Remove PRNG argument from mbedtls_rsa_deduce_moduli
It is not necessary to pass a CSPRNG to `mbedtls_rsa_deduce_moduli`, as there exist well-working static strategies, and even if a PRNG is preferred, a non-secure one would be sufficient. Further, the implementation is changed to use a static strategy for the choice of candidates which according to some benchmarks even performs better than the previous one using random candidate choices.
This commit is contained in:
parent
0f65e0ca03
commit
68b4d58bd8
2 changed files with 22 additions and 26 deletions
|
@ -89,8 +89,6 @@ extern "C" {
|
|||
* \param N RSA modulus N = PQ, with P, Q to be found
|
||||
* \param D RSA private exponent
|
||||
* \param E RSA public exponent
|
||||
* \param f_rng PRNG to be used for randomization, or NULL
|
||||
* \param p_rng PRNG context for f_rng, or NULL
|
||||
* \param P Pointer to MPI holding first prime factor of N on success
|
||||
* \param Q Pointer to MPI holding second prime factor of N on success
|
||||
*
|
||||
|
@ -105,8 +103,8 @@ extern "C" {
|
|||
*
|
||||
*/
|
||||
int mbedtls_rsa_deduce_primes( mbedtls_mpi const *N, mbedtls_mpi const *D,
|
||||
mbedtls_mpi const *E, int (*f_rng)(void *, unsigned char *, size_t),
|
||||
void *p_rng, mbedtls_mpi *P, mbedtls_mpi *Q );
|
||||
mbedtls_mpi const *E,
|
||||
mbedtls_mpi *P, mbedtls_mpi *Q );
|
||||
|
||||
/**
|
||||
* \brief Compute RSA private exponent from
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue