ed25519.c 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221
  1. /* $OpenBSD: ed25519.c,v 1.3 2013/12/09 11:03:45 markus Exp $ */
  2. /*
  3. * Public Domain, Authors: Daniel J. Bernstein, Niels Duif, Tanja Lange,
  4. * Peter Schwabe, Bo-Yin Yang.
  5. * Copied from supercop-20130419/crypto_sign/ed25519/ref/ed25519.c
  6. *
  7. * Modified to use lws genhash by Andy Green <[email protected]>
  8. */
  9. #include <libwebsockets.h>
  10. #include <lws-ssh.h>
  11. #include "ge25519.h"
  12. int
  13. crypto_hash_sha512(uint8_t *hash64, const uint8_t *data, size_t len)
  14. {
  15. struct lws_genhash_ctx ctx;
  16. int ret;
  17. if (lws_genhash_init(&ctx, LWS_GENHASH_TYPE_SHA512)) {
  18. lwsl_notice("Failed to init SHA512\n");
  19. return 0;
  20. }
  21. ret = lws_genhash_update(&ctx, data, len);
  22. if (lws_genhash_destroy(&ctx, hash64))
  23. lwsl_notice("genhash destroy failed\n");
  24. return ret ? 0 : 64;
  25. }
  26. static void
  27. get_hram(unsigned char *hram, const unsigned char *sm,
  28. const unsigned char *pk, unsigned char *playground,
  29. size_t smlen)
  30. {
  31. unsigned long long i;
  32. for (i = 0; i < 32; ++i)
  33. playground[i] = sm[i];
  34. for (i = 32; i < 64; ++i)
  35. playground[i] = pk[i-32];
  36. for (i = 64; i < smlen; ++i)
  37. playground[i] = sm[i];
  38. crypto_hash_sha512(hram, playground, smlen);
  39. }
  40. int crypto_sign_ed25519_keypair(
  41. struct lws_context *context,
  42. unsigned char *pk,
  43. unsigned char *sk
  44. )
  45. {
  46. sc25519 scsk;
  47. ge25519 gepk;
  48. unsigned char extsk[64];
  49. int i;
  50. lws_get_random(context, sk, 32);
  51. crypto_hash_sha512(extsk, sk, 32);
  52. extsk[0] &= 248;
  53. extsk[31] &= 127;
  54. extsk[31] |= 64;
  55. sc25519_from32bytes(&scsk,extsk);
  56. ge25519_scalarmult_base(&gepk, &scsk);
  57. ge25519_pack(pk, &gepk);
  58. for(i=0;i<32;i++)
  59. sk[32 + i] = pk[i];
  60. return 0;
  61. }
  62. int crypto_sign_ed25519(
  63. unsigned char *sm,
  64. unsigned long long *smlen,
  65. const unsigned char *m, size_t mlen,
  66. const unsigned char *sk
  67. )
  68. {
  69. sc25519 sck, scs, scsk;
  70. ge25519 ger;
  71. unsigned char r[32];
  72. unsigned char s[32];
  73. unsigned char extsk[64];
  74. unsigned long long i;
  75. unsigned char hmg[crypto_hash_sha512_BYTES];
  76. unsigned char hram[crypto_hash_sha512_BYTES];
  77. crypto_hash_sha512(extsk, sk, 32);
  78. extsk[0] &= 248;
  79. extsk[31] &= 127;
  80. extsk[31] |= 64;
  81. *smlen = mlen+64;
  82. for(i=0;i<mlen;i++)
  83. sm[64 + i] = m[i];
  84. for(i=0;i<32;i++)
  85. sm[32 + i] = extsk[32+i];
  86. crypto_hash_sha512(hmg, sm+32, mlen+32);
  87. /* Generate k as h(extsk[32],...,extsk[63],m) */
  88. /* Computation of R */
  89. sc25519_from64bytes(&sck, hmg);
  90. ge25519_scalarmult_base(&ger, &sck);
  91. ge25519_pack(r, &ger);
  92. /* Computation of s */
  93. for (i = 0; i < 32; i++)
  94. sm[i] = r[i];
  95. get_hram(hram, sm, sk + 32, sm, (size_t)mlen + 64);
  96. sc25519_from64bytes(&scs, hram);
  97. sc25519_from32bytes(&scsk, extsk);
  98. sc25519_mul(&scs, &scs, &scsk);
  99. sc25519_add(&scs, &scs, &sck);
  100. sc25519_to32bytes(s,&scs); /* cat s */
  101. for (i = 0; i < 32; i++)
  102. sm[32 + i] = s[i];
  103. return 0;
  104. }
  105. int crypto_verify_32(const unsigned char *x,const unsigned char *y)
  106. {
  107. unsigned int differentbits = 0;
  108. #define F(i) differentbits |= x[i] ^ y[i];
  109. F(0)
  110. F(1)
  111. F(2)
  112. F(3)
  113. F(4)
  114. F(5)
  115. F(6)
  116. F(7)
  117. F(8)
  118. F(9)
  119. F(10)
  120. F(11)
  121. F(12)
  122. F(13)
  123. F(14)
  124. F(15)
  125. F(16)
  126. F(17)
  127. F(18)
  128. F(19)
  129. F(20)
  130. F(21)
  131. F(22)
  132. F(23)
  133. F(24)
  134. F(25)
  135. F(26)
  136. F(27)
  137. F(28)
  138. F(29)
  139. F(30)
  140. F(31)
  141. return (1 & ((differentbits - 1) >> 8)) - 1;
  142. }
  143. int crypto_sign_ed25519_open(
  144. unsigned char *m,unsigned long long *mlen,
  145. const unsigned char *sm,unsigned long long smlen,
  146. const unsigned char *pk
  147. )
  148. {
  149. unsigned int i;
  150. int ret;
  151. unsigned char t2[32];
  152. ge25519 get1, get2;
  153. sc25519 schram, scs;
  154. unsigned char hram[crypto_hash_sha512_BYTES];
  155. *mlen = (unsigned long long) -1;
  156. if (smlen < 64) {
  157. lwsl_notice("a\n");
  158. return -1;
  159. }
  160. if (ge25519_unpackneg_vartime(&get1, pk)) {
  161. lwsl_notice("b\n");
  162. return -1;
  163. }
  164. get_hram(hram,sm,pk,m, (size_t)smlen);
  165. sc25519_from64bytes(&schram, hram);
  166. sc25519_from32bytes(&scs, sm+32);
  167. ge25519_double_scalarmult_vartime(&get2, &get1, &schram, &ge25519_base, &scs);
  168. ge25519_pack(t2, &get2);
  169. ret = crypto_verify_32(sm, t2);
  170. lwsl_notice("vf says %d\n", ret);
  171. if (!ret)
  172. {
  173. for(i=0;i<smlen-64;i++)
  174. m[i] = sm[i + 64];
  175. *mlen = smlen-64;
  176. }
  177. else
  178. {
  179. for(i=0;i<smlen-64;i++)
  180. m[i] = 0;
  181. }
  182. return ret;
  183. }