ECC key pair generation according to FIPS-186-4
This commit is contained in:
		
							parent
							
								
									e600ab9d35
								
							
						
					
					
						commit
						e271b9fdbe
					
				| @ -6,6 +6,8 @@ enum { | ||||
| }; | ||||
| 
 | ||||
| int rand_prime(void *N, long len, prng_state *prng, int wprng); | ||||
| int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng); | ||||
| int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng); | ||||
| 
 | ||||
| enum { | ||||
|    PKA_RSA, | ||||
|  | ||||
							
								
								
									
										69
									
								
								src/math/rand_bn.c
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										69
									
								
								src/math/rand_bn.c
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,69 @@ | ||||
| /* LibTomCrypt, modular cryptographic library -- Tom St Denis
 | ||||
|  * | ||||
|  * LibTomCrypt is a library that provides various cryptographic | ||||
|  * algorithms in a highly modular and flexible manner. | ||||
|  * | ||||
|  * The library is free for all purposes without any express | ||||
|  * guarantee it works. | ||||
|  * | ||||
|  */ | ||||
| #include "tomcrypt.h" | ||||
| 
 | ||||
| /**
 | ||||
|   Generate a random number N with given bitlength (note: MSB can be 0) | ||||
| */ | ||||
| 
 | ||||
| int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng) | ||||
| { | ||||
|    int res, bytes; | ||||
|    unsigned char *buf, mask; | ||||
| 
 | ||||
|    LTC_ARGCHK(N != NULL); | ||||
|    LTC_ARGCHK(bits > 1); | ||||
| 
 | ||||
|    /* check PRNG */ | ||||
|    if ((res = prng_is_valid(wprng)) != CRYPT_OK) return res; | ||||
| 
 | ||||
|    bytes = (bits+7) >> 3; | ||||
|    mask = 0xff << (8 - bits % 8); | ||||
| 
 | ||||
|    /* allocate buffer */ | ||||
|    if ((buf = XCALLOC(1, bytes)) == NULL) return CRYPT_MEM; | ||||
| 
 | ||||
|    /* generate random bytes */ | ||||
|    if (prng_descriptor[wprng].read(buf, bytes, prng) != (unsigned long)bytes) { | ||||
|       res = CRYPT_ERROR_READPRNG; | ||||
|       goto cleanup; | ||||
|    } | ||||
|    /* mask bits */ | ||||
|    buf[0] &= ~mask; | ||||
|    /* load value */ | ||||
|    if ((res = mp_read_unsigned_bin(N, buf, bytes)) != CRYPT_OK) goto cleanup; | ||||
| 
 | ||||
|    res = CRYPT_OK; | ||||
| 
 | ||||
| cleanup: | ||||
| #ifdef LTC_CLEAN_STACK | ||||
|    zeromem(buf, len); | ||||
| #endif | ||||
|    XFREE(buf); | ||||
|    return res; | ||||
| } | ||||
| 
 | ||||
| /**
 | ||||
|   Generate a random number N in a range: 0 <= N < limit | ||||
| */ | ||||
| int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng) | ||||
| { | ||||
|    int res; | ||||
| 
 | ||||
|    LTC_ARGCHK(N != NULL); | ||||
|    LTC_ARGCHK(limit != NULL); | ||||
| 
 | ||||
|    do { | ||||
|      res = rand_bn_bits(N, mp_count_bits(limit), prng, wprng); | ||||
|      if (res != CRYPT_OK) return res; | ||||
|    } while (mp_cmp(N, limit) != LTC_MP_LT); | ||||
| 
 | ||||
|    return CRYPT_OK; | ||||
| } | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user