summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--PROJECTS2
-rw-r--r--THANKS2
-rw-r--r--cipher/ChangeLog7
-rw-r--r--cipher/primegen.c93
-rw-r--r--doc/FAQ3
-rw-r--r--doc/gpg.1pod2
-rw-r--r--include/mpi.h1
-rw-r--r--mpi/ChangeLog4
-rw-r--r--mpi/mpiutil.c30
9 files changed, 90 insertions, 54 deletions
diff --git a/PROJECTS b/PROJECTS
index a794148c3..2d89d918d 100644
--- a/PROJECTS
+++ b/PROJECTS
@@ -26,8 +26,6 @@
* Split key support (n-out-of-m)
- * Check Berkeley DB - it is in glibc - any licensing problems?
-
* add an option to re-create a public key from a secret key; we
can do this in trustdb.c:verify_own_keys.
(special tool?)
diff --git a/THANKS b/THANKS
index f5435e5c9..8fe47c17d 100644
--- a/THANKS
+++ b/THANKS
@@ -67,7 +67,7 @@ QingLong qinglong@bolizm.ihep.su
Ralph Gillen gillen@theochem.uni-duesseldorf.de
Rat ratinox@peorth.gweep.net
Reinhard Wobst R.Wobst@ifw-dresden.de
-Rémi Guyomarch rguyomarch@ifn.fr
+Rémi Guyomarch rguyom@mail.dotcom.fr
Reuben Sumner rasumner@wisdom.weizmann.ac.il
Roddy Strachan roddy@satlink.com.au
Roland Rosenfeld roland@spinnaker.rhein.de
diff --git a/cipher/ChangeLog b/cipher/ChangeLog
index 52dd247de..34d30af24 100644
--- a/cipher/ChangeLog
+++ b/cipher/ChangeLog
@@ -1,3 +1,10 @@
+Tue May 4 15:47:53 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
+
+ * primegen.c (gen_prime): Readded the Fermat test. Fixed the bug
+ that we didn't correct for step when passing the prime to the
+ Rabin-Miller test which led to bad performance (Stefan Keller).
+ (check_prime): Add a first Fermat test.
+
Sun Apr 18 10:11:28 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
* cipher.c (cipher_setiv): Add ivlen arg, changed all callers.
diff --git a/cipher/primegen.c b/cipher/primegen.c
index c7b5b757d..9019e2839 100644
--- a/cipher/primegen.c
+++ b/cipher/primegen.c
@@ -34,7 +34,7 @@
static int no_of_small_prime_numbers;
static MPI gen_prime( unsigned nbits, int mode, int randomlevel );
-static int check_prime( MPI prime );
+static int check_prime( MPI prime, MPI val_2 );
static int is_prime( MPI n, int steps, int *count );
static void m_out_of_n( char *array, int m, int n );
@@ -89,6 +89,7 @@ generate_elg_prime( int mode, unsigned pbits, unsigned qbits,
int count1, count2;
unsigned nprime;
unsigned req_qbits = qbits; /* the requested q bits size */
+ MPI val_2 = mpi_alloc_set_ui( 2 );
/* find number of needed prime factors */
for(n=1; (pbits - qbits - 1) / n >= qbits; n++ )
@@ -186,7 +187,7 @@ generate_elg_prime( int mode, unsigned pbits, unsigned qbits,
}
else
count2 = 0;
- } while( !(nprime == pbits && check_prime( prime )) );
+ } while( !(nprime == pbits && check_prime( prime, val_2 )) );
if( DBG_CIPHER ) {
putc('\n', stderr);
@@ -261,6 +262,7 @@ generate_elg_prime( int mode, unsigned pbits, unsigned qbits,
mpi_free( pool[i] );
m_free( pool );
m_free(perms);
+ mpi_free(val_2);
return prime;
}
@@ -270,7 +272,7 @@ static MPI
gen_prime( unsigned nbits, int secret, int randomlevel )
{
unsigned nlimbs;
- MPI prime, val_2, val_3, result;
+ MPI prime, ptest, pminus1, val_2, val_3, result;
int i;
unsigned x, step;
unsigned count1, count2;
@@ -286,19 +288,17 @@ gen_prime( unsigned nbits, int secret, int randomlevel )
mods = m_alloc( no_of_small_prime_numbers * sizeof *mods );
/* make nbits fit into MPI implementation */
nlimbs = (nbits + BITS_PER_MPI_LIMB - 1) / BITS_PER_MPI_LIMB;
- val_2 = mpi_alloc( nlimbs );
- mpi_set_ui(val_2, 2);
- val_3 = mpi_alloc( nlimbs );
- mpi_set_ui(val_3, 3);
- result = mpi_alloc( nlimbs );
+ val_2 = mpi_alloc_set_ui( 2 );
+ val_3 = mpi_alloc_set_ui( 3);
