123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405 |
- /*
- * RSA implementation just sufficient for ssh client-side
- * initialisation step
- *
- * Rewritten for more speed by Joris van Rantwijk, Jun 1999.
- */
- #include <stdio.h>
- #include <stdlib.h>
- #include <string.h>
- #include "ssh.h"
- typedef unsigned short *Bignum;
- static unsigned short Zero[1] = { 0 };
- #if defined TESTMODE || defined RSADEBUG
- #ifndef DLVL
- #define DLVL 10000
- #endif
- #define debug(x) bndebug(#x,x)
- static int level = 0;
- static void bndebug(char *name, Bignum b) {
- int i;
- int w = 50-level-strlen(name)-5*b[0];
- if (level >= DLVL)
- return;
- if (w < 0) w = 0;
- dprintf("%*s%s%*s", level, "", name, w, "");
- for (i=b[0]; i>0; i--)
- dprintf(" %04x", b[i]);
- dprintf("\n");
- }
- #define dmsg(x) do {if(level<DLVL){dprintf("%*s",level,"");printf x;}} while(0)
- #define enter(x) do { dmsg(x); level += 4; } while(0)
- #define leave(x) do { level -= 4; dmsg(x); } while(0)
- #else
- #define debug(x)
- #define dmsg(x)
- #define enter(x)
- #define leave(x)
- #endif
- static Bignum newbn(int length) {
- Bignum b = malloc((length+1)*sizeof(unsigned short));
- if (!b)
- abort(); /* FIXME */
- b[0] = length;
- return b;
- }
- static void freebn(Bignum b) {
- free(b);
- }
- /*
- * Compute c = a * b.
- * Input is in the first len words of a and b.
- * Result is returned in the first 2*len words of c.
- */
- static void bigmul(unsigned short *a, unsigned short *b, unsigned short *c,
- int len)
- {
- int i, j;
- unsigned long ai, t;
- for (j = len - 1; j >= 0; j--)
- c[j+len] = 0;
- for (i = len - 1; i >= 0; i--) {
- ai = a[i];
- t = 0;
- for (j = len - 1; j >= 0; j--) {
- t += ai * (unsigned long) b[j];
- t += (unsigned long) c[i+j+1];
- c[i+j+1] = (unsigned short)t;
- t = t >> 16;
- }
- c[i] = (unsigned short)t;
- }
- }
- /*
- * Compute a = a % m.
- * Input in first 2*len words of a and first len words of m.
- * Output in first 2*len words of a (of which first len words will be zero).
- * The MSW of m MUST have its high bit set.
- */
- static void bigmod(unsigned short *a, unsigned short *m, int len)
- {
- unsigned short m0, m1;
- unsigned int h;
- int i, k;
- /* Special case for len == 1 */
- if (len == 1) {
- a[1] = (((long) a[0] << 16) + a[1]) % m[0];
- a[0] = 0;
- return;
- }
- m0 = m[0];
- m1 = m[1];
- for (i = 0; i <= len; i++) {
- unsigned long t;
- unsigned int q, r, c;
- if (i == 0) {
- h = 0;
- } else {
- h = a[i-1];
- a[i-1] = 0;
- }
- /* Find q = h:a[i] / m0 */
- t = ((unsigned long) h << 16) + a[i];
- q = t / m0;
- r = t % m0;
- /* Refine our estimate of q by looking at
- h:a[i]:a[i+1] / m0:m1 */
- t = (long) m1 * (long) q;
- if (t > ((unsigned long) r << 16) + a[i+1]) {
- q--;
- t -= m1;
- r = (r + m0) & 0xffff; /* overflow? */
- if (r >= (unsigned long)m0 &&
- t > ((unsigned long) r << 16) + a[i+1])
- q--;
- }
- /* Substract q * m from a[i...] */
- c = 0;
- for (k = len - 1; k >= 0; k--) {
- t = (long) q * (long) m[k];
- t += c;
- c = t >> 16;
- if ((unsigned short) t > a[i+k]) c++;
- a[i+k] -= (unsigned short) t;
- }
- /* Add back m in case of borrow */
- if (c != h) {
- t = 0;
- for (k = len - 1; k >= 0; k--) {
- t += m[k];
- t += a[i+k];
- a[i+k] = (unsigned short)t;
- t = t >> 16;
- }
- }
- }
- }
- /*
- * Compute (base ^ exp) % mod.
- * The base MUST be smaller than the modulus.
- * The most significant word of mod MUST be non-zero.
- * We assume that the result array is the same size as the mod array.
- */
- static void modpow(Bignum base, Bignum exp, Bignum mod, Bignum result)
- {
- unsigned short *a, *b, *n, *m;
- int mshift;
- int mlen, i, j;
- /* Allocate m of size mlen, copy mod to m */
- /* We use big endian internally */
- mlen = mod[0];
- m = malloc(mlen * sizeof(unsigned short));
- for (j = 0; j < mlen; j++) m[j] = mod[mod[0] - j];
- /* Shift m left to make msb bit set */
- for (mshift = 0; mshift < 15; mshift++)
- if ((m[0] << mshift) & 0x8000) break;
- if (mshift) {
- for (i = 0; i < mlen - 1; i++)
- m[i] = (m[i] << mshift) | (m[i+1] >> (16-mshift));
- m[mlen-1] = m[mlen-1] << mshift;
- }
- /* Allocate n of size mlen, copy base to n */
- n = malloc(mlen * sizeof(unsigned short));
- i = mlen - base[0];
- for (j = 0; j < i; j++) n[j] = 0;
- for (j = 0; j < base[0]; j++) n[i+j] = base[base[0] - j];
- /* Allocate a and b of size 2*mlen. Set a = 1 */
- a = malloc(2 * mlen * sizeof(unsigned short));
- b = malloc(2 * mlen * sizeof(unsigned short));
- for (i = 0; i < 2*mlen; i++) a[i] = 0;
- a[2*mlen-1] = 1;
- /* Skip leading zero bits of exp. */
- i = 0; j = 15;
- while (i < exp[0] && (exp[exp[0] - i] & (1 << j)) == 0) {
- j--;
- if (j < 0) { i++; j = 15; }
- }
- /* Main computation */
- while (i < exp[0]) {
- while (j >= 0) {
- bigmul(a + mlen, a + mlen, b, mlen);
- bigmod(b, m, mlen);
- if ((exp[exp[0] - i] & (1 << j)) != 0) {
- bigmul(b + mlen, n, a, mlen);
- bigmod(a, m, mlen);
- } else {
- unsigned short *t;
- t = a; a = b; b = t;
- }
- j--;
- }
- i++; j = 15;
- }
- /* Fixup result in case the modulus was shifted */
- if (mshift) {
- for (i = mlen - 1; i < 2*mlen - 1; i++)
- a[i] = (a[i] << mshift) | (a[i+1] >> (16-mshift));
- a[2*mlen-1] = a[2*mlen-1] << mshift;
- bigmod(a, m, mlen);
- for (i = 2*mlen - 1; i >= mlen; i--)
- a[i] = (a[i] >> mshift) | (a[i-1] << (16-mshift));
- }
- /* Copy result to buffer */
- for (i = 0; i < mlen; i++)
- result[result[0] - i] = a[i+mlen];
- /* Free temporary arrays */
- for (i = 0; i < 2*mlen; i++) a[i] = 0; free(a);
- for (i = 0; i < 2*mlen; i++) b[i] = 0; free(b);
- for (i = 0; i < mlen; i++) m[i] = 0; free(m);
- for (i = 0; i < mlen; i++) n[i] = 0; free(n);
- }
- int makekey(unsigned char *data, struct RSAKey *result,
- unsigned char **keystr) {
- unsigned char *p = data;
- Bignum bn[2];
- int i, j;
- int w, b;
- result->bits = 0;
- for (i=0; i<4; i++)
- result->bits = (result->bits << 8) + *p++;
- for (j=0; j<2; j++) {
- w = 0;
- for (i=0; i<2; i++)
- w = (w << 8) + *p++;
