[svn] gcry - r1370 - trunk/doc
svn author wk
cvs at cvs.gnupg.org
Fri Dec 5 12:58:25 CET 2008
Author: wk
Date: 2008-12-05 12:58:25 +0100 (Fri, 05 Dec 2008)
New Revision: 1370
Modified:
trunk/doc/ChangeLog
trunk/doc/gcrypt.texi
Log:
doc updates
Modified: trunk/doc/ChangeLog
===================================================================
--- trunk/doc/ChangeLog 2008-12-05 08:46:01 UTC (rev 1369)
+++ trunk/doc/ChangeLog 2008-12-05 11:58:25 UTC (rev 1370)
@@ -1,3 +1,7 @@
+2008-12-05 Werner Koch <wk at g10code.com>
+
+ * gcrypt.texi: Updates for pubkey generation.
+
2008-10-20 Werner Koch <wk at g10code.com>
* gcrypt.texi (Error handler): Fix description of
Modified: trunk/doc/gcrypt.texi
===================================================================
--- trunk/doc/gcrypt.texi 2008-12-05 08:46:01 UTC (rev 1369)
+++ trunk/doc/gcrypt.texi 2008-12-05 11:58:25 UTC (rev 1370)
@@ -520,6 +520,7 @@
@node Enabling FIPS mode
@section How to enable the FIPS mode
@cindex FIPS mode
+ at cindex FIPS 140
Libgcrypt may be used in a FIPS 140-2 mode. Note, that this does not
necessary mean that Libcgrypt is an appoved FIPS 140-2 module. Check the
@@ -2761,12 +2762,14 @@
@end example
@item use-x931
+ at cindex X9.31
Force the use of the ANSI X9.31 key generation algorithm instead of
the default algorithm. This flag is only meaningful for RSA and
usually not required. Note that this algorithm is implicitly used if
either @code{derive-parms} is given or Libgcrypt is in FIPS mode.
@item use-fips186
+ at cindex FIPS 186
Force the use of the FIPS 186 key generation algorithm instead of the
default algorithm. This flag is only meaningful for DSA and usually
not required. Note that this algorithm is implicitly used if either
@@ -4766,9 +4769,16 @@
the RSA decryption directly, a blinded value @math{y = x r^{e} \bmod n}
is decrypted and the unblinded value @math{x' = y' r^{-1} \bmod n}
returned. The blinding value @math{r} is a random value with the size
-of the modulus @math{n} and generated with @code{GCRY_STRONG_RANDOM}
+of the modulus @math{n} and generated with @code{GCRY_WEAK_RANDOM}
random level.
+ at cindex X9.31
+ at cindex FIPS 186
+The algorithm used for RSA and DSA key generation depends on whether
+Libgcrypt is operated in standard or in FIPS mode. In standard mode
+an algorithm based on the Lim-Lee prime number generator is used. In
+FIPS mode RSA keys are generated as specified in ANSI X9.31 (1998) and
+DSA keys as specified in FIPS 186-2.
@@ -4948,6 +4958,14 @@
@end enumerate
+To support the generation of RSA and DSA keys in FIPS mode according
+to X9.31 and FIPS 186-2, Libgcrypt implements two additional prime
+generation functions: @code{_gcry_derive_x931_prime} and
+ at code{_gcry_generate_fips186_2_prime}. These functions are internal
+and not available through the public API.
+
+
+
@node Random-Number Subsystem Architecture
@section Random-Number Subsystem Architecture
@@ -5537,10 +5555,14 @@
and thus are in addition available.
@item
-RSA and DSA key generation refuses to create a key with a keysize of
+RSA key generation refuses to create a key with a keysize of
less than 1024 bits.
@item
+DSA key generation refuses to create a key with a keysize other
+than 1024 bits.
+
+ at item
The @code{transient-key} flag for RSA key generation is ignored.
@item
More information about the Gnupg-commits
mailing list