Skip to content

Commit d1ecd82

Browse files
committed
use rand_bn_range() where possible
1 parent bdfecc5 commit d1ecd82

3 files changed

Lines changed: 13 additions & 18 deletions

File tree

src/math/rand_bn.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ int rand_bn_bits(void *N, int bits, prng_state *prng, int wprng)
5151
}
5252

5353
/**
54-
Generate a random number N in a range: 0 <= N < limit
54+
Generate a random number N in a range: 1 <= N < limit
5555
*/
5656
int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng)
5757
{
@@ -63,7 +63,7 @@ int rand_bn_range(void *N, void *limit, prng_state *prng, int wprng)
6363
do {
6464
res = rand_bn_bits(N, mp_count_bits(limit), prng, wprng);
6565
if (res != CRYPT_OK) return res;
66-
} while (mp_cmp(N, limit) != LTC_MP_LT);
66+
} while (mp_cmp_d(N, 0) != LTC_MP_GT || mp_cmp(N, limit) != LTC_MP_LT);
6767

6868
return CRYPT_OK;
6969
}

src/pk/dsa/dsa_encrypt_key.c

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ int dsa_encrypt_key(const unsigned char *in, unsigned long inlen,
3535
unsigned char *expt, *skey;
3636
void *g_pub, *g_priv;
3737
unsigned long x, y;
38-
int err, qbits;
38+
int err;
3939

4040
LTC_ARGCHK(in != NULL);
4141
LTC_ARGCHK(out != NULL);
@@ -73,14 +73,12 @@ int dsa_encrypt_key(const unsigned char *in, unsigned long inlen,
7373
return CRYPT_MEM;
7474
}
7575

76-
/* make a random g_priv, g_pub = g^x pair */
77-
qbits = mp_count_bits(key->q);
78-
do {
79-
if ((err = rand_bn_bits(g_priv, qbits, prng, wprng)) != CRYPT_OK) {
80-
goto LBL_ERR;
81-
}
82-
/* private key x should be from range: 1 <= x <= q-1 (see FIPS 186-4 B.1.2) */
83-
} while (mp_cmp_d(g_priv, 0) != LTC_MP_GT || mp_cmp(g_priv, key->q) != LTC_MP_LT);
76+
/* make a random g_priv, g_pub = g^x pair
77+
private key x should be in range: 1 <= x <= q-1 (see FIPS 186-4 B.1.2)
78+
*/
79+
if ((err = rand_bn_range(g_priv, key->q, prng, wprng)) != CRYPT_OK) {
80+
goto LBL_ERR;
81+
}
8482

8583
/* compute y */
8684
if ((err = mp_exptmod(key->g, g_priv, key->p, g_pub)) != CRYPT_OK) {

src/pk/dsa/dsa_make_key.c

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424
*/
2525
int dsa_make_key_ex(prng_state *prng, int wprng, dsa_key *key)
2626
{
27-
int err, qbits;
27+
int err;
2828

2929
LTC_ARGCHK(key != NULL);
3030
LTC_ARGCHK(key->x != NULL);
@@ -37,12 +37,9 @@ int dsa_make_key_ex(prng_state *prng, int wprng, dsa_key *key)
3737
/* so now we have our DH structure, generator g, order q, modulus p
3838
Now we need a random exponent [mod q] and it's power g^x mod p
3939
*/
40-
qbits = mp_count_bits(key->q);
41-
do {
42-
if ((err = rand_bn_bits(key->x, qbits, prng, wprng)) != CRYPT_OK) { return err; }
43-
/* private key x should be from range: 1 <= x <= q-1 (see FIPS 186-4 B.1.2) */
44-
} while (mp_cmp_d(key->x, 0) != LTC_MP_GT || mp_cmp(key->x, key->q) != LTC_MP_LT);
45-
if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { return err; }
40+
/* private key x should be from range: 1 <= x <= q-1 (see FIPS 186-4 B.1.2) */
41+
if ((err = rand_bn_range(key->x, key->q, prng, wprng)) != CRYPT_OK) { return err; }
42+
if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { return err; }
4643
key->type = PK_PRIVATE;
4744

4845
return CRYPT_OK;

0 commit comments

Comments
 (0)