prime = secret? mpi_alloc_secure( nlimbs ): mpi_alloc( nlimbs );
+ result = mpi_alloc_like( prime );
+ pminus1= mpi_alloc_like( prime );
+ ptest = mpi_alloc_like( prime );
count1 = count2 = 0;
- /* enter (endless) loop */
- for(;;) {
+ for(;;) { /* try forvever */
int dotcount=0;
/* generate a random number */
- /*mpi_set_bytes( prime, nbits, get_random_byte, randomlevel );*/
{ char *p = get_random_bits( nbits, randomlevel, secret );
mpi_set_buffer( prime, p, (nbits+7)/8, 0 );
m_free(p);
@@ -312,6 +312,7 @@ gen_prime( unsigned nbits, int secret, int randomlevel )
for(i=0; (x = small_prime_numbers[i]); i++ )
mods[i] = mpi_fdiv_r_ui(NULL, prime, x);
+ /* now try some primes starting with prime */
for(step=0; step < 20000; step += 2 ) {
/* check against all the small primes we have in mods */
count1++;
@@ -322,40 +323,31 @@ gen_prime( unsigned nbits, int secret, int randomlevel )
break;
}
if( x )
- continue; /* found a multiple of a already known prime */
+ continue; /* found a multiple of an already known prime */
- mpi_add_ui( prime, prime, step );
+ mpi_add_ui( ptest, prime, step );
- #if 0
- /* do a Fermat test */
+ /* do a faster Fermat test */
count2++;
- mpi_powm( result, val_2, prime, prime );
- if( mpi_cmp_ui(result, 2) )
- continue; /* stepping (fermat test failed) */
- fputc('+', stderr);
- #endif
-
- /* perform stronger tests */
- if( is_prime(prime, 5, &count2 ) ) {
- if( !mpi_test_bit( prime, nbits-1 ) ) {
- if( 0 && DBG_CIPHER ) {
+ mpi_sub_ui( pminus1, ptest, 1);
+ mpi_powm( result, val_2, pminus1, ptest );
+ if( !mpi_cmp_ui( result, 1 ) ) { /* not composite */
+ /* perform stronger tests */
+ if( is_prime(ptest, 5, &count2 ) ) {
+ if( !mpi_test_bit( ptest, nbits-1 ) ) {
fputc('\n', stderr);
log_debug("overflow in prime generation\n");
- break; /* step loop, cont with a new prime */
+ break; /* step loop, continue with a new prime */
}
- }
- if( 0 && DBG_CIPHER ) {
- log_debug("performed %u simple and %u stronger tests\n",
- count1, count2 );
- log_mpidump("found prime: ", prime );
+ mpi_free(val_2);
+ mpi_free(val_3);
+ mpi_free(result);
+ mpi_free(pminus1);
+ mpi_free(prime);
+ m_free(mods);
+ return ptest;
}
-
- mpi_free(val_2);
- mpi_free(val_3);
- mpi_free(result);
- m_free(mods);
- return prime;
}
if( ++dotcount == 10 ) {
fputc('.', stderr);
@@ -370,7 +362,7 @@ gen_prime( unsigned nbits, int secret, int randomlevel )
* Returns: true if this may be a prime
*/
static int
-check_prime( MPI prime )
+check_prime( MPI prime, MPI val_2 )
{
int i;
unsigned x;
@@ -382,19 +374,20 @@ check_prime( MPI prime )
return 0;
}
- #if 0
- result = mpi_alloc( mpi_get_nlimbs(prime) );
- val_2 = mpi_alloc_set_ui( 2 );
- mpi_powm( result, val_2, prime, prime );
- if( mpi_cmp_ui(result, 2) ) {
- mpi_free(result);
- mpi_free(val_2);
- return 0;
+ /* a quick fermat test */
+ {
+ MPI result = mpi_alloc_like( prime );
+ MPI pminus1 = mpi_alloc_like( prime );
+ mpi_sub_ui( pminus1, prime, 1);
+ mpi_powm( result, val_2, pminus1, prime );
+ mpi_free( pminus1 );
+ if( mpi_cmp_ui( result, 1 ) ) { /* if composite */
+ mpi_free( result );
+ fputc('.', stderr);
+ return 0;
+ }
+ mpi_free( result );
}
- mpi_free(result);
- mpi_free(val_2);
- fputc('+', stderr);
- #endif
/* perform stronger tests */
if( is_prime(prime, 5, &count ) )
diff --git a/doc/FAQ b/doc/FAQ
index 97bf94a05..b008f2ce7 100644
--- a/doc/FAQ
+++ b/doc/FAQ
@@ -81,7 +81,8 @@
signatures this is sufficient as the size of the hash
is probably the weakest link if the keysize is larger
than 1024 bits. Encryption keys may have greater sizes,
- but you should than check the fingerprint of this key.
