mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-23 20:03:31 +01:00
Merge branch 'ed25519_ref10_squashed'
Conflicts: src/common/include.am src/ext/README
This commit is contained in:
commit
1c5d680b3d
4
.gitignore
vendored
4
.gitignore
vendored
@ -138,6 +138,10 @@ cscope.*
|
||||
/src/config/torrc.sample
|
||||
/src/config/torrc.minimal
|
||||
|
||||
# /src/ext/
|
||||
/src/ext/ed25519/ref10/libed25519_ref10.a
|
||||
/src/ext/ed25519/ref10/libed25519_ref10.lib
|
||||
|
||||
# /src/or/
|
||||
/src/or/Makefile
|
||||
/src/or/Makefile.in
|
||||
|
@ -8,6 +8,7 @@
|
||||
#ifdef HAVE_SYS_STAT_H
|
||||
#include <sys/stat.h>
|
||||
#endif
|
||||
#include "container.h"
|
||||
#include "crypto.h"
|
||||
#include "crypto_curve25519.h"
|
||||
#include "util.h"
|
||||
@ -63,6 +64,34 @@ curve25519_public_key_is_ok(const curve25519_public_key_t *key)
|
||||
return !safe_mem_is_zero(key->public_key, CURVE25519_PUBKEY_LEN);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate CURVE25519_SECKEY_LEN random bytes in <b>out</b>. If
|
||||
* <b>extra_strong</b> is true, this key is possibly going to get used more
|
||||
* than once, so use a better-than-usual RNG. Return 0 on success, -1 on
|
||||
* failure.
|
||||
*
|
||||
* This function does not adjust the output of the RNG at all; the will caller
|
||||
* will need to clear or set the appropriate bits to make curve25519 work.
|
||||
*/
|
||||
int
|
||||
curve25519_rand_seckey_bytes(uint8_t *out, int extra_strong)
|
||||
{
|
||||
uint8_t k_tmp[CURVE25519_SECKEY_LEN];
|
||||
|
||||
if (crypto_rand((char*)out, CURVE25519_SECKEY_LEN) < 0)
|
||||
return -1;
|
||||
if (extra_strong && !crypto_strongest_rand(k_tmp, CURVE25519_SECKEY_LEN)) {
|
||||
/* If they asked for extra-strong entropy and we have some, use it as an
|
||||
* HMAC key to improve not-so-good entropy rather than using it directly,
|
||||
* just in case the extra-strong entropy is less amazing than we hoped. */
|
||||
crypto_hmac_sha256((char*) out,
|
||||
(const char *)k_tmp, sizeof(k_tmp),
|
||||
(const char *)out, CURVE25519_SECKEY_LEN);
|
||||
}
|
||||
memwipe(k_tmp, 0, sizeof(k_tmp));
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** Generate a new keypair and return the secret key. If <b>extra_strong</b>
|
||||
* is true, this key is possibly going to get used more than once, so
|
||||
* use a better-than-usual RNG. Return 0 on success, -1 on failure. */
|
||||
@ -70,19 +99,9 @@ int
|
||||
curve25519_secret_key_generate(curve25519_secret_key_t *key_out,
|
||||
int extra_strong)
|
||||
{
|
||||
uint8_t k_tmp[CURVE25519_SECKEY_LEN];
|
||||
|
||||
if (crypto_rand((char*)key_out->secret_key, CURVE25519_SECKEY_LEN) < 0)
|
||||
if (curve25519_rand_seckey_bytes(key_out->secret_key, extra_strong) < 0)
|
||||
return -1;
|
||||
if (extra_strong && !crypto_strongest_rand(k_tmp, CURVE25519_SECKEY_LEN)) {
|
||||
/* If they asked for extra-strong entropy and we have some, use it as an
|
||||
* HMAC key to improve not-so-good entropy rather than using it directly,
|
||||
* just in case the extra-strong entropy is less amazing than we hoped. */
|
||||
crypto_hmac_sha256((char *)key_out->secret_key,
|
||||
(const char *)k_tmp, sizeof(k_tmp),
|
||||
(const char *)key_out->secret_key, CURVE25519_SECKEY_LEN);
|
||||
}
|
||||
memwipe(k_tmp, 0, sizeof(k_tmp));
|
||||
|
||||
key_out->secret_key[0] &= 248;
|
||||
key_out->secret_key[31] &= 127;
|
||||
key_out->secret_key[31] |= 64;
|
||||
@ -109,69 +128,142 @@ curve25519_keypair_generate(curve25519_keypair_t *keypair_out,
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** Write the <b>datalen</b> bytes from <b>data</b> to the file named
|
||||
* <b>fname</b> in the tagged-data format. This format contains a
|
||||
* 32-byte header, followed by the data itself. The header is the
|
||||
* NUL-padded string "== <b>typestring</b>: <b>tag</b> ==". The length
|
||||
* of <b>typestring</b> and <b>tag</b> must therefore be no more than
|
||||
* 24.
|
||||
**/
|
||||
int
|
||||
crypto_write_tagged_contents_to_file(const char *fname,
|
||||
const char *typestring,
|
||||
const char *tag,
|
||||
const uint8_t *data,
|
||||
size_t datalen)
|
||||
{
|
||||
char header[32];
|
||||
smartlist_t *chunks = smartlist_new();
|
||||
sized_chunk_t ch0, ch1;
|
||||
int r = -1;
|
||||
|
||||
memset(header, 0, sizeof(header));
|
||||
if (tor_snprintf(header, sizeof(header),
|
||||
"== %s: %s ==", typestring, tag) < 0)
|
||||
goto end;
|
||||
ch0.bytes = header;
|
||||
ch0.len = 32;
|
||||
ch1.bytes = (const char*) data;
|
||||
ch1.len = datalen;
|
||||
smartlist_add(chunks, &ch0);
|
||||
smartlist_add(chunks, &ch1);
|
||||
|
||||
r = write_chunks_to_file(fname, chunks, 1, 0);
|
||||
|
||||
end:
|
||||
smartlist_free(chunks);
|
||||
return r;
|
||||
}
|
||||
|
||||
/** Read a tagged-data file from <b>fname</b> into the
|
||||
* <b>data_out_len</b>-byte buffer in <b>data_out</b>. Check that the
|
||||
* typestring matches <b>typestring</b>; store the tag into a newly allocated
|
||||
* string in <b>tag_out</b>. Return -1 on failure, and the number of bytes of
|
||||
* data on success. */
|
||||
ssize_t
|
||||
crypto_read_tagged_contents_from_file(const char *fname,
|
||||
const char *typestring,
|
||||
char **tag_out,
|
||||
uint8_t *data_out,
|
||||
ssize_t data_out_len)
|
||||
{
|
||||
char prefix[33];
|
||||
char *content = NULL;
|
||||
struct stat st;
|
||||
ssize_t r = -1;
|
||||
|
||||
*tag_out = NULL;
|
||||
st.st_size = 0;
|
||||
content = read_file_to_str(fname, RFTS_BIN|RFTS_IGNORE_MISSING, &st);
|
||||
if (! content)
|
||||
goto end;
|
||||
if (st.st_size < 32 || st.st_size > 32 + data_out_len)
|
||||
goto end;
|
||||
|
||||
memcpy(prefix, content, 32);
|
||||
prefix[32] = 0;
|
||||
/* Check type, extract tag. */
|
||||
if (strcmpstart(prefix, "== ") || strcmpend(prefix, " ==") ||
|
||||
! tor_mem_is_zero(prefix+strlen(prefix), 32-strlen(prefix)))
|
||||
goto end;
|
||||
|
||||
if (strcmpstart(prefix+3, typestring) ||
|
||||
3+strlen(typestring) >= 32 ||
|
||||
strcmpstart(prefix+3+strlen(typestring), ": "))
|
||||
goto end;
|
||||
|
||||
*tag_out = tor_strndup(prefix+5+strlen(typestring),
|
||||
strlen(prefix)-8-strlen(typestring));
|
||||
|
||||
memcpy(data_out, content+32, st.st_size-32);
|
||||
r = st.st_size - 32;
|
||||
|
||||
end:
|
||||
if (content)
|
||||
memwipe(content, 0, st.st_size);
|
||||
tor_free(content);
|
||||
return r;
|
||||
}
|
||||
|
||||
/** DOCDOC */
|
||||
int
|
||||
curve25519_keypair_write_to_file(const curve25519_keypair_t *keypair,
|
||||
const char *fname,
|
||||
const char *tag)
|
||||
{
|
||||
char contents[32 + CURVE25519_SECKEY_LEN + CURVE25519_PUBKEY_LEN];
|
||||
uint8_t contents[CURVE25519_SECKEY_LEN + CURVE25519_PUBKEY_LEN];
|
||||
int r;
|
||||
|
||||
memset(contents, 0, sizeof(contents));
|
||||
tor_snprintf(contents, sizeof(contents), "== c25519v1: %s ==", tag);
|
||||
tor_assert(strlen(contents) <= 32);
|
||||
memcpy(contents+32, keypair->seckey.secret_key, CURVE25519_SECKEY_LEN);
|
||||
memcpy(contents+32+CURVE25519_SECKEY_LEN,
|
||||
memcpy(contents, keypair->seckey.secret_key, CURVE25519_SECKEY_LEN);
|
||||
memcpy(contents+CURVE25519_SECKEY_LEN,
|
||||
keypair->pubkey.public_key, CURVE25519_PUBKEY_LEN);
|
||||
|
||||
r = write_bytes_to_file(fname, contents, sizeof(contents), 1);
|
||||
r = crypto_write_tagged_contents_to_file(fname,
|
||||
"c25519v1",
|
||||
tag,
|
||||
contents,
|
||||
sizeof(contents));
|
||||
|
||||
memwipe(contents, 0, sizeof(contents));
|
||||
return r;
|
||||
}
|
||||
|
||||
/** DOCDOC */
|
||||
int
|
||||
curve25519_keypair_read_from_file(curve25519_keypair_t *keypair_out,
|
||||
char **tag_out,
|
||||
const char *fname)
|
||||
{
|
||||
char prefix[33];
|
||||
char *content;
|
||||
struct stat st;
|
||||
uint8_t content[CURVE25519_SECKEY_LEN + CURVE25519_PUBKEY_LEN];
|
||||
ssize_t len;
|
||||
int r = -1;
|
||||
|
||||
*tag_out = NULL;
|
||||
|
||||
st.st_size = 0;
|
||||
content = read_file_to_str(fname, RFTS_BIN|RFTS_IGNORE_MISSING, &st);
|
||||
if (! content)
|
||||
goto end;
|
||||
if (st.st_size != 32 + CURVE25519_SECKEY_LEN + CURVE25519_PUBKEY_LEN)
|
||||
len = crypto_read_tagged_contents_from_file(fname, "c25519v1", tag_out,
|
||||
content, sizeof(content));
|
||||
if (len != sizeof(content))
|
||||
goto end;
|
||||
|
||||
memcpy(prefix, content, 32);
|
||||
prefix[32] = '\0';
|
||||
if (strcmpstart(prefix, "== c25519v1: ") ||
|
||||
strcmpend(prefix, " =="))
|
||||
goto end;
|
||||
|
||||
*tag_out = tor_strndup(prefix+strlen("== c25519v1: "),
|
||||
strlen(prefix) - strlen("== c25519v1: =="));
|
||||
|
||||
memcpy(keypair_out->seckey.secret_key, content+32, CURVE25519_SECKEY_LEN);
|
||||
memcpy(keypair_out->seckey.secret_key, content, CURVE25519_SECKEY_LEN);
|
||||
curve25519_public_key_generate(&keypair_out->pubkey, &keypair_out->seckey);
|
||||
if (tor_memneq(keypair_out->pubkey.public_key,
|
||||
content + 32 + CURVE25519_SECKEY_LEN,
|
||||
content + CURVE25519_SECKEY_LEN,
|
||||
CURVE25519_PUBKEY_LEN))
|
||||
goto end;
|
||||
|
||||
r = 0;
|
||||
|
||||
end:
|
||||
if (content) {
|
||||
memwipe(content, 0, (size_t) st.st_size);
|
||||
tor_free(content);
|
||||
}
|
||||
memwipe(content, 0, sizeof(content));
|
||||
if (r != 0) {
|
||||
memset(keypair_out, 0, sizeof(*keypair_out));
|
||||
tor_free(*tag_out);
|
||||
|
@ -57,6 +57,8 @@ int curve25519_keypair_read_from_file(curve25519_keypair_t *keypair_out,
|
||||
char **tag_out,
|
||||
const char *fname);
|
||||
|
||||
int curve25519_rand_seckey_bytes(uint8_t *out, int extra_strong);
|
||||
|
||||
#ifdef CRYPTO_CURVE25519_PRIVATE
|
||||
STATIC int curve25519_impl(uint8_t *output, const uint8_t *secret,
|
||||
const uint8_t *basepoint);
|
||||
@ -70,5 +72,17 @@ int curve25519_public_from_base64(curve25519_public_key_t *pkey,
|
||||
int curve25519_public_to_base64(char *output,
|
||||
const curve25519_public_key_t *pkey);
|
||||
|
||||
int crypto_write_tagged_contents_to_file(const char *fname,
|
||||
const char *typestring,
|
||||
const char *tag,
|
||||
const uint8_t *data,
|
||||
size_t datalen);
|
||||
|
||||
ssize_t crypto_read_tagged_contents_from_file(const char *fname,
|
||||
const char *typestring,
|
||||
char **tag_out,
|
||||
uint8_t *data_out,
|
||||
ssize_t data_out_len);
|
||||
|
||||
#endif
|
||||
|
||||
|
353
src/common/crypto_ed25519.c
Normal file
353
src/common/crypto_ed25519.c
Normal file
@ -0,0 +1,353 @@
|
||||
/* Copyright (c) 2013, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
/* Wrapper code for an ed25519 implementation. */
|
||||
|
||||
#include "orconfig.h"
|
||||
#ifdef HAVE_SYS_STAT_H
|
||||
#include <sys/stat.h>
|
||||
#endif
|
||||
|
||||
#include "crypto.h"
|
||||
|
||||
#include "crypto_curve25519.h"
|
||||
#include "crypto_ed25519.h"
|
||||
#include "torlog.h"
|
||||
#include "util.h"
|
||||
|
||||
#include "ed25519/ref10/ed25519_ref10.h"
|
||||
|
||||
#include <openssl/sha.h>
|
||||
|
||||
/**
|
||||
* Initialize a new ed25519 secret key in <b>seckey_out</b>. If
|
||||
* <b>extra_strong</b>, take the RNG inputs directly from the operating
|
||||
* system. Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_secret_key_generate(ed25519_secret_key_t *seckey_out,
|
||||
int extra_strong)
|
||||
{
|
||||
int r;
|
||||
uint8_t seed[32];
|
||||
if (! extra_strong || crypto_strongest_rand(seed, sizeof(seed)) < 0)
|
||||
crypto_rand((char*)seed, sizeof(seed));
|
||||
|
||||
r = ed25519_ref10_seckey_expand(seckey_out->seckey, seed);
|
||||
memwipe(seed, 0, sizeof(seed));
|
||||
|
||||
return r < 0 ? -1 : 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Given a 32-byte random seed in <b>seed</b>, expand it into an ed25519
|
||||
* secret key in <b>seckey_out</b>. Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_secret_key_from_seed(ed25519_secret_key_t *seckey_out,
|
||||
const uint8_t *seed)
|
||||
{
|
||||
if (ed25519_ref10_seckey_expand(seckey_out->seckey, seed) < 0)
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Given a secret key in <b>seckey</b>, expand it into an
|
||||
* ed25519 public key. Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_public_key_generate(ed25519_public_key_t *pubkey_out,
|
||||
const ed25519_secret_key_t *seckey)
|
||||
{
|
||||
if (ed25519_ref10_pubkey(pubkey_out->pubkey, seckey->seckey) < 0)
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** Generate a new ed25519 keypair in <b>keypair_out</b>. If
|
||||
* <b>extra_strong</b> is set, try to mix some system entropy into the key
|
||||
* generation process. Return 0 on success, -1 on failure. */
|
||||
int
|
||||
ed25519_keypair_generate(ed25519_keypair_t *keypair_out, int extra_strong)
|
||||
{
|
||||
if (ed25519_secret_key_generate(&keypair_out->seckey, extra_strong) < 0)
|
||||
return -1;
|
||||
if (ed25519_public_key_generate(&keypair_out->pubkey,
|
||||
&keypair_out->seckey)<0)
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Set <b>signature_out</b> to a signature of the <b>len</b>-byte message
|
||||
* <b>msg</b>, using the secret and public key in <b>keypair</b>.
