diff options
author | Steffen Jaeckel <s@jaeckel.eu> | 2020-05-26 17:36:47 +0200 |
---|---|---|
committer | Steffen Jaeckel <s@jaeckel.eu> | 2020-05-26 17:36:47 +0200 |
commit | 4f11c927dfb74496017fd1d2e2b18e3afb2a93fd (patch) | |
tree | b448865b4989998f041b159bd913b79542f8623a /genrsa.c | |
parent | 1de4c3c6588830f9c2c4c7236596f5e0c639e588 (diff) | |
download | dropbear-4f11c927dfb74496017fd1d2e2b18e3afb2a93fd.tar.gz |
Update LibTomMath to 1.2.0 (#84)
* update C files
* update other files
* update headers
* update makefiles
* remove mp_set/get_double()
* use ltm 1.2.0 API
* update ltm_desc
* use bundled tommath if system-tommath is too old
* XMALLOC etc. were changed to MP_MALLOC etc.
Diffstat (limited to 'genrsa.c')
-rw-r--r-- | genrsa.c | 5 |
1 files changed, 1 insertions, 4 deletions
@@ -53,10 +53,7 @@ dropbear_rsa_key * gen_rsa_priv_key(unsigned int size) { m_mp_alloc_init_multi(&key->e, &key->n, &key->d, &key->p, &key->q, NULL); m_mp_init_multi(&pminus, &lcm, &qminus, NULL); - if (mp_set_int(key->e, RSA_E) != MP_OKAY) { - fprintf(stderr, "RSA generation failed\n"); - exit(1); - } + mp_set_ul(key->e, RSA_E); while (1) { getrsaprime(key->p, &pminus, key->e, size/16); |