[BACK]Return to ed25519.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/ed25519.c, Revision 1.3

1.3     ! markus      1: /* $OpenBSD: ed25519.c,v 1.2 2013/12/07 00:26:37 djm Exp $ */
1.1       markus      2:
1.3     ! markus      3: /*
        !             4:  * Public Domain, Authors: Daniel J. Bernstein, Niels Duif, Tanja Lange,
        !             5:  * Peter Schwabe, Bo-Yin Yang.
        !             6:  * Copied from supercop-20130419/crypto_sign/ed25519/ref/ed25519.c
        !             7:  */
1.1       markus      8:
                      9: #include "crypto_api.h"
                     10:
                     11: #include "ge25519.h"
                     12:
                     13: static void get_hram(unsigned char *hram, const unsigned char *sm, const unsigned char *pk, unsigned char *playground, unsigned long long smlen)
                     14: {
                     15:   unsigned long long i;
                     16:
                     17:   for (i =  0;i < 32;++i)    playground[i] = sm[i];
                     18:   for (i = 32;i < 64;++i)    playground[i] = pk[i-32];
                     19:   for (i = 64;i < smlen;++i) playground[i] = sm[i];
                     20:
                     21:   crypto_hash_sha512(hram,playground,smlen);
                     22: }
                     23:
                     24:
                     25: int crypto_sign_ed25519_keypair(
                     26:     unsigned char *pk,
                     27:     unsigned char *sk
                     28:     )
                     29: {
                     30:   sc25519 scsk;
                     31:   ge25519 gepk;
                     32:   unsigned char extsk[64];
                     33:   int i;
                     34:
                     35:   randombytes(sk, 32);
                     36:   crypto_hash_sha512(extsk, sk, 32);
                     37:   extsk[0] &= 248;
                     38:   extsk[31] &= 127;
                     39:   extsk[31] |= 64;
                     40:
                     41:   sc25519_from32bytes(&scsk,extsk);
                     42:
                     43:   ge25519_scalarmult_base(&gepk, &scsk);
                     44:   ge25519_pack(pk, &gepk);
                     45:   for(i=0;i<32;i++)
                     46:     sk[32 + i] = pk[i];
                     47:   return 0;
                     48: }
                     49:
                     50: int crypto_sign_ed25519(
                     51:     unsigned char *sm,unsigned long long *smlen,
                     52:     const unsigned char *m,unsigned long long mlen,
                     53:     const unsigned char *sk
                     54:     )
                     55: {
                     56:   sc25519 sck, scs, scsk;
                     57:   ge25519 ger;
                     58:   unsigned char r[32];
                     59:   unsigned char s[32];
                     60:   unsigned char extsk[64];
                     61:   unsigned long long i;
                     62:   unsigned char hmg[crypto_hash_sha512_BYTES];
                     63:   unsigned char hram[crypto_hash_sha512_BYTES];
                     64:
                     65:   crypto_hash_sha512(extsk, sk, 32);
                     66:   extsk[0] &= 248;
                     67:   extsk[31] &= 127;
                     68:   extsk[31] |= 64;
                     69:
                     70:   *smlen = mlen+64;
                     71:   for(i=0;i<mlen;i++)
                     72:     sm[64 + i] = m[i];
                     73:   for(i=0;i<32;i++)
                     74:     sm[32 + i] = extsk[32+i];
                     75:
                     76:   crypto_hash_sha512(hmg, sm+32, mlen+32); /* Generate k as h(extsk[32],...,extsk[63],m) */
                     77:
                     78:   /* Computation of R */
                     79:   sc25519_from64bytes(&sck, hmg);
                     80:   ge25519_scalarmult_base(&ger, &sck);
                     81:   ge25519_pack(r, &ger);
                     82:
                     83:   /* Computation of s */
                     84:   for(i=0;i<32;i++)
                     85:     sm[i] = r[i];
                     86:
                     87:   get_hram(hram, sm, sk+32, sm, mlen+64);
                     88:
                     89:   sc25519_from64bytes(&scs, hram);
                     90:   sc25519_from32bytes(&scsk, extsk);
                     91:   sc25519_mul(&scs, &scs, &scsk);
                     92:
                     93:   sc25519_add(&scs, &scs, &sck);
                     94:
                     95:   sc25519_to32bytes(s,&scs); /* cat s */
                     96:   for(i=0;i<32;i++)
                     97:     sm[32 + i] = s[i];
                     98:
                     99:   return 0;
                    100: }
                    101:
                    102: int crypto_sign_ed25519_open(
                    103:     unsigned char *m,unsigned long long *mlen,
                    104:     const unsigned char *sm,unsigned long long smlen,
                    105:     const unsigned char *pk
                    106:     )
                    107: {
                    108:   unsigned int i;
                    109:   int ret;
                    110:   unsigned char t2[32];
                    111:   ge25519 get1, get2;
                    112:   sc25519 schram, scs;
                    113:   unsigned char hram[crypto_hash_sha512_BYTES];
                    114:
                    115:   *mlen = (unsigned long long) -1;
                    116:   if (smlen < 64) return -1;
                    117:
                    118:   if (ge25519_unpackneg_vartime(&get1, pk)) return -1;
                    119:
                    120:   get_hram(hram,sm,pk,m,smlen);
                    121:
                    122:   sc25519_from64bytes(&schram, hram);
                    123:
                    124:   sc25519_from32bytes(&scs, sm+32);
                    125:
                    126:   ge25519_double_scalarmult_vartime(&get2, &get1, &schram, &ge25519_base, &scs);
                    127:   ge25519_pack(t2, &get2);
                    128:
                    129:   ret = crypto_verify_32(sm, t2);
                    130:
                    131:   if (!ret)
                    132:   {
                    133:     for(i=0;i<smlen-64;i++)
                    134:       m[i] = sm[i + 64];
                    135:     *mlen = smlen-64;
                    136:   }
                    137:   else
                    138:   {
                    139:     for(i=0;i<smlen-64;i++)
                    140:       m[i] = 0;
                    141:   }
                    142:   return ret;
                    143: }