Path: blob/master/libs/tomcrypt/src/pk/dh/dh_generate_key.c
4396 views
/* LibTomCrypt, modular cryptographic library -- Tom St Denis1*2* LibTomCrypt is a library that provides various cryptographic3* algorithms in a highly modular and flexible manner.4*5* The library is free for all purposes without any express6* guarantee it works.7*/89#include "tomcrypt.h"1011#ifdef LTC_MDH1213static int _dh_groupsize_to_keysize(int groupsize)14{15/* The strength estimates from https://tools.ietf.org/html/rfc3526#section-816* We use "Estimate 2" to get an appropriate private key (exponent) size.17*/18if (groupsize <= 0) {19return 0;20}21else if (groupsize <= 192) {22return 30; /* 1536-bit => key size 240-bit */23}24else if (groupsize <= 256) {25return 40; /* 2048-bit => key size 320-bit */26}27else if (groupsize <= 384) {28return 52; /* 3072-bit => key size 416-bit */29}30else if (groupsize <= 512) {31return 60; /* 4096-bit => key size 480-bit */32}33else if (groupsize <= 768) {34return 67; /* 6144-bit => key size 536-bit */35}36else if (groupsize <= 1024) {37return 77; /* 8192-bit => key size 616-bit */38}39else {40return 0;41}42}4344int dh_generate_key(prng_state *prng, int wprng, dh_key *key)45{46unsigned char *buf;47unsigned long keysize;48int err, max_iterations = LTC_PK_MAX_RETRIES;4950LTC_ARGCHK(key != NULL);51LTC_ARGCHK(ltc_mp.name != NULL);5253/* good prng? */54if ((err = prng_is_valid(wprng)) != CRYPT_OK) {55return err;56}5758keysize = _dh_groupsize_to_keysize(mp_unsigned_bin_size(key->prime));59if (keysize == 0) {60err = CRYPT_INVALID_KEYSIZE;61goto freemp;62}6364/* allocate buffer */65buf = XMALLOC(keysize);66if (buf == NULL) {67err = CRYPT_MEM;68goto freemp;69}7071key->type = PK_PRIVATE;72do {73/* make up random buf */74if (prng_descriptor[wprng].read(buf, keysize, prng) != keysize) {75err = CRYPT_ERROR_READPRNG;76goto freebuf;77}78/* load the x value - private key */79if ((err = mp_read_unsigned_bin(key->x, buf, keysize)) != CRYPT_OK) {80goto freebuf;81}82/* compute the y value - public key */83if ((err = mp_exptmod(key->base, key->x, key->prime, key->y)) != CRYPT_OK) {84goto freebuf;85}86err = dh_check_pubkey(key);87} while (err != CRYPT_OK && max_iterations-- > 0);8889freebuf:90zeromem(buf, keysize);91XFREE(buf);92freemp:93if (err != CRYPT_OK) dh_free(key);94return err;95}9697#endif /* LTC_MDH */9899100