|
||||
*/
|
||||
int
|
||||
ed25519_sign(ed25519_signature_t *signature_out,
|
||||
const uint8_t *msg, size_t len,
|
||||
const ed25519_keypair_t *keypair)
|
||||
{
|
||||
|
||||
if (ed25519_ref10_sign(signature_out->sig, msg, len,
|
||||
keypair->seckey.seckey,
|
||||
keypair->pubkey.pubkey) < 0) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Check whether if <b>signature</b> is a valid signature for the
|
||||
* <b>len</b>-byte message in <b>msg</b> made with the key <b>pubkey</b>.
|
||||
*
|
||||
* Return 0 if the signature is valid; -1 if it isn't.
|
||||
*/
|
||||
int
|
||||
ed25519_checksig(const ed25519_signature_t *signature,
|
||||
const uint8_t *msg, size_t len,
|
||||
const ed25519_public_key_t *pubkey)
|
||||
{
|
||||
return
|
||||
ed25519_ref10_open(signature->sig, msg, len, pubkey->pubkey) < 0 ? -1 : 0;
|
||||
}
|
||||
|
||||
/** Validate every signature among those in <b>checkable</b>, which contains
|
||||
* exactly <b>n_checkable</b> elements. If <b>okay_out</b> is non-NULL, set
|
||||
* the i'th element of <b>okay_out</b> to 1 if the i'th element of
|
||||
* <b>checkable</b> is valid, and to 0 otherwise. Return 0 if every signature
|
||||
* was valid. Otherwise return -N, where N is the number of invalid
|
||||
* signatures.
|
||||
*/
|
||||
int
|
||||
ed25519_checksig_batch(int *okay_out,
|
||||
const ed25519_checkable_t *checkable,
|
||||
int n_checkable)
|
||||
{
|
||||
int res, i;
|
||||
|
||||
res = 0;
|
||||
for (i = 0; i < n_checkable; ++i) {
|
||||
const ed25519_checkable_t *ch = &checkable[i];
|
||||
int r = ed25519_checksig(&ch->signature, ch->msg, ch->len, ch->pubkey);
|
||||
if (r < 0)
|
||||
--res;
|
||||
if (okay_out)
|
||||
okay_out[i] = (r == 0);
|
||||
}
|
||||
|
||||
#if 0
|
||||
/* This is how we'd do it if we were using ed25519_donna. I'll keep this
|
||||
* code around here in case we ever do that. */
|
||||
const uint8_t **ms;
|
||||
size_t *lens;
|
||||
const uint8_t **pks;
|
||||
const uint8_t **sigs;
|
||||
int *oks;
|
||||
|
||||
ms = tor_malloc(sizeof(uint8_t*)*n_checkable);
|
||||
lens = tor_malloc(sizeof(size_t)*n_checkable);
|
||||
pks = tor_malloc(sizeof(uint8_t*)*n_checkable);
|
||||
sigs = tor_malloc(sizeof(uint8_t*)*n_checkable);
|
||||
oks = okay_out ? okay_out : tor_malloc(sizeof(int)*n_checkable);
|
||||
|
||||
for (i = 0; i < n_checkable; ++i) {
|
||||
ms[i] = checkable[i].msg;
|
||||
lens[i] = checkable[i].len;
|
||||
pks[i] = checkable[i].pubkey->pubkey;
|
||||
sigs[i] = checkable[i].signature.sig;
|
||||
oks[i] = 0;
|
||||
}
|
||||
|
||||
ed25519_sign_open_batch_donna_fb(ms, lens, pks, sigs, n_checkable, oks);
|
||||
|
||||
res = 0;
|
||||
for (i = 0; i < n_checkable; ++i) {
|
||||
if (!oks[i])
|
||||
--res;
|
||||
}
|
||||
|
||||
tor_free(ms);
|
||||
tor_free(lens);
|
||||
tor_free(pks);
|
||||
if (! okay_out)
|
||||
tor_free(oks);
|
||||
#endif
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
/**
|
||||
* Given a curve25519 keypair in <b>inp</b>, generate a corresponding
|
||||
* ed25519 keypair in <b>out</b>, and set <b>signbit_out</b> to the
|
||||
* sign bit of the X coordinate of the ed25519 key.
|
||||
*
|
||||
* NOTE THAT IT IS PROBABLY NOT SAFE TO USE THE GENERATED KEY FOR ANYTHING
|
||||
* OUTSIDE OF WHAT'S PRESENTED IN PROPOSAL 228. In particular, it's probably
|
||||
* not a great idea to use it to sign attacker-supplied anything.
|
||||
*/
|
||||
int
|
||||
ed25519_keypair_from_curve25519_keypair(ed25519_keypair_t *out,
|
||||
int *signbit_out,
|
||||
const curve25519_keypair_t *inp)
|
||||
{
|
||||
const char string[] = "Derive high part of ed25519 key from curve25519 key";
|
||||
ed25519_public_key_t pubkey_check;
|
||||
SHA512_CTX ctx;
|
||||
uint8_t sha512_output[64];
|
||||
|
||||
memcpy(out->seckey.seckey, inp->seckey.secret_key, 32);
|
||||
SHA512_Init(&ctx);
|
||||
SHA512_Update(&ctx, out->seckey.seckey, 32);
|
||||
SHA512_Update(&ctx, string, sizeof(string));
|
||||
SHA512_Final(sha512_output, &ctx);
|
||||
memcpy(out->seckey.seckey + 32, sha512_output, 32);
|
||||
|
||||
ed25519_public_key_generate(&out->pubkey, &out->seckey);
|
||||
|
||||
*signbit_out = out->pubkey.pubkey[31] >> 7;
|
||||
|
||||
ed25519_public_key_from_curve25519_public_key(&pubkey_check, &inp->pubkey,
|
||||
*signbit_out);
|
||||
|
||||
tor_assert(fast_memeq(pubkey_check.pubkey, out->pubkey.pubkey, 32));
|
||||
|
||||
memwipe(&pubkey_check, 0, sizeof(pubkey_check));
|
||||
memwipe(&ctx, 0, sizeof(ctx));
|
||||
memwipe(sha512_output, 0, sizeof(sha512_output));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Given a curve25519 public key and sign bit of X coordinate of the ed25519
|
||||
* public key, generate the corresponding ed25519 public key.
|
||||
*/
|
||||
int
|
||||
ed25519_public_key_from_curve25519_public_key(ed25519_public_key_t *pubkey,
|
||||
const curve25519_public_key_t *pubkey_in,
|
||||
int signbit)
|
||||
{
|
||||
return ed25519_ref10_pubkey_from_curve25519_pubkey(pubkey->pubkey,
|
||||
pubkey_in->public_key,
|
||||
signbit);
|
||||
}
|
||||
|
||||
/**
|
||||
* Given an ed25519 keypair in <b>inp</b>, generate a corresponding
|
||||
* ed25519 keypair in <b>out</b>, blinded by the corresponding 32-byte input
|
||||
* in 'param'.
|
||||
*
|
||||
* Tor uses key blinding for the "next-generation" hidden services design:
|
||||
* service descriptors are encrypted with a key derived from the service's
|
||||
* long-term public key, and then signed with (and stored at a position
|
||||
* indexed by) a short-term key derived by blinding the long-term keys.
|
||||
*/
|
||||
int
|
||||
ed25519_keypair_blind(ed25519_keypair_t *out,
|
||||
const ed25519_keypair_t *inp,
|
||||
const uint8_t *param)
|
||||
{
|
||||
ed25519_public_key_t pubkey_check;
|
||||
|
||||
ed25519_ref10_blind_secret_key(out->seckey.seckey,
|
||||
inp->seckey.seckey, param);
|
||||
|
||||
ed25519_public_blind(&pubkey_check, &inp->pubkey, param);
|
||||
ed25519_public_key_generate(&out->pubkey, &out->seckey);
|
||||
|
||||
tor_assert(fast_memeq(pubkey_check.pubkey, out->pubkey.pubkey, 32));
|
||||
|
||||
memwipe(&pubkey_check, 0, sizeof(pubkey_check));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Given an ed25519 public key in <b>inp</b>, generate a corresponding blinded
|
||||
* public key in <b>out</b>, blinded with the 32-byte parameter in
|
||||
* <b>param</b>. Return 0 on sucess, -1 on railure.
|
||||
*/
|
||||
int
|
||||
ed25519_public_blind(ed25519_public_key_t *out,
|
||||
const ed25519_public_key_t *inp,
|
||||
const uint8_t *param)
|
||||
{
|
||||
ed25519_ref10_blind_public_key(out->pubkey, inp->pubkey, param);
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Store seckey unencrypted to <b>filename</b>, marking it with <b>tag</b>.
|
||||
* Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_seckey_write_to_file(const ed25519_secret_key_t *seckey,
|
||||
const char *filename,
|
||||
const char *tag)
|
||||
{
|
||||
return crypto_write_tagged_contents_to_file(filename,
|
||||
"ed25519v1-secret",
|
||||
tag,
|
||||
seckey->seckey,
|
||||
sizeof(seckey->seckey));
|
||||
}
|
||||
|
||||
/**
|
||||
* Read seckey unencrypted from <b>filename</b>, storing it into
|
||||
* <b>seckey_out</b>. Set *<b>tag_out</> to the tag it was marked with.
|
||||
* Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_seckey_read_from_file(ed25519_secret_key_t *seckey_out,
|
||||
char **tag_out,
|
||||
const char *filename)
|
||||
{
|
||||
ssize_t len;
|
||||
|
||||
len = crypto_read_tagged_contents_from_file(filename, "ed25519v1-secret",
|
||||
tag_out, seckey_out->seckey,
|
||||
sizeof(seckey_out->seckey));
|
||||
if (len != sizeof(seckey_out->seckey))
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* Store pubkey unencrypted to <b>filename</b>, marking it with <b>tag</b>.
|
||||
* Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_pubkey_write_to_file(const ed25519_public_key_t *pubkey,
|
||||
const char *filename,
|
||||
const char *tag)
|
||||
{
|
||||
return crypto_write_tagged_contents_to_file(filename,
|
||||
"ed25519v1-public",
|
||||
tag,
|
||||
pubkey->pubkey,
|
||||
sizeof(pubkey->pubkey));
|
||||
}
|
||||
|
||||
/**
|
||||
* Store pubkey unencrypted to <b>filename</b>, marking it with <b>tag</b>.
