1
0
mirror of https://git.tartarus.org/simon/putty.git synced 2025-07-15 10:07:39 -05:00

Tidy up the API for RSA key exchange.

ssh_rsakex_encrypt took an input (pointer, length) pair, which I've
replaced with a ptrlen; it also took an _output_ (pointer, length)
pair, and then re-computed the right length internally and enforced by
assertion that the one passed in matched it. Now it just returns a
strbuf of whatever length it computed, which saves the caller having
to compute the length at all.

Also, both ssh_rsakex_encrypt and ssh_rsakex_decrypt took their
arguments in a weird order; I think it looks more sensible to put the
RSA key first rather than last, so now they both have the common order
(key, hash, input data).
This commit is contained in:
Simon Tatham
2019-01-02 08:39:16 +00:00
parent a2d1c211a7
commit 2bd76ed88c
4 changed files with 21 additions and 25 deletions

View File

@ -743,9 +743,8 @@ static void oaep_mask(const struct ssh_hashalg *h, void *seed, int seedlen,
}
}
void ssh_rsakex_encrypt(const struct ssh_hashalg *h,
unsigned char *in, int inlen,
unsigned char *out, int outlen, struct RSAKey *rsa)
strbuf *ssh_rsakex_encrypt(
struct RSAKey *rsa, const struct ssh_hashalg *h, ptrlen in)
{
mp_int *b1, *b2;
int k, i;
@ -783,10 +782,12 @@ void ssh_rsakex_encrypt(const struct ssh_hashalg *h,
k = (7 + mp_get_nbits(rsa->modulus)) / 8;
/* The length of the input data must be at most k - 2hLen - 2. */
assert(inlen > 0 && inlen <= k - 2*HLEN - 2);
assert(in.len > 0 && in.len <= k - 2*HLEN - 2);
/* The length of the output data wants to be precisely k. */
assert(outlen == k);
strbuf *toret = strbuf_new();
int outlen = k;
unsigned char *out = strbuf_append(toret, outlen);
/*
* Now perform EME-OAEP encoding. First set up all the unmasked
@ -806,8 +807,8 @@ void ssh_rsakex_encrypt(const struct ssh_hashalg *h,
/* A bunch of zero octets */
memset(out + 2*HLEN + 1, 0, outlen - (2*HLEN + 1));
/* A single 1 octet, followed by the input message data. */
out[outlen - inlen - 1] = 1;
memcpy(out + outlen - inlen, in, inlen);
out[outlen - in.len - 1] = 1;
memcpy(out + outlen - in.len, in.ptr, in.len);
/*
* Now use the seed data to mask the block DB.
@ -835,10 +836,11 @@ void ssh_rsakex_encrypt(const struct ssh_hashalg *h,
/*
* And we're done.
*/
return toret;
}
mp_int *ssh_rsakex_decrypt(const struct ssh_hashalg *h, ptrlen ciphertext,
struct RSAKey *rsa)
mp_int *ssh_rsakex_decrypt(
struct RSAKey *rsa, const struct ssh_hashalg *h, ptrlen ciphertext)
{
mp_int *b1, *b2;
int outlen, i;