= byte; } debug(b1); modpow(b1, key->exponent, key->modulus, b2); debug(b2); p = data; for (i=key->bytes; i-- ;) { unsigned char b; if (i & 1) b = b2[1+i/2] >> 8; else b = b2[1+i/2] & 0xFF; *p++ = b; } freebn(b1); freebn(b2); } Bignum rsadecrypt(Bignum input, struct RSAKey *key) { Bignum ret; ret = newbn(key->modulus[0]); modpow(input, key->private_exponent, key->modulus, ret); return ret; } int rsastr_len(struct RSAKey *key) { Bignum md, ex; md = key->modulus; ex = key->exponent; return 4 * (ex[0]+md[0]) + 10; } void rsastr_fmt(char *str, struct RSAKey *key) { Bignum md, ex; int len = 0, i; md = key->modulus; ex = key->exponent; for (i=1; i<=ex[0]; i++) { sprintf(str+len, "%04x", ex[i]); len += strlen(str+len); } str[len++] = '/'; for (i=1; i<=md[0]; i++) { sprintf(str+len, "%04x", md[i]); len += strlen(str+len); } str[len] = '\0'; } void freersakey(struct RSAKey *key) { if (key->modulus) freebn(key->modulus); if (key->exponent) freebn(key->exponent); if (key->private_exponent) freebn(key->private_exponent); if (key->comment) free(key->comment); } #ifdef TESTMODE #ifndef NODDY #define p1 10007 #define p2 10069 #define p3 10177 #else #define p1 3 #define p2 7 #define p3 13 #endif unsigned short P1[2] = { 1, p1 }; unsigned short P2[2] = { 1, p2 }; unsigned short P3[2] = { 1, p3 }; unsigned short bigmod[5] = { 4, 0, 0, 0, 32768U }; unsigned short mod[5] = { 4, 0, 0, 0, 0 }; unsigned short a[5] = { 4, 0, 0, 0, 0 }; unsigned short b[5] = { 4, 0, 0, 0, 0 }; unsigned short c[5] = { 4, 0, 0, 0, 0 }; unsigned short One[2] = { 1, 1 }; unsigned short Two[2] = { 1, 2 }; int main(void) { modmult(P1, P2, bigmod, a); debug(a); modmult(a, P3, bigmod, mod); debug(mod); sub(P1, One, a); debug(a); sub(P2, One, b); debug(b); modmult(a, b, bigmod, c); debug(c); sub(P3, One, a); debug(a); modmult(a, c, bigmod, b); debug(b); modpow(Two, b, mod, a); debug(a); return 0; } #endif