|
||||
* Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_pubkey_read_from_file(ed25519_public_key_t *pubkey_out,
|
||||
char **tag_out,
|
||||
const char *filename)
|
||||
{
|
||||
ssize_t len;
|
||||
|
||||
len = crypto_read_tagged_contents_from_file(filename, "ed25519v1-public",
|
||||
tag_out, pubkey_out->pubkey,
|
||||
sizeof(pubkey_out->pubkey));
|
||||
if (len != sizeof(pubkey_out->pubkey))
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
116
src/common/crypto_ed25519.h
Normal file
116
src/common/crypto_ed25519.h
Normal file
@ -0,0 +1,116 @@
|
||||
/* Copyright (c) 2012-2013, The Tor Project, Inc. */
|
||||
/* See LICENSE for licensing information */
|
||||
|
||||
#ifndef TOR_CRYPTO_ED25519_H
|
||||
#define TOR_CRYPTO_ED25519_H
|
||||
|
||||
#include "testsupport.h"
|
||||
#include "torint.h"
|
||||
|
||||
#define ED25519_PUBKEY_LEN 32
|
||||
#define ED25519_SECKEY_LEN 64
|
||||
#define ED25519_SECKEY_SEED_LEN 32
|
||||
#define ED25519_SIG_LEN 64
|
||||
|
||||
/** An Ed25519 signature. */
|
||||
typedef struct {
|
||||
uint8_t sig[ED25519_SIG_LEN];
|
||||
} ed25519_signature_t;
|
||||
|
||||
/** An Ed25519 public key */
|
||||
typedef struct {
|
||||
uint8_t pubkey[ED25519_PUBKEY_LEN];
|
||||
} ed25519_public_key_t;
|
||||
|
||||
/** An Ed25519 secret key */
|
||||
typedef struct {
|
||||
/** Note that we store secret keys in an expanded format that doesn't match
|
||||
* the format from standard ed25519. Ed25519 stores a 32-byte value k and
|
||||
* expands it into a 64-byte H(k), using the first 32 bytes for a multiplier
|
||||
* of the base point, and second 32 bytes as an input to a hash function
|
||||
* for deriving r. But because we implement key blinding, we need to store
|
||||
* keys in the 64-byte expanded form. */
|
||||
uint8_t seckey[ED25519_SECKEY_LEN];
|
||||
} ed25519_secret_key_t;
|
||||
|
||||
/** An Ed25519 keypair. */
|
||||
typedef struct {
|
||||
ed25519_public_key_t pubkey;
|
||||
ed25519_secret_key_t seckey;
|
||||
} ed25519_keypair_t;
|
||||
|
||||
#ifdef CURVE25519_ENABLED
|
||||
int ed25519_secret_key_generate(ed25519_secret_key_t *seckey_out,
|
||||
int extra_strong);
|
||||
int ed25519_secret_key_from_seed(ed25519_secret_key_t *seckey_out,
|
||||
const uint8_t *seed);
|
||||
|
||||
int ed25519_public_key_generate(ed25519_public_key_t *pubkey_out,
|
||||
const ed25519_secret_key_t *seckey);
|
||||
int ed25519_keypair_generate(ed25519_keypair_t *keypair_out, int extra_strong);
|
||||
int ed25519_sign(ed25519_signature_t *signature_out,
|
||||
const uint8_t *msg, size_t len,
|
||||
const ed25519_keypair_t *key);
|
||||
int ed25519_checksig(const ed25519_signature_t *signature,
|
||||
const uint8_t *msg, size_t len,
|
||||
const ed25519_public_key_t *pubkey);
|
||||
|
||||
/**
|
||||
* A collection of information necessary to check an Ed25519 signature. Used
|
||||
* for batch verification.
|
||||
*/
|
||||
typedef struct {
|
||||
/** The public key that supposedly generated the signature. */
|
||||
ed25519_public_key_t *pubkey;
|
||||
/** The signature to check. */
|
||||
ed25519_signature_t signature;
|
||||
/** The message that the signature is supposed to have been applied to. */
|
||||
const uint8_t *msg;
|
||||
/** The length of the message. */
|
||||
size_t len;
|
||||
} ed25519_checkable_t;
|
||||
|
||||
int ed25519_checksig_batch(int *okay_out,
|
||||
const ed25519_checkable_t *checkable,
|
||||
int n_checkable);
|
||||
|
||||
int ed25519_keypair_from_curve25519_keypair(ed25519_keypair_t *out,
|
||||
int *signbit_out,
|
||||
const curve25519_keypair_t *inp);
|
||||
|
||||
int ed25519_public_key_from_curve25519_public_key(ed25519_public_key_t *pubkey,
|
||||
const curve25519_public_key_t *pubkey_in,
|
||||
int signbit);
|
||||
int ed25519_keypair_blind(ed25519_keypair_t *out,
|
||||
const ed25519_keypair_t *inp,
|
||||
const uint8_t *param);
|
||||
int ed25519_public_blind(ed25519_public_key_t *out,
|
||||
const ed25519_public_key_t *inp,
|
||||
const uint8_t *param);
|
||||
|
||||
#endif
|
||||
|
||||
#define ED25519_BASE64_LEN 43
|
||||
|
||||
int ed25519_public_from_base64(ed25519_public_key_t *pkey,
|
||||
const char *input);
|
||||
int ed25519_public_to_base64(char *output,
|
||||
const ed25519_public_key_t *pkey);
|
||||
|
||||
/* XXXX read encrypted, write encrypted. */
|
||||
|
||||
int ed25519_seckey_write_to_file(const ed25519_secret_key_t *seckey,
|
||||
const char *filename,
|
||||
const char *tag);
|
||||
int ed25519_seckey_read_from_file(ed25519_secret_key_t *seckey_out,
|
||||
char **tag_out,
|
||||
const char *filename);
|
||||
int ed25519_pubkey_write_to_file(const ed25519_public_key_t *pubkey,
|
||||
const char *filename,
|
||||
const char *tag);
|
||||
int ed25519_pubkey_read_from_file(ed25519_public_key_t *pubkey_out,
|
||||
char **tag_out,
|
||||
const char *filename);
|
||||
|
||||
#endif
|
||||
|
@ -9,6 +9,7 @@
|
||||
#endif
|
||||
#include "crypto.h"
|
||||
#include "crypto_curve25519.h"
|
||||
#include "crypto_ed25519.h"
|
||||
#include "util.h"
|
||||
#include "torlog.h"
|
||||
|
||||
@ -43,3 +44,24 @@ curve25519_public_from_base64(curve25519_public_key_t *pkey,
|
||||
}
|
||||
}
|
||||
|
||||
/** Try to decode the string <b>input</b> into an ed25519 public key. On
|
||||
* success, store the value in <b>pkey</b> and return 0. Otherwise return
|
||||
* -1. */
|
||||
int
|
||||
ed25519_public_from_base64(ed25519_public_key_t *pkey,
|
||||
const char *input)
|
||||
{
|
||||
return digest256_from_base64((char*)pkey->pubkey, input);
|
||||
}
|
||||
|
||||
/** Encode the public key <b>pkey</b> into the buffer at <b>output</b>,
|
||||
* which must have space for ED25519_BASE64_LEN bytes of encoded key,
|
||||
* plus one byte for a terminating NUL. Return 0 on success, -1 on failure.
|
||||
*/
|
||||
int
|
||||
ed25519_public_to_base64(char *output,
|
||||
const ed25519_public_key_t *pkey)
|
||||
{
|
||||
return digest256_to_base64(output, (const char *)pkey->pubkey);
|
||||
}
|
||||
|
||||
|
@ -52,8 +52,12 @@ LIBDONNA=
|
||||
endif
|
||||
endif
|
||||
|
||||
LIBDONNA += $(LIBED25519_REF10)
|
||||
|
||||
if CURVE25519_ENABLED
|
||||
libcrypto_extra_source=src/common/crypto_curve25519.c
|
||||
libcrypto_extra_source = \
|
||||
src/common/crypto_curve25519.c \
|
||||
src/common/crypto_ed25519.c
|
||||
endif
|
||||
|
||||
LIBOR_A_SOURCES = \
|
||||
@ -114,6 +118,7 @@ COMMONHEADERS = \
|
||||
src/common/container.h \
|
||||
src/common/crypto.h \
|
||||
src/common/crypto_curve25519.h \
|
||||
src/common/crypto_ed25519.h \
|
||||
src/common/crypto_pwbox.h \
|
||||
src/common/crypto_s2k.h \
|
||||
src/common/di_ops.h \
|
||||
|
@ -54,3 +54,10 @@ trunnel/*.[ch]
|
||||
|
||||
Headers and runtime code for Trunnel, a system for generating
|
||||
code to encode and decode binary formats.
|
||||
|
||||
ed25519/ref10/*
|
||||
|
||||
Daniel Bernsten's portable ref10 implementation of ed25519.
|
||||
Public domain.
|
||||
|
||||
|
||||
|
41
src/ext/ed25519/ref10/Makefile
Normal file
41
src/ext/ed25519/ref10/Makefile
Normal file
@ -0,0 +1,41 @@
|
||||
all: d.h d2.h sqrtm1.h base.h base2.h \
|
||||
ge_add.h ge_sub.h \
|
||||
ge_madd.h ge_msub.h \
|
||||
ge_p2_dbl.h \
|
||||
pow225521.h pow22523.h
|
||||
|
||||
d.h: d.py
|
||||
python d.py > d.h
|
||||
|
||||
d2.h: d2.py
|
||||
python d2.py > d2.h
|
||||
|
||||
sqrtm1.h: sqrtm1.py
|
||||
python sqrtm1.py > sqrtm1.h
|
||||
|
||||
base.h: base.py
|
||||
python base.py > base.h
|
||||
|
||||
base2.h: base2.py
|
||||
python base2.py > base2.h
|
||||
|
||||
ge_add.h: ge_add.q q2h.sh
|
||||
./q2h.sh < ge_add.q > ge_add.h
|
||||
|
||||
ge_sub.h: ge_sub.q q2h.sh
|
||||
./q2h.sh < ge_sub.q > ge_sub.h
|
||||
|
||||
ge_madd.h: ge_madd.q q2h.sh
|
||||
./q2h.sh < ge_madd.q > ge_madd.h
|
||||
|
||||
ge_msub.h: ge_msub.q q2h.sh
|
||||
./q2h.sh < ge_msub.q > ge_msub.h
|
||||
|
||||
ge_p2_dbl.h: ge_p2_dbl.q q2h.sh
|
||||
./q2h.sh < ge_p2_dbl.q > ge_p2_dbl.h
|
||||
|
||||
pow22523.h: pow22523.q q2h.sh
|
||||
./q2h.sh < pow22523.q > pow22523.h
|
||||
|
||||
pow225521.h: pow225521.q q2h.sh
|
||||
./q2h.sh < pow225521.q > pow225521.h
|
23
src/ext/ed25519/ref10/README.tor
Normal file
23
src/ext/ed25519/ref10/README.tor
Normal file
@ -0,0 +1,23 @@
|
||||
|
||||
We've made the following changes to the stock ed25519_ref10 from
|
||||
supercop-20140622:
|
||||
|
||||
* We added the necessary glue to provide integers of fixed bit
|
||||
sizes, SHA512, and to compile without warnings everywhere we need
|
||||
to build.
|
||||
|
||||
* Secret keys are stored in expanded format. There are functions
|
||||
to expand them from the 32-byte seed.
|
||||
|
||||
* Signatures are made and processed detached from the messages that
|
||||
they sign. (In other words, we support "make signature" and
|
||||
"check signature", not "create signed message" and "check and
|
||||
unpack signed message".)
|
||||
|
||||
* There's an implementation of 'convert a curve25519 key to an
|
||||
ed25519 key' so we can do cross-certification with curve25519 keys.
