ECC key pair generation according to FIPS-186-4

This commit is contained in:
Karel Miko 2014-01-07 21:39:25 +01:00 committed by Steffen Jaeckel
parent e600ab9d35
commit e271b9fdbe
2 changed files with 71 additions and 0 deletions

View File

@ -6,6 +6,8 @@ enum {
};
int rand_prime(void *N, long len, prng_state *prng, int wprng);
int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng);
int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng);
enum {
PKA_RSA,

69
src/math/rand_bn.c Executable file
View File

@ -0,0 +1,69 @@
/* LibTomCrypt, modular cryptographic library -- Tom St Denis
*
* LibTomCrypt is a library that provides various cryptographic
* algorithms in a highly modular and flexible manner.
*
* The library is free for all purposes without any express
* guarantee it works.
*
*/
#include "tomcrypt.h"
/**
Generate a random number N with given bitlength (note: MSB can be 0)
*/
int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng)
{
int res, bytes;
unsigned char *buf, mask;
LTC_ARGCHK(N != NULL);
LTC_ARGCHK(bits > 1);
/* check PRNG */
if ((res = prng_is_valid(wprng)) != CRYPT_OK) return res;
bytes = (bits+7) >> 3;
mask = 0xff << (8 - bits % 8);
/* allocate buffer */
if ((buf = XCALLOC(1, bytes)) == NULL) return CRYPT_MEM;
/* generate random bytes */
if (prng_descriptor[wprng].read(buf, bytes, prng) != (unsigned long)bytes) {
res = CRYPT_ERROR_READPRNG;
goto cleanup;
}
/* mask bits */
buf[0] &= ~mask;
/* load value */
if ((res = mp_read_unsigned_bin(N, buf, bytes)) != CRYPT_OK) goto cleanup;
res = CRYPT_OK;
cleanup:
#ifdef LTC_CLEAN_STACK
zeromem(buf, len);
#endif
XFREE(buf);
return res;
}
/**
Generate a random number N in a range: 0 <= N < limit
*/
int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng)
{
int res;
LTC_ARGCHK(N != NULL);
LTC_ARGCHK(limit != NULL);
do {
res = rand_bn_bits(N, mp_count_bits(limit), prng, wprng);
if (res != CRYPT_OK) return res;
} while (mp_cmp(N, limit) != LTC_MP_LT);
return CRYPT_OK;
}