diff options
author | lloyd <[email protected]> | 2007-03-04 02:56:42 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2007-03-04 02:56:42 +0000 |
commit | ccfb07634f621dcd336814ab25271742d191461d (patch) | |
tree | f049b5bd64b53439ad69cbe798a64f3747d56038 | |
parent | e4d501374fb23572727da8f01370fe9c1d803155 (diff) |
Introduce a class Seed which represents the domain parameter seed, rather
than using an unadorned buffer with the increment() function.
-rw-r--r-- | src/dsa_gen.cpp | 45 |
1 files changed, 30 insertions, 15 deletions
diff --git a/src/dsa_gen.cpp b/src/dsa_gen.cpp index 4eecb146d..c4a4fceed 100644 --- a/src/dsa_gen.cpp +++ b/src/dsa_gen.cpp @@ -18,23 +18,13 @@ namespace Botan { namespace { /************************************************* -* Increment the seed by one * -*************************************************/ -void increment(SecureVector<byte>& seed) - { - for(u32bit j = seed.size(); j > 0; --j) - if(++seed[j-1]) - break; - } - -/************************************************* * Check if this size is allowed by FIPS 186-3 * *************************************************/ bool fips186_3_valid_size(u32bit pbits, u32bit qbits) { if(pbits == 1024 && qbits == 160) return true; - if(pbits == 2048 && qbits == 256) + if(pbits == 2048 && (qbits == 224 || qbits == 256)) return true; if(pbits == 3072 && qbits == 256) return true; @@ -55,6 +45,10 @@ bool DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, "FIPS 186-3 does not allow DSA domain parameters of " + to_string(pbits) + "/" + to_string(qbits) + " bits long"); + if(qbits == 224) + throw Invalid_Argument( + "DSA parameter generation with a q of 224 bits not supported"); + if(seed_c.size() * 8 < qbits) throw Invalid_Argument( "Generating a DSA parameter set with a " + to_string(qbits) + @@ -64,7 +58,26 @@ bool DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, const u32bit HASH_SIZE = hash->OUTPUT_LENGTH; - SecureVector<byte> seed = seed_c; + class Seed + { + public: + Seed(const MemoryRegion<byte>& s) : seed(s) {} + + operator MemoryRegion<byte>& () { return seed; } + + Seed& operator++() + { + for(u32bit j = seed.size(); j > 0; --j) + if(++seed[j-1]) + break; + return (*this); + } + private: + SecureVector<byte> seed; + + }; + + Seed seed(seed_c); q.binary_decode(hash->process(seed)); q.set_bit(qbits-1); @@ -75,7 +88,8 @@ bool DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, global_state().pulse(PRIME_FOUND); - const u32bit n = (pbits-1) / (HASH_SIZE * 8), b = (pbits-1) % (HASH_SIZE * 8); + const u32bit n = (pbits-1) / (HASH_SIZE * 8), + b = (pbits-1) % (HASH_SIZE * 8); BigInt X; SecureVector<byte> V(HASH_SIZE * (n+1)); @@ -86,12 +100,13 @@ bool DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, for(u32bit k = 0; k <= n; ++k) { - increment(seed); + ++seed; hash->update(seed); hash->final(V + HASH_SIZE * (n-k)); } - X.binary_decode(V + (HASH_SIZE - 1 - b/8), V.size() - (HASH_SIZE - 1 - b/8)); + X.binary_decode(V + (HASH_SIZE - 1 - b/8), + V.size() - (HASH_SIZE - 1 - b/8)); X.set_bit(pbits-1); p = X - (X % (2*q) - 1); |