|
||||
(keyconv.c)
|
||||
|
||||
* There's an implementation of multiplicative key blinding so we
|
||||
can use it for next-gen hidden srevice descriptors. (blinding.c)
|
||||
|
4
src/ext/ed25519/ref10/api.h
Normal file
4
src/ext/ed25519/ref10/api.h
Normal file
@ -0,0 +1,4 @@
|
||||
#define CRYPTO_SECRETKEYBYTES 64
|
||||
#define CRYPTO_PUBLICKEYBYTES 32
|
||||
#define CRYPTO_BYTES 64
|
||||
#define CRYPTO_DETERMINISTIC 1
|
1344
src/ext/ed25519/ref10/base.h
Normal file
1344
src/ext/ed25519/ref10/base.h
Normal file
File diff suppressed because it is too large
Load Diff
65
src/ext/ed25519/ref10/base.py
Normal file
65
src/ext/ed25519/ref10/base.py
Normal file
@ -0,0 +1,65 @@
|
||||
b = 256
|
||||
q = 2**255 - 19
|
||||
l = 2**252 + 27742317777372353535851937790883648493
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
d = -121665 * inv(121666)
|
||||
I = expmod(2,(q-1)/4,q)
|
||||
|
||||
def xrecover(y):
|
||||
xx = (y*y-1) * inv(d*y*y+1)
|
||||
x = expmod(xx,(q+3)/8,q)
|
||||
if (x*x - xx) % q != 0: x = (x*I) % q
|
||||
if x % 2 != 0: x = q-x
|
||||
return x
|
||||
|
||||
By = 4 * inv(5)
|
||||
Bx = xrecover(By)
|
||||
B = [Bx % q,By % q]
|
||||
|
||||
def edwards(P,Q):
|
||||
x1 = P[0]
|
||||
y1 = P[1]
|
||||
x2 = Q[0]
|
||||
y2 = Q[1]
|
||||
x3 = (x1*y2+x2*y1) * inv(1+d*x1*x2*y1*y2)
|
||||
y3 = (y1*y2+x1*x2) * inv(1-d*x1*x2*y1*y2)
|
||||
return [x3 % q,y3 % q]
|
||||
|
||||
def radix255(x):
|
||||
x = x % q
|
||||
if x + x > q: x -= q
|
||||
x = [x,0,0,0,0,0,0,0,0,0]
|
||||
bits = [26,25,26,25,26,25,26,25,26,25]
|
||||
for i in range(9):
|
||||
carry = (x[i] + 2**(bits[i]-1)) / 2**bits[i]
|
||||
x[i] -= carry * 2**bits[i]
|
||||
x[i + 1] += carry
|
||||
result = ""
|
||||
for i in range(9):
|
||||
result = result+str(x[i])+","
|
||||
result = result+str(x[9])
|
||||
return result
|
||||
|
||||
Bi = B
|
||||
for i in range(32):
|
||||
print "{"
|
||||
Bij = Bi
|
||||
for j in range(8):
|
||||
print " {"
|
||||
print " {",radix255(Bij[1]+Bij[0]),"},"
|
||||
print " {",radix255(Bij[1]-Bij[0]),"},"
|
||||
print " {",radix255(2*d*Bij[0]*Bij[1]),"},"
|
||||
Bij = edwards(Bij,Bi)
|
||||
print " },"
|
||||
print "},"
|
||||
for k in range(8):
|
||||
Bi = edwards(Bi,Bi)
|
40
src/ext/ed25519/ref10/base2.h
Normal file
40
src/ext/ed25519/ref10/base2.h
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
{ 25967493,-14356035,29566456,3660896,-12694345,4014787,27544626,-11754271,-6079156,2047605 },
|
||||
{ -12545711,934262,-2722910,3049990,-727428,9406986,12720692,5043384,19500929,-15469378 },
|
||||
{ -8738181,4489570,9688441,-14785194,10184609,-12363380,29287919,11864899,-24514362,-4438546 },
|
||||
},
|
||||
{
|
||||
{ 15636291,-9688557,24204773,-7912398,616977,-16685262,27787600,-14772189,28944400,-1550024 },
|
||||
{ 16568933,4717097,-11556148,-1102322,15682896,-11807043,16354577,-11775962,7689662,11199574 },
|
||||
{ 30464156,-5976125,-11779434,-15670865,23220365,15915852,7512774,10017326,-17749093,-9920357 },
|
||||
},
|
||||
{
|
||||
{ 10861363,11473154,27284546,1981175,-30064349,12577861,32867885,14515107,-15438304,10819380 },
|
||||
{ 4708026,6336745,20377586,9066809,-11272109,6594696,-25653668,12483688,-12668491,5581306 },
|
||||
{ 19563160,16186464,-29386857,4097519,10237984,-4348115,28542350,13850243,-23678021,-15815942 },
|
||||
},
|
||||
{
|
||||
{ 5153746,9909285,1723747,-2777874,30523605,5516873,19480852,5230134,-23952439,-15175766 },
|
||||
{ -30269007,-3463509,7665486,10083793,28475525,1649722,20654025,16520125,30598449,7715701 },
|
||||
{ 28881845,14381568,9657904,3680757,-20181635,7843316,-31400660,1370708,29794553,-1409300 },
|
||||
},
|
||||
{
|
||||
{ -22518993,-6692182,14201702,-8745502,-23510406,8844726,18474211,-1361450,-13062696,13821877 },
|
||||
{ -6455177,-7839871,3374702,-4740862,-27098617,-10571707,31655028,-7212327,18853322,-14220951 },
|
||||
{ 4566830,-12963868,-28974889,-12240689,-7602672,-2830569,-8514358,-10431137,2207753,-3209784 },
|
||||
},
|
||||
{
|
||||
{ -25154831,-4185821,29681144,7868801,-6854661,-9423865,-12437364,-663000,-31111463,-16132436 },
|
||||
{ 25576264,-2703214,7349804,-11814844,16472782,9300885,3844789,15725684,171356,6466918 },
|
||||
{ 23103977,13316479,9739013,-16149481,817875,-15038942,8965339,-14088058,-30714912,16193877 },
|
||||
},
|
||||
{
|
||||
{ -33521811,3180713,-2394130,14003687,-16903474,-16270840,17238398,4729455,-18074513,9256800 },
|
||||
{ -25182317,-4174131,32336398,5036987,-21236817,11360617,22616405,9761698,-19827198,630305 },
|
||||
{ -13720693,2639453,-24237460,-7406481,9494427,-5774029,-6554551,-15960994,-2449256,-14291300 },
|
||||
},
|
||||
{
|
||||
{ -3151181,-5046075,9282714,6866145,-31907062,-863023,-18940575,15033784,25105118,-7894876 },
|
||||
{ -24326370,15950226,-31801215,-14592823,-11662737,-5090925,1573892,-2625887,2198790,-15804619 },
|
||||
{ -3099351,10324967,-2241613,7453183,-5446979,-2735503,-13812022,-16236442,-32461234,-12290683 },
|
||||
},
|
60
src/ext/ed25519/ref10/base2.py
Normal file
60
src/ext/ed25519/ref10/base2.py
Normal file
@ -0,0 +1,60 @@
|
||||
b = 256
|
||||
q = 2**255 - 19
|
||||
l = 2**252 + 27742317777372353535851937790883648493
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
d = -121665 * inv(121666)
|
||||
I = expmod(2,(q-1)/4,q)
|
||||
|
||||
def xrecover(y):
|
||||
xx = (y*y-1) * inv(d*y*y+1)
|
||||
x = expmod(xx,(q+3)/8,q)
|
||||
if (x*x - xx) % q != 0: x = (x*I) % q
|
||||
if x % 2 != 0: x = q-x
|
||||
return x
|
||||
|
||||
By = 4 * inv(5)
|
||||
Bx = xrecover(By)
|
||||
B = [Bx % q,By % q]
|
||||
|
||||
def edwards(P,Q):
|
||||
x1 = P[0]
|
||||
y1 = P[1]
|
||||
x2 = Q[0]
|
||||
y2 = Q[1]
|
||||
x3 = (x1*y2+x2*y1) * inv(1+d*x1*x2*y1*y2)
|
||||
y3 = (y1*y2+x1*x2) * inv(1-d*x1*x2*y1*y2)
|
||||
return [x3 % q,y3 % q]
|
||||
|
||||
def radix255(x):
|
||||
x = x % q
|
||||
if x + x > q: x -= q
|
||||
x = [x,0,0,0,0,0,0,0,0,0]
|
||||
bits = [26,25,26,25,26,25,26,25,26,25]
|
||||
for i in range(9):
|
||||
carry = (x[i] + 2**(bits[i]-1)) / 2**bits[i]
|
||||
x[i] -= carry * 2**bits[i]
|
||||
x[i + 1] += carry
|
||||
result = ""
|
||||
for i in range(9):
|
||||
result = result+str(x[i])+","
|
||||
result = result+str(x[9])
|
||||
return result
|
||||
|
||||
Bi = B
|
||||
|
||||
for i in range(8):
|
||||
print " {"
|
||||
print " {",radix255(Bi[1]+Bi[0]),"},"
|
||||
print " {",radix255(Bi[1]-Bi[0]),"},"
|
||||
print " {",radix255(2*d*Bi[0]*Bi[1]),"},"
|
||||
print " },"
|
||||
Bi = edwards(B,edwards(B,Bi))
|
76
src/ext/ed25519/ref10/blinding.c
Normal file
76
src/ext/ed25519/ref10/blinding.c
Normal file
@ -0,0 +1,76 @@
|
||||
/* Added to ref10 for Tor. We place this in the public domain. Alternatively,
|
||||
* you may have it under the Creative Commons 0 "CC0" license. */
|
||||
//#include "fe.h"
|
||||
#include "ge.h"
|
||||
#include "sc.h"
|
||||
#include "crypto_hash_sha512.h"
|
||||
#include "ed25519_ref10.h"
|
||||
|
||||
#include <string.h>
|
||||
#include "crypto.h"
|
||||
|
||||
static void
|
||||
gettweak(unsigned char *out, const unsigned char *param)
|
||||
{
|
||||
const char str[] = "Derive temporary signing key";
|
||||
crypto_hash_sha512_2(out, (const unsigned char*)str, strlen(str), param, 32);
|
||||
out[0] &= 248; /* Is this necessary necessary ? */
|
||||
out[31] &= 63;
|
||||
out[31] |= 64;
|
||||
}
|
||||
|
||||
int ed25519_ref10_blind_secret_key(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
const unsigned char *param)
|
||||
{
|
||||
const char str[] = "Derive temporary signing key hash input";
|
||||
unsigned char tweak[64];
|
||||
unsigned char zero[32];
|
||||
gettweak(tweak, param);
|
||||
|
||||
memset(zero, 0, 32);
|
||||
sc_muladd(out, inp, tweak, zero);
|
||||
|
||||
crypto_hash_sha512_2(tweak, (const unsigned char *)str, strlen(str),
|
||||
inp+32, 32);
|
||||
memcpy(out+32, tweak, 32);
|
||||
|
||||
memwipe(tweak, 0, sizeof(tweak));
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int ed25519_ref10_blind_public_key(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
const unsigned char *param)
|
||||
{
|
||||
unsigned char tweak[64];
|
||||
unsigned char zero[32];
|
||||
unsigned char pkcopy[32];
|
||||
ge_p3 A;
|
||||
ge_p2 Aprime;
|
||||
|
||||
gettweak(tweak, param);
|
||||
|
||||
memset(zero, 0, sizeof(zero));
|
||||
/* Not the greatest implementation of all of this. I wish I had
|
||||
* better-suited primitives to work with here... (but I don't wish that so
|
||||
* strongly that I'm about to code my own ge_scalarmult_vartime). */
|
||||
|
||||
/* We negate the public key first, so that we can pass it to
|
||||
* frombytes_negate_vartime, which negates it again. If there were a
|
||||
* "ge_frombytes", we'd use that, but there isn't. */
|
||||
memcpy(pkcopy, inp, 32);
|
||||
pkcopy[31] ^= (1<<7);
|
||||
ge_frombytes_negate_vartime(&A, pkcopy);
|
||||
/* There isn't a regular ge_scalarmult -- we have to do tweak*A + zero*B. */
|
||||
ge_double_scalarmult_vartime(&Aprime, tweak, &A, zero);
|
||||
ge_tobytes(out, &Aprime);
|
||||
|
||||
memwipe(tweak, 0, sizeof(tweak));
|
||||
memwipe(&A, 0, sizeof(A));
|
||||
memwipe(&Aprime, 0, sizeof(Aprime));
|
||||
memwipe(pkcopy, 0, sizeof(pkcopy));
|
||||
|
||||
return 0;
|
||||
}
|
30
src/ext/ed25519/ref10/crypto_hash_sha512.h
Normal file
30
src/ext/ed25519/ref10/crypto_hash_sha512.h
Normal file
@ -0,0 +1,30 @@
|
||||
/* Added for Tor. */
|
||||
#include <openssl/sha.h>
|
||||
|
||||
/* Set 'out' to the 512-bit SHA512 hash of the 'len'-byte string in 'inp' */
|
||||
#define crypto_hash_sha512(out, inp, len) \
|
||||
SHA512((inp), (len), (out))
|
||||
|
||||
/* Set 'out' to the 512-bit SHA512 hash of the 'len1'-byte string in 'inp1',
|
||||
* concatenated with the 'len2'-byte string in 'inp2'. */
|
||||
#define crypto_hash_sha512_2(out, inp1, len1, inp2, len2) \
|
||||
do { \
|
||||
SHA512_CTX sha_ctx_; \
|
||||
SHA512_Init(&sha_ctx_); \
|
||||
SHA512_Update(&sha_ctx_, (inp1), (len1)); \
|
||||
SHA512_Update(&sha_ctx_, (inp2), (len2)); \
|
||||
SHA512_Final((out), &sha_ctx_); \
|
||||
} while(0)
|
||||
|
||||
/* Set 'out' to the 512-bit SHA512 hash of the 'len1'-byte string in 'inp1',
|
||||
* concatenated with the 'len2'-byte string in 'inp2', concatenated with
|
||||
* the 'len3'-byte string in 'len3'. */
|
||||
#define crypto_hash_sha512_3(out, inp1, len1, inp2, len2, inp3, len3) \
|
||||
do { \
|
||||
SHA512_CTX sha_ctx_; \
|
||||
SHA512_Init(&sha_ctx_); \
|
||||
SHA512_Update(&sha_ctx_, (inp1), (len1)); \
|
||||
SHA512_Update(&sha_ctx_, (inp2), (len2)); \
|
||||
SHA512_Update(&sha_ctx_, (inp3), (len3)); \
|
||||
SHA512_Final((out), &sha_ctx_); \
|
||||
} while(0)
|
3
src/ext/ed25519/ref10/crypto_int32.h
Normal file
3
src/ext/ed25519/ref10/crypto_int32.h
Normal file
@ -0,0 +1,3 @@
|
||||
/* Added for Tor. */
|
||||
#include "torint.h"
|
||||
#define crypto_int32 int32_t
|
3
src/ext/ed25519/ref10/crypto_int64.h
Normal file
3
src/ext/ed25519/ref10/crypto_int64.h
Normal file
@ -0,0 +1,3 @@
|
||||
/* Added for Tor. */
|
||||
#include "torint.h"
|
||||
#define crypto_int64 int64_t
|
9
src/ext/ed25519/ref10/crypto_sign.h
Normal file
9
src/ext/ed25519/ref10/crypto_sign.h
Normal file
@ -0,0 +1,9 @@
|
||||
/* Added for Tor */
|
||||
#define crypto_sign ed25519_ref10_sign
|
||||
#define crypto_sign_keypair ed25519_ref10_keygen
|
||||
#define crypto_sign_seckey ed25519_ref10_seckey
|
||||
#define crypto_sign_seckey_expand ed25519_ref10_seckey_expand
|
||||
#define crypto_sign_pubkey ed25519_ref10_pubkey
|
||||
#define crypto_sign_open ed25519_ref10_open
|
||||
|
||||
#include "ed25519_ref10.h"
|
3
src/ext/ed25519/ref10/crypto_uint32.h
Normal file
3
src/ext/ed25519/ref10/crypto_uint32.h
Normal file
@ -0,0 +1,3 @@
|
||||
/* Added for Tor. */
|
||||
#include "torint.h"
|
||||
#define crypto_uint32 uint32_t
|
3
src/ext/ed25519/ref10/crypto_uint64.h
Normal file
3
src/ext/ed25519/ref10/crypto_uint64.h
Normal file
@ -0,0 +1,3 @@
|
||||
/* Added for Tor. */
|
||||
#include "torint.h"
|
||||
#define crypto_uint64 uint64_t
|
5
src/ext/ed25519/ref10/crypto_verify_32.h
Normal file
5
src/ext/ed25519/ref10/crypto_verify_32.h
Normal file
@ -0,0 +1,5 @@
|
||||
/* Added for Tor. */
|
||||
#include "di_ops.h"
|
||||
#define crypto_verify_32(a,b) \
|
||||
(! tor_memeq((a), (b), 32))
|
||||
|
1
src/ext/ed25519/ref10/d.h
Normal file
1
src/ext/ed25519/ref10/d.h
Normal file
@ -0,0 +1 @@
|
||||
-10913610,13857413,-15372611,6949391,114729,-8787816,-6275908,-3247719,-18696448,-12055116
|
28
src/ext/ed25519/ref10/d.py
Normal file
28
src/ext/ed25519/ref10/d.py
Normal file
@ -0,0 +1,28 @@
|
||||
q = 2**255 - 19
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
def radix255(x):
|
||||
x = x % q
|
||||
if x + x > q: x -= q
|
||||
x = [x,0,0,0,0,0,0,0,0,0]
|
||||
bits = [26,25,26,25,26,25,26,25,26,25]
|
||||
for i in range(9):
|
||||
carry = (x[i] + 2**(bits[i]-1)) / 2**bits[i]
|
||||
x[i] -= carry * 2**bits[i]
|
||||
x[i + 1] += carry
|
||||
result = ""
|
||||
for i in range(9):
|
||||
result = result+str(x[i])+","
|
||||
result = result+str(x[9])
|
||||
return result
|
||||
|
||||
d = -121665 * inv(121666)
|
||||
print radix255(d)
|
1
src/ext/ed25519/ref10/d2.h
Normal file
1
src/ext/ed25519/ref10/d2.h
Normal file
@ -0,0 +1 @@
|
||||
-21827239,-5839606,-30745221,13898782,229458,15978800,-12551817,-6495438,29715968,9444199
|
28
src/ext/ed25519/ref10/d2.py
Normal file
28
src/ext/ed25519/ref10/d2.py
Normal file
@ -0,0 +1,28 @@
|
||||
q = 2**255 - 19
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
def radix255(x):
|
||||
x = x % q
|
||||
if x + x > q: x -= q
|
||||
x = [x,0,0,0,0,0,0,0,0,0]
|
||||
bits = [26,25,26,25,26,25,26,25,26,25]
|
||||
for i in range(9):
|
||||
carry = (x[i] + 2**(bits[i]-1)) / 2**bits[i]
|
||||
x[i] -= carry * 2**bits[i]
|
||||
x[i + 1] += carry
|
||||
result = ""
|
||||
for i in range(9):
|
||||
result = result+str(x[i])+","
|
||||
result = result+str(x[9])
|
||||
return result
|
||||
|
||||
d = -121665 * inv(121666)
|
||||
print radix255(d*2)
|
30
src/ext/ed25519/ref10/ed25519_ref10.h
Normal file
30
src/ext/ed25519/ref10/ed25519_ref10.h
Normal file
@ -0,0 +1,30 @@
|
||||
/* Added for Tor */
|
||||
#ifndef SRC_EXT_ED25519_REF10_H_INCLUDED_
|
||||
#define SRC_EXT_ED25519_REF10_H_INCLUDED_
|
||||
#include <torint.h>
|
||||
|
||||
int ed25519_ref10_seckey(unsigned char *sk);
|
||||
int ed25519_ref10_seckey_expand(unsigned char *sk, const unsigned char *sk_seed);
|
||||
int ed25519_ref10_pubkey(unsigned char *pk,const unsigned char *sk);
|
||||
int ed25519_ref10_keygen(unsigned char *pk,unsigned char *sk);
|
||||
int ed25519_ref10_open(
|
||||
const unsigned char *signature,
|
||||
const unsigned char *m,uint64_t mlen,
|
||||
const unsigned char *pk);
|
||||
int ed25519_ref10_sign(
|
||||
unsigned char *sig,
|
||||
const unsigned char *m,uint64_t mlen,
|
||||
const unsigned char *sk, const unsigned char *pk);
|
||||
|
||||
/* Added in Tor */
|
||||
int ed25519_ref10_pubkey_from_curve25519_pubkey(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
int signbit);
|
||||
int ed25519_ref10_blind_secret_key(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
const unsigned char *param);
|
||||
int ed25519_ref10_blind_public_key(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
const unsigned char *param);
|
||||
|
||||
#endif
|
56
src/ext/ed25519/ref10/fe.h
Normal file
56
src/ext/ed25519/ref10/fe.h
Normal file
@ -0,0 +1,56 @@
|
||||
#ifndef FE_H
|
||||
#define FE_H
|
||||
|
||||
#include "crypto_int32.h"
|
||||
|
||||
typedef crypto_int32 fe[10];
|
||||
|
||||
/*
|
||||
fe means field element.
|
||||
Here the field is \Z/(2^255-19).
|
||||
An element t, entries t[0]...t[9], represents the integer
|
||||
t[0]+2^26 t[1]+2^51 t[2]+2^77 t[3]+2^102 t[4]+...+2^230 t[9].
|
||||
Bounds on each t[i] vary depending on context.
|
||||
*/
|
||||
|
||||
#define fe_frombytes crypto_sign_ed25519_ref10_fe_frombytes
|
||||
#define fe_tobytes crypto_sign_ed25519_ref10_fe_tobytes
|
||||
#define fe_copy crypto_sign_ed25519_ref10_fe_copy
|
||||
#define fe_isnonzero crypto_sign_ed25519_ref10_fe_isnonzero
|
||||
#define fe_isnegative crypto_sign_ed25519_ref10_fe_isnegative
|
||||
#define fe_0 crypto_sign_ed25519_ref10_fe_0
|
||||
#define fe_1 crypto_sign_ed25519_ref10_fe_1
|
||||
#define fe_cswap crypto_sign_ed25519_ref10_fe_cswap
|
||||
#define fe_cmov crypto_sign_ed25519_ref10_fe_cmov
|
||||
#define fe_add crypto_sign_ed25519_ref10_fe_add
|
||||
#define fe_sub crypto_sign_ed25519_ref10_fe_sub
|
||||
#define fe_neg crypto_sign_ed25519_ref10_fe_neg
|
||||
#define fe_mul crypto_sign_ed25519_ref10_fe_mul
|
||||
#define fe_sq crypto_sign_ed25519_ref10_fe_sq
|
||||
#define fe_sq2 crypto_sign_ed25519_ref10_fe_sq2
|
||||
#define fe_mul121666 crypto_sign_ed25519_ref10_fe_mul121666
|
||||
#define fe_invert crypto_sign_ed25519_ref10_fe_invert
|
||||
#define fe_pow22523 crypto_sign_ed25519_ref10_fe_pow22523
|
||||
|
||||
extern void fe_frombytes(fe,const unsigned char *);
|
||||
extern void fe_tobytes(unsigned char *,const fe);
|
||||
|
||||
extern void fe_copy(fe,const fe);
|
||||
extern int fe_isnonzero(const fe);
|
||||
extern int fe_isnegative(const fe);
|
||||
extern void fe_0(fe);
|
||||
extern void fe_1(fe);
|
||||
extern void fe_cswap(fe,fe,unsigned int);
|
||||
extern void fe_cmov(fe,const fe,unsigned int);
|
||||
|
||||
extern void fe_add(fe,const fe,const fe);
|
||||
extern void fe_sub(fe,const fe,const fe);
|
||||
extern void fe_neg(fe,const fe);
|
||||
extern void fe_mul(fe,const fe,const fe);
|
||||
extern void fe_sq(fe,const fe);
|
||||
extern void fe_sq2(fe,const fe);
|
||||
extern void fe_mul121666(fe,const fe);
|
||||
extern void fe_invert(fe,const fe);
|
||||
extern void fe_pow22523(fe,const fe);
|
||||
|
||||
#endif
|
19
src/ext/ed25519/ref10/fe_0.c
Normal file
19
src/ext/ed25519/ref10/fe_0.c
Normal file
@ -0,0 +1,19 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = 0
|
||||
*/
|
||||
|
||||
void fe_0(fe h)
|
||||
{
|
||||
h[0] = 0;
|
||||
h[1] = 0;
|
||||
h[2] = 0;
|
||||
h[3] = 0;
|
||||
h[4] = 0;
|
||||
h[5] = 0;
|
||||
h[6] = 0;
|
||||
h[7] = 0;
|
||||
h[8] = 0;
|
||||
h[9] = 0;
|
||||
}
|
19
src/ext/ed25519/ref10/fe_1.c
Normal file
19
src/ext/ed25519/ref10/fe_1.c
Normal file
@ -0,0 +1,19 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = 1
|
||||
*/
|
||||
|
||||
void fe_1(fe h)
|
||||
{
|
||||
h[0] = 1;
|
||||
h[1] = 0;
|
||||
h[2] = 0;
|
||||
h[3] = 0;
|
||||
h[4] = 0;
|
||||
h[5] = 0;
|
||||
h[6] = 0;
|
||||
h[7] = 0;
|
||||
h[8] = 0;
|
||||
h[9] = 0;
|
||||
}
|
57
src/ext/ed25519/ref10/fe_add.c
Normal file
57
src/ext/ed25519/ref10/fe_add.c
Normal file
@ -0,0 +1,57 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = f + g
|
||||
Can overlap h with f or g.
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
|g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc.
|
||||
*/
|
||||
|
||||
void fe_add(fe h,const fe f,const fe g)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 g0 = g[0];
|
||||
crypto_int32 g1 = g[1];
|
||||
crypto_int32 g2 = g[2];
|
||||
crypto_int32 g3 = g[3];
|
||||
crypto_int32 g4 = g[4];
|
||||
crypto_int32 g5 = g[5];
|
||||
crypto_int32 g6 = g[6];
|
||||
crypto_int32 g7 = g[7];
|
||||
crypto_int32 g8 = g[8];
|
||||
crypto_int32 g9 = g[9];
|
||||
crypto_int32 h0 = f0 + g0;
|
||||
crypto_int32 h1 = f1 + g1;
|
||||
crypto_int32 h2 = f2 + g2;
|
||||
crypto_int32 h3 = f3 + g3;
|
||||
crypto_int32 h4 = f4 + g4;
|
||||
crypto_int32 h5 = f5 + g5;
|
||||
crypto_int32 h6 = f6 + g6;
|
||||
crypto_int32 h7 = f7 + g7;
|
||||
crypto_int32 h8 = f8 + g8;
|
||||
crypto_int32 h9 = f9 + g9;
|
||||
h[0] = h0;
|
||||
h[1] = h1;
|
||||
h[2] = h2;
|
||||
h[3] = h3;
|
||||
h[4] = h4;
|
||||
h[5] = h5;
|
||||
h[6] = h6;
|
||||
h[7] = h7;
|
||||
h[8] = h8;
|
||||
h[9] = h9;
|
||||
}
|
63
src/ext/ed25519/ref10/fe_cmov.c
Normal file
63
src/ext/ed25519/ref10/fe_cmov.c
Normal file
@ -0,0 +1,63 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
Replace (f,g) with (g,g) if b == 1;
|
||||
replace (f,g) with (f,g) if b == 0.
|
||||
|
||||
Preconditions: b in {0,1}.
|
||||
*/
|
||||
|
||||
void fe_cmov(fe f,const fe g,unsigned int b)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 g0 = g[0];
|
||||
crypto_int32 g1 = g[1];
|
||||
crypto_int32 g2 = g[2];
|
||||
crypto_int32 g3 = g[3];
|
||||
crypto_int32 g4 = g[4];
|
||||
crypto_int32 g5 = g[5];
|
||||
crypto_int32 g6 = g[6];
|
||||
crypto_int32 g7 = g[7];
|
||||
crypto_int32 g8 = g[8];
|
||||
crypto_int32 g9 = g[9];
|
||||
crypto_int32 x0 = f0 ^ g0;
|
||||
crypto_int32 x1 = f1 ^ g1;
|
||||
crypto_int32 x2 = f2 ^ g2;
|
||||
crypto_int32 x3 = f3 ^ g3;
|
||||
crypto_int32 x4 = f4 ^ g4;
|
||||
crypto_int32 x5 = f5 ^ g5;
|
||||
crypto_int32 x6 = f6 ^ g6;
|
||||
crypto_int32 x7 = f7 ^ g7;
|
||||
crypto_int32 x8 = f8 ^ g8;
|
||||
crypto_int32 x9 = f9 ^ g9;
|
||||
b = -b;
|
||||
x0 &= b;
|
||||
x1 &= b;
|
||||
x2 &= b;
|
||||
x3 &= b;
|
||||
x4 &= b;
|
||||
x5 &= b;
|
||||
x6 &= b;
|
||||
x7 &= b;
|
||||
x8 &= b;
|
||||
x9 &= b;
|
||||
f[0] = f0 ^ x0;
|
||||
f[1] = f1 ^ x1;
|
||||
f[2] = f2 ^ x2;
|
||||
f[3] = f3 ^ x3;
|
||||
f[4] = f4 ^ x4;
|
||||
f[5] = f5 ^ x5;
|
||||
f[6] = f6 ^ x6;
|
||||
f[7] = f7 ^ x7;
|
||||
f[8] = f8 ^ x8;
|
||||
f[9] = f9 ^ x9;
|
||||
}
|
29
src/ext/ed25519/ref10/fe_copy.c
Normal file
29
src/ext/ed25519/ref10/fe_copy.c
Normal file
@ -0,0 +1,29 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = f
|
||||
*/
|
||||
|
||||
void fe_copy(fe h,const fe f)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
h[0] = f0;
|
||||
h[1] = f1;
|
||||
h[2] = f2;
|
||||
h[3] = f3;
|
||||
h[4] = f4;
|
||||
h[5] = f5;
|
||||
h[6] = f6;
|
||||
h[7] = f7;
|
||||
h[8] = f8;
|
||||
h[9] = f9;
|
||||
}
|
73
src/ext/ed25519/ref10/fe_frombytes.c
Normal file
73
src/ext/ed25519/ref10/fe_frombytes.c
Normal file
@ -0,0 +1,73 @@
|
||||
#include "fe.h"
|
||||
#include "crypto_int64.h"
|
||||
#include "crypto_uint64.h"
|
||||
|
||||
static crypto_uint64 load_3(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
return result;
|
||||
}
|
||||
|
||||
static crypto_uint64 load_4(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
result |= ((crypto_uint64) in[3]) << 24;
|
||||
return result;
|
||||
}
|
||||
|
||||
/*
|
||||
Ignores top bit of h.
