diff options
author | Werner Koch <wk@gnupg.org> | 2015-05-21 16:24:36 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2015-05-21 16:52:17 +0200 |
commit | 2bddd947fd1c11b4ec461576db65a5e34fea1b07 (patch) | |
tree | 55279d01ace3ac8b700f030f380794fa38df5671 /cipher/ecc-common.h | |
parent | 102d68b3bd77813a3ff989526855bb1e283bf9d7 (diff) | |
download | libgcrypt-2bddd947fd1c11b4ec461576db65a5e34fea1b07.tar.gz |
ecc: Add key generation flag "no-keytest".
* src/cipher.h (PUBKEY_FLAG_NO_KEYTEST): New.
* cipher/pubkey-util.c (_gcry_pk_util_parse_flaglist): Add flag
"no-keytest". Return an error for invalid flags of length 10.
* cipher/ecc.c (nist_generate_key): Replace arg random_level by flags
set random level depending on flags.
* cipher/ecc-eddsa.c (_gcry_ecc_eddsa_genkey): Ditto.
* cipher/ecc.c (ecc_generate): Pass flags to generate fucntion and
remove var random_level.
(nist_generate_key): Implement "no-keytest" flag.
* tests/keygen.c (check_ecc_keys): Add tests for transient-key and
no-keytest.
--
After key creation we usually run a test to check whether the keys
really work. However for transient keys this might be too time
consuming and given that a failed test would anyway abort the process
the optional use of a flag to skip the test is appropriate.
Using Ed25519 for EdDSA and the "no-keytest" flags halves the time to
create such a key. This was measured by looping the last test from
check_ecc_keys() 1000 times with and without the flag.
Due to a bug in the flags parser unknown flags with a length of 10
characters were not detected. Thus the "no-keytest" flag can be
employed by all software even for libraries before this. That bug is
however solved with this version.
Signed-off-by: Werner Koch <wk@gnupg.org>
Diffstat (limited to 'cipher/ecc-common.h')
-rw-r--r-- | cipher/ecc-common.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/cipher/ecc-common.h b/cipher/ecc-common.h index 83bf20d3..f0d97eaf 100644 --- a/cipher/ecc-common.h +++ b/cipher/ecc-common.h @@ -123,7 +123,7 @@ gpg_err_code_t _gcry_ecc_eddsa_compute_h_d (unsigned char **r_digest, gpg_err_code_t _gcry_ecc_eddsa_genkey (ECC_secret_key *sk, elliptic_curve_t *E, mpi_ec_t ctx, - gcry_random_level_t random_level); + int flags); gpg_err_code_t _gcry_ecc_eddsa_sign (gcry_mpi_t input, ECC_secret_key *sk, gcry_mpi_t r_r, gcry_mpi_t s, |