Skip to content

Commit c0a9f41

Browse files
committed
reduce_hash
1 parent a0a9a1f commit c0a9f41

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

dsa/src/components.rs

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
use crate::{size::KeySize, two};
66
use crypto_bigint::{BoxedUint, NonZero, Odd};
77
use pkcs8::der::{
8-
self, asn1::UintRef, DecodeValue, Encode, EncodeValue, Header, Length, Reader, Sequence, Tag,
9-
Writer,
8+
self, DecodeValue, Encode, EncodeValue, Header, Length, Reader, Sequence, Tag, Writer,
9+
asn1::UintRef,
1010
};
1111
use signature::rand_core::CryptoRng;
1212

dsa/src/generate/secret_number.rs

+5-5
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,8 @@ use digest::{core_api::BlockSizeUser, Digest, FixedOutputReset};
1010
use signature::rand_core::TryCryptoRng;
1111
use zeroize::Zeroizing;
1212

13-
fn strip_leading_zeros(buffer: &[u8], desired_size: usize) -> &[u8] {
14-
&buffer[(buffer.len() - desired_size)..]
13+
fn reduce_hash(hash: &[u8], desired_size: usize) -> &[u8] {
14+
&hash[(hash.len() - desired_size)..]
1515
}
1616

1717
/// Generate a per-message secret number k deterministically using the method described in RFC 6979
@@ -34,13 +34,13 @@ where
3434

3535
// Reduce hash mod q
3636
let hash = (hash % q).to_be_bytes();
37-
let hash = strip_leading_zeros(&hash, size);
37+
let hash = reduce_hash(&hash, size);
3838

3939
let q_bytes = q.to_be_bytes();
40-
let q_bytes = strip_leading_zeros(&q_bytes, size);
40+
let q_bytes = reduce_hash(&q_bytes, size);
4141

4242
let x_bytes = Zeroizing::new(signing_key.x().to_be_bytes());
43-
let x_bytes = strip_leading_zeros(&x_bytes, size);
43+
let x_bytes = reduce_hash(&x_bytes, size);
4444

4545
let mut buffer = vec![0; size];
4646
loop {

0 commit comments

Comments
 (0)