|
||||
*/
|
||||
|
||||
void fe_frombytes(fe h,const unsigned char *s)
|
||||
{
|
||||
crypto_int64 h0 = load_4(s);
|
||||
crypto_int64 h1 = load_3(s + 4) << 6;
|
||||
crypto_int64 h2 = load_3(s + 7) << 5;
|
||||
crypto_int64 h3 = load_3(s + 10) << 3;
|
||||
crypto_int64 h4 = load_3(s + 13) << 2;
|
||||
crypto_int64 h5 = load_4(s + 16);
|
||||
crypto_int64 h6 = load_3(s + 20) << 7;
|
||||
crypto_int64 h7 = load_3(s + 23) << 5;
|
||||
crypto_int64 h8 = load_3(s + 26) << 4;
|
||||
crypto_int64 h9 = (load_3(s + 29) & 8388607) << 2;
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
|
||||
carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25;
|
||||
carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25;
|
||||
carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25;
|
||||
carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25;
|
||||
carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25;
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26;
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26;
|
||||
carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26;
|
||||
|
||||
h[0] = (crypto_int32) h0;
|
||||
h[1] = (crypto_int32) h1;
|
||||
h[2] = (crypto_int32) h2;
|
||||
h[3] = (crypto_int32) h3;
|
||||
h[4] = (crypto_int32) h4;
|
||||
h[5] = (crypto_int32) h5;
|
||||
h[6] = (crypto_int32) h6;
|
||||
h[7] = (crypto_int32) h7;
|
||||
h[8] = (crypto_int32) h8;
|
||||
h[9] = (crypto_int32) h9;
|
||||
}
|
14
src/ext/ed25519/ref10/fe_invert.c
Normal file
14
src/ext/ed25519/ref10/fe_invert.c
Normal file
@ -0,0 +1,14 @@
|
||||
#include "fe.h"
|
||||
|
||||
void fe_invert(fe out,const fe z)
|
||||
{
|
||||
fe t0;
|
||||
fe t1;
|
||||
fe t2;
|
||||
fe t3;
|
||||
int i;
|
||||
|
||||
#include "pow225521.h"
|
||||
|
||||
return;
|
||||
}
|
16
src/ext/ed25519/ref10/fe_isnegative.c
Normal file
16
src/ext/ed25519/ref10/fe_isnegative.c
Normal file
@ -0,0 +1,16 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
return 1 if f is in {1,3,5,...,q-2}
|
||||
return 0 if f is in {0,2,4,...,q-1}
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc.
|
||||
*/
|
||||
|
||||
int fe_isnegative(const fe f)
|
||||
{
|
||||
unsigned char s[32];
|
||||
fe_tobytes(s,f);
|
||||
return s[0] & 1;
|
||||
}
|
19
src/ext/ed25519/ref10/fe_isnonzero.c
Normal file
19
src/ext/ed25519/ref10/fe_isnonzero.c
Normal file
@ -0,0 +1,19 @@
|
||||
#include "fe.h"
|
||||
#include "crypto_verify_32.h"
|
||||
|
||||
/*
|
||||
return 1 if f == 0
|
||||
return 0 if f != 0
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc.
|
||||
*/
|
||||
|
||||
static const unsigned char zero[32];
|
||||
|
||||
int fe_isnonzero(const fe f)
|
||||
{
|
||||
unsigned char s[32];
|
||||
fe_tobytes(s,f);
|
||||
return crypto_verify_32(s,zero);
|
||||
}
|
253
src/ext/ed25519/ref10/fe_mul.c
Normal file
253
src/ext/ed25519/ref10/fe_mul.c
Normal file
@ -0,0 +1,253 @@
|
||||
#include "fe.h"
|
||||
#include "crypto_int64.h"
|
||||
|
||||
/*
|
||||
h = f * g
|
||||
Can overlap h with f or g.
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc.
|
||||
|g| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc.
|
||||
*/
|
||||
|
||||
/*
|
||||
Notes on implementation strategy:
|
||||
|
||||
Using schoolbook multiplication.
|
||||
Karatsuba would save a little in some cost models.
|
||||
|
||||
Most multiplications by 2 and 19 are 32-bit precomputations;
|
||||
cheaper than 64-bit postcomputations.
|
||||
|
||||
There is one remaining multiplication by 19 in the carry chain;
|
||||
one *19 precomputation can be merged into this,
|
||||
but the resulting data flow is considerably less clean.
|
||||
|
||||
There are 12 carries below.
|
||||
10 of them are 2-way parallelizable and vectorizable.
|
||||
Can get away with 11 carries, but then data flow is much deeper.
|
||||
|
||||
With tighter constraints on inputs can squeeze carries into int32.
|
||||
*/
|
||||
|
||||
void fe_mul(fe h,const fe f,const fe g)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 g0 = g[0];
|
||||
crypto_int32 g1 = g[1];
|
||||
crypto_int32 g2 = g[2];
|
||||
crypto_int32 g3 = g[3];
|
||||
crypto_int32 g4 = g[4];
|
||||
crypto_int32 g5 = g[5];
|
||||
crypto_int32 g6 = g[6];
|
||||
crypto_int32 g7 = g[7];
|
||||
crypto_int32 g8 = g[8];
|
||||
crypto_int32 g9 = g[9];
|
||||
crypto_int32 g1_19 = 19 * g1; /* 1.959375*2^29 */
|
||||
crypto_int32 g2_19 = 19 * g2; /* 1.959375*2^30; still ok */
|
||||
crypto_int32 g3_19 = 19 * g3;
|
||||
crypto_int32 g4_19 = 19 * g4;
|
||||
crypto_int32 g5_19 = 19 * g5;
|
||||
crypto_int32 g6_19 = 19 * g6;
|
||||
crypto_int32 g7_19 = 19 * g7;
|
||||
crypto_int32 g8_19 = 19 * g8;
|
||||
crypto_int32 g9_19 = 19 * g9;
|
||||
crypto_int32 f1_2 = 2 * f1;
|
||||
crypto_int32 f3_2 = 2 * f3;
|
||||
crypto_int32 f5_2 = 2 * f5;
|
||||
crypto_int32 f7_2 = 2 * f7;
|
||||
crypto_int32 f9_2 = 2 * f9;
|
||||
crypto_int64 f0g0 = f0 * (crypto_int64) g0;
|
||||
crypto_int64 f0g1 = f0 * (crypto_int64) g1;
|
||||
crypto_int64 f0g2 = f0 * (crypto_int64) g2;
|
||||
crypto_int64 f0g3 = f0 * (crypto_int64) g3;
|
||||
crypto_int64 f0g4 = f0 * (crypto_int64) g4;
|
||||
crypto_int64 f0g5 = f0 * (crypto_int64) g5;
|
||||
crypto_int64 f0g6 = f0 * (crypto_int64) g6;
|
||||
crypto_int64 f0g7 = f0 * (crypto_int64) g7;
|
||||
crypto_int64 f0g8 = f0 * (crypto_int64) g8;
|
||||
crypto_int64 f0g9 = f0 * (crypto_int64) g9;
|
||||
crypto_int64 f1g0 = f1 * (crypto_int64) g0;
|
||||
crypto_int64 f1g1_2 = f1_2 * (crypto_int64) g1;
|
||||
crypto_int64 f1g2 = f1 * (crypto_int64) g2;
|
||||
crypto_int64 f1g3_2 = f1_2 * (crypto_int64) g3;
|
||||
crypto_int64 f1g4 = f1 * (crypto_int64) g4;
|
||||
crypto_int64 f1g5_2 = f1_2 * (crypto_int64) g5;
|
||||
crypto_int64 f1g6 = f1 * (crypto_int64) g6;
|
||||
crypto_int64 f1g7_2 = f1_2 * (crypto_int64) g7;
|
||||
crypto_int64 f1g8 = f1 * (crypto_int64) g8;
|
||||
crypto_int64 f1g9_38 = f1_2 * (crypto_int64) g9_19;
|
||||
crypto_int64 f2g0 = f2 * (crypto_int64) g0;
|
||||
crypto_int64 f2g1 = f2 * (crypto_int64) g1;
|
||||
crypto_int64 f2g2 = f2 * (crypto_int64) g2;
|
||||
crypto_int64 f2g3 = f2 * (crypto_int64) g3;
|
||||
crypto_int64 f2g4 = f2 * (crypto_int64) g4;
|
||||
crypto_int64 f2g5 = f2 * (crypto_int64) g5;
|
||||
crypto_int64 f2g6 = f2 * (crypto_int64) g6;
|
||||
crypto_int64 f2g7 = f2 * (crypto_int64) g7;
|
||||
crypto_int64 f2g8_19 = f2 * (crypto_int64) g8_19;
|
||||
crypto_int64 f2g9_19 = f2 * (crypto_int64) g9_19;
|
||||
crypto_int64 f3g0 = f3 * (crypto_int64) g0;
|
||||
crypto_int64 f3g1_2 = f3_2 * (crypto_int64) g1;
|
||||
crypto_int64 f3g2 = f3 * (crypto_int64) g2;
|
||||
crypto_int64 f3g3_2 = f3_2 * (crypto_int64) g3;
|
||||
crypto_int64 f3g4 = f3 * (crypto_int64) g4;
|
||||
crypto_int64 f3g5_2 = f3_2 * (crypto_int64) g5;
|
||||
crypto_int64 f3g6 = f3 * (crypto_int64) g6;
|
||||
crypto_int64 f3g7_38 = f3_2 * (crypto_int64) g7_19;
|
||||
crypto_int64 f3g8_19 = f3 * (crypto_int64) g8_19;
|
||||
crypto_int64 f3g9_38 = f3_2 * (crypto_int64) g9_19;
|
||||
crypto_int64 f4g0 = f4 * (crypto_int64) g0;
|
||||
crypto_int64 f4g1 = f4 * (crypto_int64) g1;
|
||||
crypto_int64 f4g2 = f4 * (crypto_int64) g2;
|
||||
crypto_int64 f4g3 = f4 * (crypto_int64) g3;
|
||||
crypto_int64 f4g4 = f4 * (crypto_int64) g4;
|
||||
crypto_int64 f4g5 = f4 * (crypto_int64) g5;
|
||||
crypto_int64 f4g6_19 = f4 * (crypto_int64) g6_19;
|
||||
crypto_int64 f4g7_19 = f4 * (crypto_int64) g7_19;
|
||||
crypto_int64 f4g8_19 = f4 * (crypto_int64) g8_19;
|
||||
crypto_int64 f4g9_19 = f4 * (crypto_int64) g9_19;
|
||||
crypto_int64 f5g0 = f5 * (crypto_int64) g0;
|
||||
crypto_int64 f5g1_2 = f5_2 * (crypto_int64) g1;
|
||||
crypto_int64 f5g2 = f5 * (crypto_int64) g2;
|
||||
crypto_int64 f5g3_2 = f5_2 * (crypto_int64) g3;
|
||||
crypto_int64 f5g4 = f5 * (crypto_int64) g4;
|
||||
crypto_int64 f5g5_38 = f5_2 * (crypto_int64) g5_19;
|
||||
crypto_int64 f5g6_19 = f5 * (crypto_int64) g6_19;
|
||||
crypto_int64 f5g7_38 = f5_2 * (crypto_int64) g7_19;
|
||||
crypto_int64 f5g8_19 = f5 * (crypto_int64) g8_19;
|
||||
crypto_int64 f5g9_38 = f5_2 * (crypto_int64) g9_19;
|
||||
crypto_int64 f6g0 = f6 * (crypto_int64) g0;
|
||||
crypto_int64 f6g1 = f6 * (crypto_int64) g1;
|
||||
crypto_int64 f6g2 = f6 * (crypto_int64) g2;
|
||||
crypto_int64 f6g3 = f6 * (crypto_int64) g3;
|
||||
crypto_int64 f6g4_19 = f6 * (crypto_int64) g4_19;
|
||||
crypto_int64 f6g5_19 = f6 * (crypto_int64) g5_19;
|
||||
crypto_int64 f6g6_19 = f6 * (crypto_int64) g6_19;
|
||||
crypto_int64 f6g7_19 = f6 * (crypto_int64) g7_19;
|
||||
crypto_int64 f6g8_19 = f6 * (crypto_int64) g8_19;
|
||||
crypto_int64 f6g9_19 = f6 * (crypto_int64) g9_19;
|
||||
crypto_int64 f7g0 = f7 * (crypto_int64) g0;
|
||||
crypto_int64 f7g1_2 = f7_2 * (crypto_int64) g1;
|
||||
crypto_int64 f7g2 = f7 * (crypto_int64) g2;
|
||||
crypto_int64 f7g3_38 = f7_2 * (crypto_int64) g3_19;
|
||||
crypto_int64 f7g4_19 = f7 * (crypto_int64) g4_19;
|
||||
crypto_int64 f7g5_38 = f7_2 * (crypto_int64) g5_19;
|
||||
crypto_int64 f7g6_19 = f7 * (crypto_int64) g6_19;
|
||||
crypto_int64 f7g7_38 = f7_2 * (crypto_int64) g7_19;
|
||||
crypto_int64 f7g8_19 = f7 * (crypto_int64) g8_19;
|
||||
crypto_int64 f7g9_38 = f7_2 * (crypto_int64) g9_19;
|
||||
crypto_int64 f8g0 = f8 * (crypto_int64) g0;
|
||||
crypto_int64 f8g1 = f8 * (crypto_int64) g1;
|
||||
crypto_int64 f8g2_19 = f8 * (crypto_int64) g2_19;
|
||||
crypto_int64 f8g3_19 = f8 * (crypto_int64) g3_19;
|
||||
crypto_int64 f8g4_19 = f8 * (crypto_int64) g4_19;
|
||||
crypto_int64 f8g5_19 = f8 * (crypto_int64) g5_19;
|
||||
crypto_int64 f8g6_19 = f8 * (crypto_int64) g6_19;
|
||||
crypto_int64 f8g7_19 = f8 * (crypto_int64) g7_19;
|
||||
crypto_int64 f8g8_19 = f8 * (crypto_int64) g8_19;
|
||||
crypto_int64 f8g9_19 = f8 * (crypto_int64) g9_19;
|
||||
crypto_int64 f9g0 = f9 * (crypto_int64) g0;
|
||||
crypto_int64 f9g1_38 = f9_2 * (crypto_int64) g1_19;
|
||||
crypto_int64 f9g2_19 = f9 * (crypto_int64) g2_19;
|
||||
crypto_int64 f9g3_38 = f9_2 * (crypto_int64) g3_19;
|
||||
crypto_int64 f9g4_19 = f9 * (crypto_int64) g4_19;
|
||||
crypto_int64 f9g5_38 = f9_2 * (crypto_int64) g5_19;
|
||||
crypto_int64 f9g6_19 = f9 * (crypto_int64) g6_19;
|
||||
crypto_int64 f9g7_38 = f9_2 * (crypto_int64) g7_19;
|
||||
crypto_int64 f9g8_19 = f9 * (crypto_int64) g8_19;
|
||||
crypto_int64 f9g9_38 = f9_2 * (crypto_int64) g9_19;
|
||||
crypto_int64 h0 = f0g0+f1g9_38+f2g8_19+f3g7_38+f4g6_19+f5g5_38+f6g4_19+f7g3_38+f8g2_19+f9g1_38;
|
||||
crypto_int64 h1 = f0g1+f1g0 +f2g9_19+f3g8_19+f4g7_19+f5g6_19+f6g5_19+f7g4_19+f8g3_19+f9g2_19;
