Skip to content
Snippets Groups Projects
Select Git revision
  • master
  • wip-slh-dsa-sha2-128s
  • master-updates
  • release-3.10-fixes
  • getopt-prototype
  • fix-bcrypt-warning
  • refactor-hmac
  • wip-use-alignas
  • trim-sha3-context
  • fix-gitlab-ci
  • check-fat-emulate
  • delete-digest_func-size
  • slh-dsa-shake-128f-nettle
  • slh-dsa-shake-128s-nettle
  • slh-dsa-shake-128s
  • delete-openpgp
  • ppc64-sha512
  • delete-md5-compat
  • cleanup-hmac-tests
  • ppc64-sha256
  • nettle_3.10.2_release_20250626
  • nettle_3.10.1_release_20241230
  • nettle_3.10_release_20240616
  • nettle_3.10rc2
  • nettle_3.10rc1
  • nettle_3.9.1_release_20230601
  • nettle_3.9_release_20230514
  • nettle_3.8.1_release_20220727
  • nettle_3.8_release_20220602
  • nettle_3.7.3_release_20210606
  • nettle_3.7.2_release_20210321
  • nettle_3.7.1_release_20210217
  • nettle_3.7_release_20210104
  • nettle_3.7rc1
  • nettle_3.6_release_20200429
  • nettle_3.6rc3
  • nettle_3.6rc2
  • nettle_3.6rc1
  • nettle_3.5.1_release_20190627
  • nettle_3.5_release_20190626
40 results

chacha.h

Blame
    • Daiki Ueno's avatar
      2176ccc1
      chacha: add variant that treats counter value as 32-bit · 2176ccc1
      Daiki Ueno authored and Niels Möller's avatar Niels Möller committed
      
      The ChaCha-Poly1305 implementation previously used the chacha_crypt
      function that assumes the block counter is 64-bit long, while RFC 8439
      defines that the counter is 32-bit long.  Although this should be fine
      as long as up to 256 gigabytes of data is encrypted with the same key,
      it would be nice to use a separate functions (chacha_set_counter32 and
      chacha_crypt32) that assume the counter is 32-bit long.
      
      Signed-off-by: default avatarDaiki Ueno <dueno@redhat.com>
      2176ccc1
      History
      chacha: add variant that treats counter value as 32-bit
      Daiki Ueno authored and Niels Möller's avatar Niels Möller committed
      
      The ChaCha-Poly1305 implementation previously used the chacha_crypt
      function that assumes the block counter is 64-bit long, while RFC 8439
      defines that the counter is 32-bit long.  Although this should be fine
      as long as up to 256 gigabytes of data is encrypted with the same key,
      it would be nice to use a separate functions (chacha_set_counter32 and
      chacha_crypt32) that assume the counter is 32-bit long.
      
      Signed-off-by: default avatarDaiki Ueno <dueno@redhat.com>
    dsa-compat-keygen.c 2.17 KiB
    /* dsa-compat-keygen.c
    
       Generation of DSA keypairs
    
       Copyright (C) 2002, 2014 Niels Möller
    
       This file is part of GNU Nettle.
    
       GNU Nettle is free software: you can redistribute it and/or
       modify it under the terms of either:
    
         * the GNU Lesser General Public License as published by the Free
           Software Foundation; either version 3 of the License, or (at your
           option) any later version.
    
       or
    
         * the GNU General Public License as published by the Free
           Software Foundation; either version 2 of the License, or (at your
           option) any later version.
    
       or both in parallel, as here.
    
       GNU Nettle is distributed in the hope that it will be useful,
       but WITHOUT ANY WARRANTY; without even the implied warranty of
       MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
       General Public License for more details.
    
       You should have received copies of the GNU General Public License and
       the GNU Lesser General Public License along with this program.  If
       not, see http://www.gnu.org/licenses/.
    */
    
    #if HAVE_CONFIG_H
    # include "config.h"
    #endif
    
    #include <assert.h>
    #include <stdlib.h>
    
    #include "dsa-compat.h"
    
    #include "bignum.h"
    
    /* Undo name mangling */
    #undef dsa_generate_keypair
    #define dsa_generate_keypair nettle_dsa_generate_keypair
    
    /* Valid sizes, according to FIPS 186-3 are (1024, 160), (2048, 224),
       (2048, 256), (3072, 256). */
    int
    dsa_compat_generate_keypair(struct dsa_public_key *pub,
    			    struct dsa_private_key *key,
    			    void *random_ctx, nettle_random_func *random,
    			    void *progress_ctx, nettle_progress_func *progress,
    			    unsigned p_bits, unsigned q_bits)
    {
      struct dsa_params *params;
    
      switch (q_bits)
        {
        case 160:
          if (p_bits < DSA_SHA1_MIN_P_BITS)
    	return 0;
          break;
        case 224:
        case 256:
          if (p_bits < DSA_SHA256_MIN_P_BITS)
    	return 0;
          break;
        default:
          return 0;
        }
    
      /* NOTE: Depends on identical layout! */
      params = (struct dsa_params *) pub;
    
      if (!dsa_generate_params (params,
    			    random_ctx, random,
    			    progress_ctx, progress,
    			    p_bits, q_bits))
        return 0;
    
      dsa_generate_keypair (params, pub->y, key->x, random_ctx, random);
    
      return 1;
    }