diff options
author | Werner Koch <[email protected]> | 2013-09-07 08:06:46 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2013-09-08 09:25:58 +0000 |
commit | 6466db10fb22a4f24df4edad9c5cb33ec67321bd (patch) | |
tree | cf8bbffc0a1b22ac170c18efcbbf8d4c7864443e /g10/mainproc.c | |
parent | scd: Suppress gcc warning about possible uninitialized use. (diff) | |
download | gnupg-6466db10fb22a4f24df4edad9c5cb33ec67321bd.tar.gz gnupg-6466db10fb22a4f24df4edad9c5cb33ec67321bd.zip |
Switch to deterministic DSA.
* agent/pksign.c (rfc6979_hash_algo_string): New.
(do_encode_dsa) [Libgcrypt >= 1.6]: Make use of RFC-6979.
--
Now that we have a good (and not NSA/NIST demanded ;-) specification
on how to use DSA without a random nonce, we take advantage of it and
thus avoid pitfalls related to a misbehaving RNG during signature
creation.
Note that OpenPGP has the option of using a longer hash algorithm but
truncated to what is suitable for the used DSA key size. The hash
used as input to RFC-6979 will also be one with an appropriate digest
length but not a truncated one. This is allowed by RFC-6979.
Signed-off-by: Werner Koch <[email protected]>
Diffstat (limited to 'g10/mainproc.c')
0 files changed, 0 insertions, 0 deletions