|
||||
crypto_int64 h2 = f0g2+f1g1_2 +f2g0 +f3g9_38+f4g8_19+f5g7_38+f6g6_19+f7g5_38+f8g4_19+f9g3_38;
|
||||
crypto_int64 h3 = f0g3+f1g2 +f2g1 +f3g0 +f4g9_19+f5g8_19+f6g7_19+f7g6_19+f8g5_19+f9g4_19;
|
||||
crypto_int64 h4 = f0g4+f1g3_2 +f2g2 +f3g1_2 +f4g0 +f5g9_38+f6g8_19+f7g7_38+f8g6_19+f9g5_38;
|
||||
crypto_int64 h5 = f0g5+f1g4 +f2g3 +f3g2 +f4g1 +f5g0 +f6g9_19+f7g8_19+f8g7_19+f9g6_19;
|
||||
crypto_int64 h6 = f0g6+f1g5_2 +f2g4 +f3g3_2 +f4g2 +f5g1_2 +f6g0 +f7g9_38+f8g8_19+f9g7_38;
|
||||
crypto_int64 h7 = f0g7+f1g6 +f2g5 +f3g4 +f4g3 +f5g2 +f6g1 +f7g0 +f8g9_19+f9g8_19;
|
||||
crypto_int64 h8 = f0g8+f1g7_2 +f2g6 +f3g5_2 +f4g4 +f5g3_2 +f6g2 +f7g1_2 +f8g0 +f9g9_38;
|
||||
crypto_int64 h9 = f0g9+f1g8 +f2g7 +f3g6 +f4g5 +f5g4 +f6g3 +f7g2 +f8g1 +f9g0 ;
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
|
||||
/*
|
||||
|h0| <= (1.65*1.65*2^52*(1+19+19+19+19)+1.65*1.65*2^50*(38+38+38+38+38))
|
||||
i.e. |h0| <= 1.4*2^60; narrower ranges for h2, h4, h6, h8
|
||||
|h1| <= (1.65*1.65*2^51*(1+1+19+19+19+19+19+19+19+19))
|
||||
i.e. |h1| <= 1.7*2^59; narrower ranges for h3, h5, h7, h9
|
||||
*/
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
/* |h0| <= 2^25 */
|
||||
/* |h4| <= 2^25 */
|
||||
/* |h1| <= 1.71*2^59 */
|
||||
/* |h5| <= 1.71*2^59 */
|
||||
|
||||
carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25;
|
||||
carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25;
|
||||
/* |h1| <= 2^24; from now on fits into int32 */
|
||||
/* |h5| <= 2^24; from now on fits into int32 */
|
||||
/* |h2| <= 1.41*2^60 */
|
||||
/* |h6| <= 1.41*2^60 */
|
||||
|
||||
carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26;
|
||||
carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26;
|
||||
/* |h2| <= 2^25; from now on fits into int32 unchanged */
|
||||
/* |h6| <= 2^25; from now on fits into int32 unchanged */
|
||||
/* |h3| <= 1.71*2^59 */
|
||||
/* |h7| <= 1.71*2^59 */
|
||||
|
||||
carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25;
|
||||
carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25;
|
||||
/* |h3| <= 2^24; from now on fits into int32 unchanged */
|
||||
/* |h7| <= 2^24; from now on fits into int32 unchanged */
|
||||
/* |h4| <= 1.72*2^34 */
|
||||
/* |h8| <= 1.41*2^60 */
|
||||
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26;
|
||||
/* |h4| <= 2^25; from now on fits into int32 unchanged */
|
||||
/* |h8| <= 2^25; from now on fits into int32 unchanged */
|
||||
/* |h5| <= 1.01*2^24 */
|
||||
/* |h9| <= 1.71*2^59 */
|
||||
|
||||
carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25;
|
||||
/* |h9| <= 2^24; from now on fits into int32 unchanged */
|
||||
/* |h0| <= 1.1*2^39 */
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
/* |h0| <= 2^25; from now on fits into int32 unchanged */
|
||||
/* |h1| <= 1.01*2^24 */
|
||||
|
||||
h[0] = (crypto_int32) h0;
|
||||
h[1] = (crypto_int32) h1;
|
||||
h[2] = (crypto_int32) h2;
|
||||
h[3] = (crypto_int32) h3;
|
||||
h[4] = (crypto_int32) h4;
|
||||
h[5] = (crypto_int32) h5;
|
||||
h[6] = (crypto_int32) h6;
|
||||
h[7] = (crypto_int32) h7;
|
||||
h[8] = (crypto_int32) h8;
|
||||
h[9] = (crypto_int32) h9;
|
||||
}
|
45
src/ext/ed25519/ref10/fe_neg.c
Normal file
45
src/ext/ed25519/ref10/fe_neg.c
Normal file
@ -0,0 +1,45 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = -f
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
*/
|
||||
|
||||
void fe_neg(fe h,const fe f)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 h0 = -f0;
|
||||
crypto_int32 h1 = -f1;
|
||||
crypto_int32 h2 = -f2;
|
||||
crypto_int32 h3 = -f3;
|
||||
crypto_int32 h4 = -f4;
|
||||
crypto_int32 h5 = -f5;
|
||||
crypto_int32 h6 = -f6;
|
||||
crypto_int32 h7 = -f7;
|
||||
crypto_int32 h8 = -f8;
|
||||
crypto_int32 h9 = -f9;
|
||||
h[0] = h0;
|
||||
h[1] = h1;
|
||||
h[2] = h2;
|
||||
h[3] = h3;
|
||||
h[4] = h4;
|
||||
h[5] = h5;
|
||||
h[6] = h6;
|
||||
h[7] = h7;
|
||||
h[8] = h8;
|
||||
h[9] = h9;
|
||||
}
|
13
src/ext/ed25519/ref10/fe_pow22523.c
Normal file
13
src/ext/ed25519/ref10/fe_pow22523.c
Normal file
@ -0,0 +1,13 @@
|
||||
#include "fe.h"
|
||||
|
||||
void fe_pow22523(fe out,const fe z)
|
||||
{
|
||||
fe t0;
|
||||
fe t1;
|
||||
fe t2;
|
||||
int i;
|
||||
|
||||
#include "pow22523.h"
|
||||
|
||||
return;
|
||||
}
|
149
src/ext/ed25519/ref10/fe_sq.c
Normal file
149
src/ext/ed25519/ref10/fe_sq.c
Normal file
@ -0,0 +1,149 @@
|
||||
#include "fe.h"
|
||||
#include "crypto_int64.h"
|
||||
|
||||
/*
|
||||
h = f * f
|
||||
Can overlap h with f.
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc.
|
||||
*/
|
||||
|
||||
/*
|
||||
See fe_mul.c for discussion of implementation strategy.
|
||||
*/
|
||||
|
||||
void fe_sq(fe h,const fe f)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 f0_2 = 2 * f0;
|
||||
crypto_int32 f1_2 = 2 * f1;
|
||||
crypto_int32 f2_2 = 2 * f2;
|
||||
crypto_int32 f3_2 = 2 * f3;
|
||||
crypto_int32 f4_2 = 2 * f4;
|
||||
crypto_int32 f5_2 = 2 * f5;
|
||||
crypto_int32 f6_2 = 2 * f6;
|
||||
crypto_int32 f7_2 = 2 * f7;
|
||||
crypto_int32 f5_38 = 38 * f5; /* 1.959375*2^30 */
|
||||
crypto_int32 f6_19 = 19 * f6; /* 1.959375*2^30 */
|
||||
crypto_int32 f7_38 = 38 * f7; /* 1.959375*2^30 */
|
||||
crypto_int32 f8_19 = 19 * f8; /* 1.959375*2^30 */
|
||||
crypto_int32 f9_38 = 38 * f9; /* 1.959375*2^30 */
|
||||
crypto_int64 f0f0 = f0 * (crypto_int64) f0;
|
||||
crypto_int64 f0f1_2 = f0_2 * (crypto_int64) f1;
|
||||
crypto_int64 f0f2_2 = f0_2 * (crypto_int64) f2;
|
||||
crypto_int64 f0f3_2 = f0_2 * (crypto_int64) f3;
|
||||
crypto_int64 f0f4_2 = f0_2 * (crypto_int64) f4;
|
||||
crypto_int64 f0f5_2 = f0_2 * (crypto_int64) f5;
|
||||
crypto_int64 f0f6_2 = f0_2 * (crypto_int64) f6;
|
||||
crypto_int64 f0f7_2 = f0_2 * (crypto_int64) f7;
|
||||
crypto_int64 f0f8_2 = f0_2 * (crypto_int64) f8;
|
||||
crypto_int64 f0f9_2 = f0_2 * (crypto_int64) f9;
|
||||
crypto_int64 f1f1_2 = f1_2 * (crypto_int64) f1;
|
||||
crypto_int64 f1f2_2 = f1_2 * (crypto_int64) f2;
|
||||
crypto_int64 f1f3_4 = f1_2 * (crypto_int64) f3_2;
|
||||
crypto_int64 f1f4_2 = f1_2 * (crypto_int64) f4;
|
||||
crypto_int64 f1f5_4 = f1_2 * (crypto_int64) f5_2;
|
||||
crypto_int64 f1f6_2 = f1_2 * (crypto_int64) f6;
|
||||
crypto_int64 f1f7_4 = f1_2 * (crypto_int64) f7_2;
|
||||
crypto_int64 f1f8_2 = f1_2 * (crypto_int64) f8;
|
||||
crypto_int64 f1f9_76 = f1_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f2f2 = f2 * (crypto_int64) f2;
|
||||
crypto_int64 f2f3_2 = f2_2 * (crypto_int64) f3;
|
||||
crypto_int64 f2f4_2 = f2_2 * (crypto_int64) f4;
|
||||
crypto_int64 f2f5_2 = f2_2 * (crypto_int64) f5;
|
||||
crypto_int64 f2f6_2 = f2_2 * (crypto_int64) f6;
|
||||
crypto_int64 f2f7_2 = f2_2 * (crypto_int64) f7;
|
||||
crypto_int64 f2f8_38 = f2_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f2f9_38 = f2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f3f3_2 = f3_2 * (crypto_int64) f3;
|
||||
crypto_int64 f3f4_2 = f3_2 * (crypto_int64) f4;
|
||||
crypto_int64 f3f5_4 = f3_2 * (crypto_int64) f5_2;
|
||||
crypto_int64 f3f6_2 = f3_2 * (crypto_int64) f6;
|
||||
crypto_int64 f3f7_76 = f3_2 * (crypto_int64) f7_38;
|
||||
crypto_int64 f3f8_38 = f3_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f3f9_76 = f3_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f4f4 = f4 * (crypto_int64) f4;
|
||||
crypto_int64 f4f5_2 = f4_2 * (crypto_int64) f5;
|
||||
crypto_int64 f4f6_38 = f4_2 * (crypto_int64) f6_19;
|
||||
crypto_int64 f4f7_38 = f4 * (crypto_int64) f7_38;
|
||||
crypto_int64 f4f8_38 = f4_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f4f9_38 = f4 * (crypto_int64) f9_38;
|
||||
crypto_int64 f5f5_38 = f5 * (crypto_int64) f5_38;
|
||||
crypto_int64 f5f6_38 = f5_2 * (crypto_int64) f6_19;
|
||||
crypto_int64 f5f7_76 = f5_2 * (crypto_int64) f7_38;
|
||||
crypto_int64 f5f8_38 = f5_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f5f9_76 = f5_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f6f6_19 = f6 * (crypto_int64) f6_19;
|
||||
crypto_int64 f6f7_38 = f6 * (crypto_int64) f7_38;
|
||||
crypto_int64 f6f8_38 = f6_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f6f9_38 = f6 * (crypto_int64) f9_38;
|
||||
crypto_int64 f7f7_38 = f7 * (crypto_int64) f7_38;
|
||||
crypto_int64 f7f8_38 = f7_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f7f9_76 = f7_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f8f8_19 = f8 * (crypto_int64) f8_19;
|
||||
crypto_int64 f8f9_38 = f8 * (crypto_int64) f9_38;
|
||||
crypto_int64 f9f9_38 = f9 * (crypto_int64) f9_38;
|
||||
crypto_int64 h0 = f0f0 +f1f9_76+f2f8_38+f3f7_76+f4f6_38+f5f5_38;
|
||||
crypto_int64 h1 = f0f1_2+f2f9_38+f3f8_38+f4f7_38+f5f6_38;
|
||||
crypto_int64 h2 = f0f2_2+f1f1_2 +f3f9_76+f4f8_38+f5f7_76+f6f6_19;
|
||||
crypto_int64 h3 = f0f3_2+f1f2_2 +f4f9_38+f5f8_38+f6f7_38;
|
||||
crypto_int64 h4 = f0f4_2+f1f3_4 +f2f2 +f5f9_76+f6f8_38+f7f7_38;
|
||||
crypto_int64 h5 = f0f5_2+f1f4_2 +f2f3_2 +f6f9_38+f7f8_38;
|
||||
crypto_int64 h6 = f0f6_2+f1f5_4 +f2f4_2 +f3f3_2 +f7f9_76+f8f8_19;
|
||||
crypto_int64 h7 = f0f7_2+f1f6_2 +f2f5_2 +f3f4_2 +f8f9_38;
|
||||
crypto_int64 h8 = f0f8_2+f1f7_4 +f2f6_2 +f3f5_4 +f4f4 +f9f9_38;
|
||||
crypto_int64 h9 = f0f9_2+f1f8_2 +f2f7_2 +f3f6_2 +f4f5_2;
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
|
||||
carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25;
|
||||
carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25;
|
||||
|
||||
carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26;
|
||||
carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26;
|
||||
|
||||
carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25;
|
||||
carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25;
|
||||
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26;
|
||||
|
||||
carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25;
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
|
||||
h[0] = (crypto_int32) h0;
|
||||
h[1] = (crypto_int32) h1;
|
||||
h[2] = (crypto_int32) h2;
|
||||
h[3] = (crypto_int32) h3;
|
||||
h[4] = (crypto_int32) h4;
|
||||
h[5] = (crypto_int32) h5;
|
||||
h[6] = (crypto_int32) h6;
|
||||
h[7] = (crypto_int32) h7;
|
||||
h[8] = (crypto_int32) h8;
|
||||
h[9] = (crypto_int32) h9;
|
||||
}
|
160
src/ext/ed25519/ref10/fe_sq2.c
Normal file
160
src/ext/ed25519/ref10/fe_sq2.c
Normal file
@ -0,0 +1,160 @@
|
||||
#include "fe.h"
|
||||
#include "crypto_int64.h"
|
||||
|
||||
/*
|
||||
h = 2 * f * f
|
||||
Can overlap h with f.