- result->bytes = b = (w+7)/8; /* bits -> bytes */
- w = (w+15)/16; /* bits -> words */
- bn[j] = newbn(w);
- if (keystr) *keystr = p; /* point at key string, second time */
- for (i=1; i<=w; i++)
- bn[j][i] = 0;
- for (i=b; i-- ;) {
- unsigned char byte = *p++;
- if (i & 1)
- bn[j][1+i/2] |= byte<<8;
- else
- bn[j][1+i/2] |= byte;
- }
- debug(bn[j]);
- }
- result->exponent = bn[0];
- result->modulus = bn[1];
- return p - data;
- }
- void rsaencrypt(unsigned char *data, int length, struct RSAKey *key) {
- Bignum b1, b2;
- int w, i;
- unsigned char *p;
- debug(key->exponent);
- memmove(data+key->bytes-length, data, length);
- data[0] = 0;
- data[1] = 2;
- for (i = 2; i < key->bytes-length-1; i++) {
- do {
- data[i] = random_byte();
- } while (data[i] == 0);
- }
- data[key->bytes-length-1] = 0;
- w = (key->bytes+1)/2;
- b1 = newbn(w);
- b2 = newbn(w);
- p = data;
- for (i=1; i<=w; i++)
- b1[i] = 0;
- for (i=key->bytes; i-- ;) {
- unsigned char byte = *p++;
- if (i & 1)
- b1[1+i/2] |= byte<<8;
- else
- b1[1+i/2] |= byte;
- }
- debug(b1);
- modpow(b1, key->exponent, key->modulus, b2);
- debug(b2);
- p = data;
- for (i=key->bytes; i-- ;) {
- unsigned char b;
- if (i & 1)
- b = b2[1+i/2] >> 8;
- else
- b = b2[1+i/2] & 0xFF;
- *p++ = b;
- }
- freebn(b1);
- freebn(b2);
- }
- int rsastr_len(struct RSAKey *key) {
- Bignum md, ex;
- md = key->modulus;
- ex = key->exponent;
- return 4 * (ex[0]+md[0]) + 10;
- }
- void rsastr_fmt(char *str, struct RSAKey *key) {
- Bignum md, ex;
- int len = 0, i;
- md = key->modulus;
- ex = key->exponent;
- for (i=1; i<=ex[0]; i++) {
- sprintf(str+len, "%04x", ex[i]);
- len += strlen(str+len);
- }
- str[len++] = '/';
- for (i=1; i<=md[0]; i++) {
- sprintf(str+len, "%04x", md[i]);
- len += strlen(str+len);
- }
- str[len] = '\0';
- }
- #ifdef TESTMODE
- #ifndef NODDY
- #define p1 10007
- #define p2 10069
- #define p3 10177
- #else
- #define p1 3
- #define p2 7
- #define p3 13
- #endif
- unsigned short P1[2] = { 1, p1 };
- unsigned short P2[2] = { 1, p2 };
- unsigned short P3[2] = { 1, p3 };
- unsigned short bigmod[5] = { 4, 0, 0, 0, 32768U };
- unsigned short mod[5] = { 4, 0, 0, 0, 0 };
- unsigned short a[5] = { 4, 0, 0, 0, 0 };
- unsigned short b[5] = { 4, 0, 0, 0, 0 };
- unsigned short c[5] = { 4, 0, 0, 0, 0 };
- unsigned short One[2] = { 1, 1 };
- unsigned short Two[2] = { 1, 2 };
- int main(void) {
- modmult(P1, P2, bigmod, a); debug(a);
- modmult(a, P3, bigmod, mod); debug(mod);
- sub(P1, One, a); debug(a);
- sub(P2, One, b); debug(b);
- modmult(a, b, bigmod, c); debug(c);
- sub(P3, One, a); debug(a);
- modmult(a, c, bigmod, b); debug(b);
- modpow(Two, b, mod, a); debug(a);
- return 0;
- }
- #endif
|