|
@@ -15,31 +15,6 @@
|
|
|
|
|
|
#ifdef LTC_MDSA
|
|
|
|
|
|
-/**
|
|
|
- Create a DSA key
|
|
|
- @param prng An active PRNG state
|
|
|
- @param wprng The index of the PRNG desired
|
|
|
- @param key [in/out] Where to store the created key
|
|
|
- @return CRYPT_OK if successful.
|
|
|
-*/
|
|
|
-int dsa_make_key_ex(prng_state *prng, int wprng, dsa_key *key)
|
|
|
-{
|
|
|
- int err;
|
|
|
-
|
|
|
- LTC_ARGCHK(key != NULL);
|
|
|
- LTC_ARGCHK(ltc_mp.name != NULL);
|
|
|
-
|
|
|
- /* so now we have our DH structure, generator g, order q, modulus p
|
|
|
- Now we need a random exponent [mod q] and it's power g^x mod p
|
|
|
- */
|
|
|
- /* private key x should be from range: 1 <= x <= q-1 (see FIPS 186-4 B.1.2) */
|
|
|
- if ((err = rand_bn_range(key->x, key->q, prng, wprng)) != CRYPT_OK) { return err; }
|
|
|
- if ((err = mp_exptmod(key->g, key->x, key->p, key->y)) != CRYPT_OK) { return err; }
|
|
|
- key->type = PK_PRIVATE;
|
|
|
-
|
|
|
- return CRYPT_OK;
|
|
|
-}
|
|
|
-
|
|
|
/**
|
|
|
Old-style creation of a DSA key
|
|
|
@param prng An active PRNG state
|
|
@@ -54,7 +29,7 @@ int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size,
|
|
|
int err;
|
|
|
|
|
|
if ((err = dsa_generate_pqg(prng, wprng, group_size, modulus_size, key)) != CRYPT_OK) { return err; }
|
|
|
- if ((err = dsa_make_key_ex(prng, wprng, key)) != CRYPT_OK) { return err; }
|
|
|
+ if ((err = dsa_generate_key(prng, wprng, key)) != CRYPT_OK) { return err; }
|
|
|
|
|
|
return CRYPT_OK;
|
|
|
}
|