+ but you should than check the fingerprint of this key:
+ "gpg --fingerprint --fingerprint <user ID>".
Q: Why are some signatures with an ELG-E key valid?
A: These are ElGamal Key generated by GNUPG in v3 (rfc1991)
diff --git a/doc/gpg.1pod b/doc/gpg.1pod
index 9ec4d2ef4..9e8abc44b 100644
--- a/doc/gpg.1pod
+++ b/doc/gpg.1pod
@@ -93,6 +93,8 @@ B<--fingerprint> [I<names>]
same output as B<list-keys> but with the additional output
of a line with the fingerprint. May also be combined
with B<--list-sigs> or B<--check-sigs>.
+ If this command is given twice, the fingerprints of all
+ secondary keys are listed too.
B<--list-packets>
List only the sequence of packets. This is mainly
diff --git a/include/mpi.h b/include/mpi.h
index ae32d1ba3..e845bec50 100644
--- a/include/mpi.h
+++ b/include/mpi.h
@@ -92,6 +92,7 @@ void *mpi_get_opaque( MPI a, int *len );
#define mpi_is_secure(a) ((a) && ((a)->flags&1))
void mpi_set_secure( MPI a );
void mpi_clear( MPI a );
+MPI mpi_alloc_like( MPI a );
void mpi_set( MPI w, MPI u);
void mpi_set_ui( MPI w, ulong u);
MPI mpi_alloc_set_ui( unsigned long u);
diff --git a/mpi/ChangeLog b/mpi/ChangeLog
index 7d66b809b..10e3bddd6 100644
--- a/mpi/ChangeLog
+++ b/mpi/ChangeLog
@@ -1,3 +1,7 @@
+Tue May 4 15:47:53 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
+
+ * mpiutil.c (mpi_alloc_like): New.
+
Mon Apr 26 17:48:15 CEST 1999 Werner Koch <wk@isil.d.shuttle.de>
* mpih-add.c, mpih-sub.c: Removed
diff --git a/mpi/mpiutil.c b/mpi/mpiutil.c
index 82ba87112..cbbe10d25 100644
--- a/mpi/mpiutil.c
+++ b/mpi/mpiutil.c
@@ -323,6 +323,36 @@ mpi_copy( MPI a )
}
+/****************
+ * This function allocates an MPI which is optimized to hold
+ * a value as large as the one given in the arhgument and allocates it
+ * with the same flags as A.
+ */
+MPI
+mpi_alloc_like( MPI a )
+{
+ MPI b;
+
+ if( a && (a->flags & 4) ) {
+ void *p = m_is_secure(a->d)? m_alloc_secure( a->nbits )
+ : m_alloc( a->nbits );
+ memcpy( p, a->d, a->nbits );
+ b = mpi_set_opaque( NULL, p, a->nbits );
+ }
+ else if( a ) {
+ b = mpi_is_secure(a)? mpi_alloc_secure( a->nlimbs )
+ : mpi_alloc( a->nlimbs );
+ b->nlimbs = 0;
+ b->sign = 0;
+ b->flags = a->flags;
+ b->nbits = 0;
+ }
+ else
+ b = NULL;
+ return b;
+}
+
+
void
mpi_set( MPI w, MPI u)
{