2323
2424
2525from potr .compatcrypto import SHA256 , SHA1 , SHA1HMAC , SHA256HMAC , \
26- Counter , AESCTR , PK , random
26+ Counter , AESCTR , PK , getrandbits , randrange
2727from potr .utils import bytes_to_long , long_to_bytes , pack_mpi , read_mpi
2828from potr import proto
2929
@@ -58,7 +58,7 @@ def set_params(cls, prime, gen):
5858 cls .gen = gen
5959
6060 def __init__ (self ):
61- self .priv = random . randrange (2 , 2 ** 320 )
61+ self .priv = randrange (2 , 2 ** 320 )
6262 self .pub = pow (self .gen , self .priv , self .prime )
6363
6464DH .set_params (DH_MODULUS , DH_GENERATOR )
@@ -350,7 +350,7 @@ def __init__(self, privkey, onSuccess):
350350 self .lastmsg = None
351351
352352 def startAKE (self ):
353- self .r = long_to_bytes (random . getrandbits (128 ), 16 )
353+ self .r = long_to_bytes (getrandbits (128 ), 16 )
354354
355355 gxmpi = pack_mpi (self .dh .pub )
356356
@@ -549,8 +549,8 @@ def handle(self, tlv, appdata=None):
549549
550550 self .g3o = msg [3 ]
551551
552- self .x2 = random . randrange (2 , DH_MAX )
553- self .x3 = random . randrange (2 , DH_MAX )
552+ self .x2 = randrange (2 , DH_MAX )
553+ self .x3 = randrange (2 , DH_MAX )
554554
555555 self .g2 = pow (msg [0 ], self .x2 , DH_MODULUS )
556556 self .g3 = pow (msg [3 ], self .x3 , DH_MODULUS )
@@ -586,7 +586,7 @@ def handle(self, tlv, appdata=None):
586586 self .abort (appdata = appdata )
587587 return
588588
589- r = random . randrange (2 , DH_MAX )
589+ r = randrange (2 , DH_MAX )
590590 self .p = pow (self .g3 , r , DH_MODULUS )
591591 msg = [self .p ]
592592 qa1 = pow (self .g1 , r , DH_MODULUS )
@@ -689,8 +689,8 @@ def gotSecret(self, secret, question=None, appdata=None):
689689
690690 self .secret = bytes_to_long (combSecret )
691691
692- self .x2 = random . randrange (2 , DH_MAX )
693- self .x3 = random . randrange (2 , DH_MAX )
692+ self .x2 = randrange (2 , DH_MAX )
693+ self .x3 = randrange (2 , DH_MAX )
694694
695695 msg = [pow (self .g1 , self .x2 , DH_MODULUS )]
696696 msg += proof_known_log (self .g1 , self .x2 , 1 )
@@ -715,7 +715,7 @@ def gotSecret(self, secret, question=None, appdata=None):
715715 msg .append (pow (self .g1 , self .x3 , DH_MODULUS ))
716716 msg += proof_known_log (self .g1 , self .x3 , 4 )
717717
718- r = random . randrange (2 , DH_MAX )
718+ r = randrange (2 , DH_MAX )
719719
720720 self .p = pow (self .g3 , r , DH_MODULUS )
721721 msg .append (self .p )
@@ -731,8 +731,8 @@ def gotSecret(self, secret, question=None, appdata=None):
731731 self .sendTLV (proto .SMP2TLV (msg ), appdata = appdata )
732732
733733 def proof_equal_coords (self , r , v ):
734- r1 = random . randrange (2 , DH_MAX )
735- r2 = random . randrange (2 , DH_MAX )
734+ r1 = randrange (2 , DH_MAX )
735+ r2 = randrange (2 , DH_MAX )
736736 temp2 = pow (self .g1 , r1 , DH_MODULUS ) \
737737 * pow (self .g2 , r2 , DH_MODULUS ) % DH_MODULUS
738738 temp1 = pow (self .g3 , r1 , DH_MODULUS )
@@ -761,7 +761,7 @@ def check_equal_coords(self, coords, v):
761761 return long_to_bytes (c , 32 ) == cprime
762762
763763 def proof_equal_logs (self , v ):
764- r = random . randrange (2 , DH_MAX )
764+ r = randrange (2 , DH_MAX )
765765 temp1 = pow (self .g1 , r , DH_MODULUS )
766766 temp2 = pow (self .qab , r , DH_MODULUS )
767767
@@ -783,7 +783,7 @@ def check_equal_logs(self, logs, v):
783783 return long_to_bytes (c , 32 ) == cprime
784784
785785def proof_known_log (g , x , v ):
786- r = random . randrange (2 , DH_MAX )
786+ r = randrange (2 , DH_MAX )
787787 c = bytes_to_long (SHA256 (struct .pack (b'B' , v ) + pack_mpi (pow (g , r , DH_MODULUS ))))
788788 temp = x * c % SM_ORDER
789789 return c , (r - temp ) % SM_ORDER
0 commit comments