| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162 | /* * Copyright 2002-2020 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the Apache License 2.0 (the "License").  You may not use * this file except in compliance with the License.  You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html *//* * NB: This file contains deprecated functions (compatibility wrappers to the * "new" versions). *//* * RSA low level APIs are deprecated for public use, but still ok for * internal use. */#include "internal/deprecated.h"#include <openssl/opensslconf.h>#include <stdio.h>#include <time.h>#include "internal/cryptlib.h"#include <openssl/bn.h>#include <openssl/rsa.h>RSA *RSA_generate_key(int bits, unsigned long e_value,                      void (*callback) (int, int, void *), void *cb_arg){    int i;    BN_GENCB *cb = BN_GENCB_new();    RSA *rsa = RSA_new();    BIGNUM *e = BN_new();    if (cb == NULL || rsa == NULL || e == NULL)        goto err;    /*     * The problem is when building with 8, 16, or 32 BN_ULONG, unsigned long     * can be larger     */    for (i = 0; i < (int)sizeof(unsigned long) * 8; i++) {        if (e_value & (1UL << i))            if (BN_set_bit(e, i) == 0)                goto err;    }    BN_GENCB_set_old(cb, callback, cb_arg);    if (RSA_generate_key_ex(rsa, bits, e, cb)) {        BN_free(e);        BN_GENCB_free(cb);        return rsa;    } err:    BN_free(e);    RSA_free(rsa);    BN_GENCB_free(cb);    return 0;}
 |