/************************************************* * DSA Parameter Generation Source File * * (C) 1999-2007 The Botan Project * *************************************************/ #include #include #include #include #include #include #include #include #include namespace Botan { namespace { /************************************************* * Increment the seed by one * *************************************************/ void increment(SecureVector& seed) { for(u32bit j = seed.size(); j > 0; --j) if(++seed[j-1]) break; } /************************************************* * Check if this size is allowed by FIPS 186-3 * *************************************************/ bool fips186_3_valid_size(u32bit pbits, u32bit qbits) { if(pbits == 1024 && qbits == 160) return true; if(pbits == 2048 && qbits == 256) return true; if(pbits == 3072 && qbits == 256) return true; return false; } } /************************************************* * Attempt DSA prime generation with given seed * *************************************************/ bool DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, u32bit pbits, u32bit qbits, const MemoryRegion& seed_c) { if(!fips186_3_valid_size(pbits, qbits)) throw Invalid_Argument( "FIPS 186-3 does not allow DSA domain parameters of " + to_string(pbits) + "/" + to_string(qbits) + " bits long"); if(seed_c.size() * 8 < qbits) throw Invalid_Argument( "Generating a DSA parameter set with a " + to_string(qbits) + "long q requires a seed at least as many bits long"); std::auto_ptr hash(get_hash("SHA-" + to_string(qbits))); const u32bit HASH_SIZE = hash->OUTPUT_LENGTH; SecureVector seed = seed_c; q.binary_decode(hash->process(seed)); q.set_bit(qbits-1); q.set_bit(0); if(!is_prime(q)) return false; global_state().pulse(PRIME_FOUND); const u32bit n = (pbits-1) / (HASH_SIZE * 8), b = (pbits-1) % (HASH_SIZE * 8); BigInt X; SecureVector V(HASH_SIZE * (n+1)); for(u32bit j = 0; j != 4096; ++j) { global_state().pulse(PRIME_SEARCHING); for(u32bit k = 0; k <= n; ++k) { increment(seed); hash->update(seed); hash->final(V + HASH_SIZE * (n-k)); } X.binary_decode(V + (HASH_SIZE - 1 - b/8), V.size() - (HASH_SIZE - 1 - b/8)); X.set_bit(pbits-1); p = X - (X % (2*q) - 1); if(p.bits() == pbits && is_prime(p)) { global_state().pulse(PRIME_FOUND); return true; } } return false; } /************************************************* * Generate DSA Primes * *************************************************/ SecureVector DL_Group::generate_dsa_primes(BigInt& p, BigInt& q, u32bit pbits, u32bit qbits) { SecureVector seed(qbits/8); while(true) { Global_RNG::randomize(seed, seed.size()); global_state().pulse(PRIME_SEARCHING); if(generate_dsa_primes(p, q, pbits, qbits, seed)) return seed; } } }