X-Git-Url: https://git.distorted.org.uk/u/mdw/putty/blobdiff_plain/0c2986d033e11b811c34221a1fd4db3c9bc095e5..f317611e5572e4292e3ee88f6956a97fcd794089:/puttygen.c diff --git a/puttygen.c b/puttygen.c index 46815d6f..8a361e50 100644 --- a/puttygen.c +++ b/puttygen.c @@ -20,11 +20,6 @@ #define DEFAULT_KEYSIZE 1024 -/* - * TODO: - * - test the generated keys for actual working-RSA-key-hood - */ - /* ---------------------------------------------------------------------- * Progress report code. This is really horrible :-) */ @@ -322,7 +317,7 @@ static int CALLBACK MainDlgProc (HWND hwnd, UINT msg, static const char generating_msg[] = "Please wait while a key is generated..."; static const char entropy_msg[] = - "Please move the mouse in this window to generate randomness"; + "Please generate some randomness by moving the mouse over the blank area."; struct MainDlgState *state; switch (msg) { @@ -370,9 +365,9 @@ static int CALLBACK MainDlgProc (HWND hwnd, UINT msg, staticbtn(&cp, "Save the generated key to a new file", IDC_SAVESTATIC, "&Save", IDC_SAVE); endbox(&cp); - beginbox(&cp, "Actions", - IDC_BOX_ACTIONS, IDC_BOXT_ACTIONS); - staticedit(&cp, "Length of generated keys in &bits:", + beginbox(&cp, "Parameters", + IDC_BOX_PARAMS, IDC_BOXT_PARAMS); + staticedit(&cp, "Number of &bits in a generated key:", IDC_BITSSTATIC, IDC_BITS, 20); endbox(&cp); } @@ -476,16 +471,18 @@ static int CALLBACK MainDlgProc (HWND hwnd, UINT msg, /* * My brief statistical tests on mouse movements - * suggest that there are about 5 bits of - * randomness in the x position, 5 in the y + * suggest that there are about 2.5 bits of + * randomness in the x position, 2.5 in the y * position, and 1.7 in the message time, making - * 11.7 bits of unpredictability per mouse - * movement. However, other people have told me - * it's far less than that, so I'm going to be - * stupidly cautious and knock that down to a nice - * round 4. + * 5.7 bits of unpredictability per mouse movement. + * However, other people have told me it's far less + * than that, so I'm going to be stupidly cautious + * and knock that down to a nice round 2. With this + * method, we require two words per mouse movement, + * so with 2 bits per mouse movement we expect 2 + * bits every 2 words. */ - state->entropy_required = (state->keysize / 4) * 2; + state->entropy_required = (state->keysize/2) * 2; state->entropy_got = 0; state->entropy_size = (state->entropy_required * sizeof(*state->entropy));