a09221f83c
(instead of just mitigating through connection limits) the Bleichenbacher attack which can lead to guessing of the server key (not host key) by regenerating it when an RSA failure is detected. Reviewed by: rwatson
38 lines
1.1 KiB
C
38 lines
1.1 KiB
C
/*
|
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
* All rights reserved
|
|
* RSA key generation, encryption and decryption.
|
|
*
|
|
* As far as I am concerned, the code I have written for this software
|
|
* can be used freely for any purpose. Any derived versions of this
|
|
* software must be clearly marked as such, and if the derived work is
|
|
* incompatible with the protocol description in the RFC file, it must be
|
|
* called by a name other than "ssh" or "Secure Shell".
|
|
*/
|
|
|
|
/* RCSID("$OpenBSD: rsa.h,v 1.8 2000/09/07 20:27:53 deraadt Exp $"); */
|
|
/* $FreeBSD$ */
|
|
|
|
#ifndef RSA_H
|
|
#define RSA_H
|
|
|
|
#include <openssl/bn.h>
|
|
#include <openssl/rsa.h>
|
|
|
|
/* Calls SSL RSA_generate_key, only copies to prv and pub */
|
|
void rsa_generate_key(RSA * prv, RSA * pub, unsigned int bits);
|
|
|
|
/*
|
|
* Indicates whether the rsa module is permitted to show messages on the
|
|
* terminal.
|
|
*/
|
|
void rsa_set_verbose __P((int verbose));
|
|
|
|
int rsa_alive __P((void));
|
|
|
|
void rsa_public_encrypt __P((BIGNUM * out, BIGNUM * in, RSA * prv));
|
|
int rsa_private_decrypt __P((BIGNUM * out, BIGNUM * in, RSA * prv));
|
|
|
|
#endif /* RSA_H */
|