2 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
3 * unrestricted use provided that this legend is included on all tape
4 * media and as a part of the software program in whole or part. Users
5 * may copy or modify Sun RPC without charge, but are not authorized
6 * to license or distribute it to anyone else except as part of a product or
7 * program developed by the user or with the express written consent of
8 * Sun Microsystems, Inc.
10 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
11 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
12 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 * Sun RPC is provided with no support and without any obligation on the
15 * part of Sun Microsystems, Inc. to assist in its use, correction,
16 * modification or enhancement.
18 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
19 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
20 * OR ANY PART THEREOF.
22 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
23 * or profits or other special, indirect and consequential damages, even if
24 * Sun has been advised of the possibility of such damages.
26 * Sun Microsystems, Inc.
28 * Mountain View, California 94043
30 * @(#)generic.c 1.2 91/03/11 Copyr 1986 Sun Micro
31 * $FreeBSD: src/usr.bin/newkey/generic.c,v 1.3.2.1 2001/07/04 22:32:20 kris Exp $
35 * Copyright (C) 1986, Sun Microsystems, Inc.
44 #include <openssl/bn.h>
45 #include <openssl/crypto.h>
46 #include <openssl/err.h>
49 #include <rpc/key_prot.h>
53 static void adjust(char[], char *);
54 static BIGNUM
*itobn(long i
);
60 getseed(char *seed
, int seedsize
, unsigned char *pass
)
64 for (i
= 0; i
< seedsize
; i
++) {
65 seed
[i
] = (arc4random() & 0xff) ^ pass
[i
% 8];
74 if ((n
= BN_new()) == NULL
)
75 errx(1, "could not create BIGNUM: %s",
76 ERR_error_string(ERR_get_error(), 0));
79 BN_add_word(n
, (u_long
)i
);
81 BN_sub_word(n
, (u_long
)(-i
));
86 * Generate a random public/secret key pair
89 genkeys(char *public, char *secret
, char *pass
)
91 #define BASEBITS (8*sizeof (short) - 1)
92 #define BASE (short)(1 << BASEBITS)
96 unsigned short seed
[KEYSIZE
/BASEBITS
+ 1];
100 BIGNUM
*pk
, *sk
, *tmp
, *base
, *root
, *modulus
;
108 if (BN_hex2bn(&modulus
, HEXMODULUS
) == 0)
109 errx(1, "could not convert modulus to BIGNUM: %s",
110 ERR_error_string(ERR_get_error(), 0));
112 if ((ctx
= BN_CTX_new()) == NULL
)
113 errx(1, "could not create BN_CTX: %s",
114 ERR_error_string(ERR_get_error(), 0));
116 getseed((char *)seed
, sizeof (seed
), (u_char
*)pass
);
117 for (i
= 0; i
< KEYSIZE
/BASEBITS
+ 1; i
++) {
121 BN_mul(sk
, base
, sk
, ctx
);
125 BN_div(tmp
, sk
, sk
, modulus
, ctx
);
126 BN_mod_exp(pk
, root
, sk
, modulus
, ctx
);
128 if ((xkey
= BN_bn2hex(sk
)) == NULL
)
129 errx(1, "could convert sk to hex: %s",
130 ERR_error_string(ERR_get_error(), 0));
131 adjust(secret
, xkey
);
134 if ((xkey
= BN_bn2hex(pk
)) == NULL
)
135 errx(1, "could convert pk to hex: %s",
136 ERR_error_string(ERR_get_error(), 0));
137 adjust(public, xkey
);
149 * Adjust the input key so that it is 0-filled on the left
152 adjust(char keyout
[HEXKEYBYTES
+1], char *keyin
)
157 for (p
= keyin
; *p
; p
++)
159 for (s
= keyout
+ HEXKEYBYTES
; p
>= keyin
; p
--, s
--) {
162 while (s
>= keyout
) {