from pygost.utils import bytes2long
-def vko_34102001(curve, private_key, pubkey, ukm):
+def vko_34102001(curve, prv, pubkey, ukm):
""" Make Diffie-Hellman computation (34.10-2001, 34.11-94)
:param GOST3410Curve curve: curve to use
- :param long private_key: private key
+ :param long prv: private key
:param ukm: UKM value (VKO-factor)
:type ukm: bytes, 8 bytes
:param pubkey: public key's part
:rfc:`4357` VKO GOST 34.10-2001 with little-endian
hash output.
"""
- key = curve.exp(private_key, pubkey[0], pubkey[1])
+ key = curve.exp(prv, pubkey[0], pubkey[1])
key = curve.exp(bytes2long(24 * b"\x00" + ukm), key[0], key[1])
return GOST341194(pub_marshal(key), "GostR3411_94_CryptoProParamSet").digest()
-def vko_34102012256(curve, private_key, pubkey, ukm=b"\x00\x00\x00\x00\x00\x00\x00\01"):
+def vko_34102012256(curve, prv, pubkey, ukm=b"\x00\x00\x00\x00\x00\x00\x00\01"):
""" Make Diffie-Hellman computation (34.10-2012, 34.11-2012 256 bit)
:param GOST3410Curve curve: curve to use
- :param long private_key: private key
+ :param long prv: private key
:param ukm: UKM value (VKO-factor)
:type ukm: bytes, 8 bytes
:param pubkey: public key's part
:return: Key Encryption Key (shared key)
:rtype: bytes, 32 bytes
"""
- key = curve.exp(private_key, pubkey[0], pubkey[1])
+ key = curve.exp(prv, pubkey[0], pubkey[1])
key = curve.exp(bytes2long(ukm[::-1]), key[0], key[1])
return GOST34112012256(pub_marshal(key, mode=2012)).digest()
-def vko_34102012512(curve, private_key, pubkey, ukm=b"\x00\x00\x00\x00\x00\x00\x00\01"):
+def vko_34102012512(curve, prv, pubkey, ukm=b"\x00\x00\x00\x00\x00\x00\x00\01"):
""" Make Diffie-Hellman computation (34.10-2012, 34.11-2012 512 bit)
:param GOST3410Curve curve: curve to use
- :param long private_key: private key
+ :param long prv: private key
:param ukm: UKM value (VKO-factor)
:type ukm: bytes, 8 bytes
:param pubkey: public key's part
:return: Key Encryption Key (shared key)
:rtype: bytes, 32 bytes
"""
- key = curve.exp(private_key, pubkey[0], pubkey[1])
+ key = curve.exp(prv, pubkey[0], pubkey[1])
key = curve.exp(bytes2long(ukm[::-1]), key[0], key[1])
return GOST34112012512(pub_marshal(key, mode=2012)).digest()