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.65*2^26,1.65*2^25,1.65*2^26,1.65*2^25,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.01*2^25,1.01*2^24,1.01*2^25,1.01*2^24,etc.
|
||||
*/
|
||||
|
||||
/*
|
||||
See fe_mul.c for discussion of implementation strategy.
|
||||
*/
|
||||
|
||||
void fe_sq2(fe h,const fe f)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 f0_2 = 2 * f0;
|
||||
crypto_int32 f1_2 = 2 * f1;
|
||||
crypto_int32 f2_2 = 2 * f2;
|
||||
crypto_int32 f3_2 = 2 * f3;
|
||||
crypto_int32 f4_2 = 2 * f4;
|
||||
crypto_int32 f5_2 = 2 * f5;
|
||||
crypto_int32 f6_2 = 2 * f6;
|
||||
crypto_int32 f7_2 = 2 * f7;
|
||||
crypto_int32 f5_38 = 38 * f5; /* 1.959375*2^30 */
|
||||
crypto_int32 f6_19 = 19 * f6; /* 1.959375*2^30 */
|
||||
crypto_int32 f7_38 = 38 * f7; /* 1.959375*2^30 */
|
||||
crypto_int32 f8_19 = 19 * f8; /* 1.959375*2^30 */
|
||||
crypto_int32 f9_38 = 38 * f9; /* 1.959375*2^30 */
|
||||
crypto_int64 f0f0 = f0 * (crypto_int64) f0;
|
||||
crypto_int64 f0f1_2 = f0_2 * (crypto_int64) f1;
|
||||
crypto_int64 f0f2_2 = f0_2 * (crypto_int64) f2;
|
||||
crypto_int64 f0f3_2 = f0_2 * (crypto_int64) f3;
|
||||
crypto_int64 f0f4_2 = f0_2 * (crypto_int64) f4;
|
||||
crypto_int64 f0f5_2 = f0_2 * (crypto_int64) f5;
|
||||
crypto_int64 f0f6_2 = f0_2 * (crypto_int64) f6;
|
||||
crypto_int64 f0f7_2 = f0_2 * (crypto_int64) f7;
|
||||
crypto_int64 f0f8_2 = f0_2 * (crypto_int64) f8;
|
||||
crypto_int64 f0f9_2 = f0_2 * (crypto_int64) f9;
|
||||
crypto_int64 f1f1_2 = f1_2 * (crypto_int64) f1;
|
||||
crypto_int64 f1f2_2 = f1_2 * (crypto_int64) f2;
|
||||
crypto_int64 f1f3_4 = f1_2 * (crypto_int64) f3_2;
|
||||
crypto_int64 f1f4_2 = f1_2 * (crypto_int64) f4;
|
||||
crypto_int64 f1f5_4 = f1_2 * (crypto_int64) f5_2;
|
||||
crypto_int64 f1f6_2 = f1_2 * (crypto_int64) f6;
|
||||
crypto_int64 f1f7_4 = f1_2 * (crypto_int64) f7_2;
|
||||
crypto_int64 f1f8_2 = f1_2 * (crypto_int64) f8;
|
||||
crypto_int64 f1f9_76 = f1_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f2f2 = f2 * (crypto_int64) f2;
|
||||
crypto_int64 f2f3_2 = f2_2 * (crypto_int64) f3;
|
||||
crypto_int64 f2f4_2 = f2_2 * (crypto_int64) f4;
|
||||
crypto_int64 f2f5_2 = f2_2 * (crypto_int64) f5;
|
||||
crypto_int64 f2f6_2 = f2_2 * (crypto_int64) f6;
|
||||
crypto_int64 f2f7_2 = f2_2 * (crypto_int64) f7;
|
||||
crypto_int64 f2f8_38 = f2_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f2f9_38 = f2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f3f3_2 = f3_2 * (crypto_int64) f3;
|
||||
crypto_int64 f3f4_2 = f3_2 * (crypto_int64) f4;
|
||||
crypto_int64 f3f5_4 = f3_2 * (crypto_int64) f5_2;
|
||||
crypto_int64 f3f6_2 = f3_2 * (crypto_int64) f6;
|
||||
crypto_int64 f3f7_76 = f3_2 * (crypto_int64) f7_38;
|
||||
crypto_int64 f3f8_38 = f3_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f3f9_76 = f3_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f4f4 = f4 * (crypto_int64) f4;
|
||||
crypto_int64 f4f5_2 = f4_2 * (crypto_int64) f5;
|
||||
crypto_int64 f4f6_38 = f4_2 * (crypto_int64) f6_19;
|
||||
crypto_int64 f4f7_38 = f4 * (crypto_int64) f7_38;
|
||||
crypto_int64 f4f8_38 = f4_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f4f9_38 = f4 * (crypto_int64) f9_38;
|
||||
crypto_int64 f5f5_38 = f5 * (crypto_int64) f5_38;
|
||||
crypto_int64 f5f6_38 = f5_2 * (crypto_int64) f6_19;
|
||||
crypto_int64 f5f7_76 = f5_2 * (crypto_int64) f7_38;
|
||||
crypto_int64 f5f8_38 = f5_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f5f9_76 = f5_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f6f6_19 = f6 * (crypto_int64) f6_19;
|
||||
crypto_int64 f6f7_38 = f6 * (crypto_int64) f7_38;
|
||||
crypto_int64 f6f8_38 = f6_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f6f9_38 = f6 * (crypto_int64) f9_38;
|
||||
crypto_int64 f7f7_38 = f7 * (crypto_int64) f7_38;
|
||||
crypto_int64 f7f8_38 = f7_2 * (crypto_int64) f8_19;
|
||||
crypto_int64 f7f9_76 = f7_2 * (crypto_int64) f9_38;
|
||||
crypto_int64 f8f8_19 = f8 * (crypto_int64) f8_19;
|
||||
crypto_int64 f8f9_38 = f8 * (crypto_int64) f9_38;
|
||||
crypto_int64 f9f9_38 = f9 * (crypto_int64) f9_38;
|
||||
crypto_int64 h0 = f0f0 +f1f9_76+f2f8_38+f3f7_76+f4f6_38+f5f5_38;
|
||||
crypto_int64 h1 = f0f1_2+f2f9_38+f3f8_38+f4f7_38+f5f6_38;
|
||||
crypto_int64 h2 = f0f2_2+f1f1_2 +f3f9_76+f4f8_38+f5f7_76+f6f6_19;
|
||||
crypto_int64 h3 = f0f3_2+f1f2_2 +f4f9_38+f5f8_38+f6f7_38;
|
||||
crypto_int64 h4 = f0f4_2+f1f3_4 +f2f2 +f5f9_76+f6f8_38+f7f7_38;
|
||||
crypto_int64 h5 = f0f5_2+f1f4_2 +f2f3_2 +f6f9_38+f7f8_38;
|
||||
crypto_int64 h6 = f0f6_2+f1f5_4 +f2f4_2 +f3f3_2 +f7f9_76+f8f8_19;
|
||||
crypto_int64 h7 = f0f7_2+f1f6_2 +f2f5_2 +f3f4_2 +f8f9_38;
|
||||
crypto_int64 h8 = f0f8_2+f1f7_4 +f2f6_2 +f3f5_4 +f4f4 +f9f9_38;
|
||||
crypto_int64 h9 = f0f9_2+f1f8_2 +f2f7_2 +f3f6_2 +f4f5_2;
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
|
||||
h0 += h0;
|
||||
h1 += h1;
|
||||
h2 += h2;
|
||||
h3 += h3;
|
||||
h4 += h4;
|
||||
h5 += h5;
|
||||
h6 += h6;
|
||||
h7 += h7;
|
||||
h8 += h8;
|
||||
h9 += h9;
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
|
||||
carry1 = (h1 + (crypto_int64) (1<<24)) >> 25; h2 += carry1; h1 -= carry1 << 25;
|
||||
carry5 = (h5 + (crypto_int64) (1<<24)) >> 25; h6 += carry5; h5 -= carry5 << 25;
|
||||
|
||||
carry2 = (h2 + (crypto_int64) (1<<25)) >> 26; h3 += carry2; h2 -= carry2 << 26;
|
||||
carry6 = (h6 + (crypto_int64) (1<<25)) >> 26; h7 += carry6; h6 -= carry6 << 26;
|
||||
|
||||
carry3 = (h3 + (crypto_int64) (1<<24)) >> 25; h4 += carry3; h3 -= carry3 << 25;
|
||||
carry7 = (h7 + (crypto_int64) (1<<24)) >> 25; h8 += carry7; h7 -= carry7 << 25;
|
||||
|
||||
carry4 = (h4 + (crypto_int64) (1<<25)) >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
carry8 = (h8 + (crypto_int64) (1<<25)) >> 26; h9 += carry8; h8 -= carry8 << 26;
|
||||
|
||||
carry9 = (h9 + (crypto_int64) (1<<24)) >> 25; h0 += carry9 * 19; h9 -= carry9 << 25;
|
||||
|
||||
carry0 = (h0 + (crypto_int64) (1<<25)) >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
|
||||
h[0] = (crypto_int32) h0;
|
||||
h[1] = (crypto_int32) h1;
|
||||
h[2] = (crypto_int32) h2;
|
||||
h[3] = (crypto_int32) h3;
|
||||
h[4] = (crypto_int32) h4;
|
||||
h[5] = (crypto_int32) h5;
|
||||
h[6] = (crypto_int32) h6;
|
||||
h[7] = (crypto_int32) h7;
|
||||
h[8] = (crypto_int32) h8;
|
||||
h[9] = (crypto_int32) h9;
|
||||
}
|
57
src/ext/ed25519/ref10/fe_sub.c
Normal file
57
src/ext/ed25519/ref10/fe_sub.c
Normal file
@ -0,0 +1,57 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
h = f - g
|
||||
Can overlap h with f or g.
|
||||
|
||||
Preconditions:
|
||||
|f| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
|g| bounded by 1.1*2^25,1.1*2^24,1.1*2^25,1.1*2^24,etc.
|
||||
|
||||
Postconditions:
|
||||
|h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc.
|
||||
*/
|
||||
|
||||
void fe_sub(fe h,const fe f,const fe g)
|
||||
{
|
||||
crypto_int32 f0 = f[0];
|
||||
crypto_int32 f1 = f[1];
|
||||
crypto_int32 f2 = f[2];
|
||||
crypto_int32 f3 = f[3];
|
||||
crypto_int32 f4 = f[4];
|
||||
crypto_int32 f5 = f[5];
|
||||
crypto_int32 f6 = f[6];
|
||||
crypto_int32 f7 = f[7];
|
||||
crypto_int32 f8 = f[8];
|
||||
crypto_int32 f9 = f[9];
|
||||
crypto_int32 g0 = g[0];
|
||||
crypto_int32 g1 = g[1];
|
||||
crypto_int32 g2 = g[2];
|
||||
crypto_int32 g3 = g[3];
|
||||
crypto_int32 g4 = g[4];
|
||||
crypto_int32 g5 = g[5];
|
||||
crypto_int32 g6 = g[6];
|
||||
crypto_int32 g7 = g[7];
|
||||
crypto_int32 g8 = g[8];
|
||||
crypto_int32 g9 = g[9];
|
||||
crypto_int32 h0 = f0 - g0;
|
||||
crypto_int32 h1 = f1 - g1;
|
||||
crypto_int32 h2 = f2 - g2;
|
||||
crypto_int32 h3 = f3 - g3;
|
||||
crypto_int32 h4 = f4 - g4;
|
||||
crypto_int32 h5 = f5 - g5;
|
||||
crypto_int32 h6 = f6 - g6;
|
||||
crypto_int32 h7 = f7 - g7;
|
||||
crypto_int32 h8 = f8 - g8;
|
||||
crypto_int32 h9 = f9 - g9;
|
||||
h[0] = h0;
|
||||
h[1] = h1;
|
||||
h[2] = h2;
|
||||
h[3] = h3;
|
||||
h[4] = h4;
|
||||
h[5] = h5;
|
||||
h[6] = h6;
|
||||
h[7] = h7;
|
||||
h[8] = h8;
|
||||
h[9] = h9;
|
||||
}
|
119
src/ext/ed25519/ref10/fe_tobytes.c
Normal file
119
src/ext/ed25519/ref10/fe_tobytes.c
Normal file
@ -0,0 +1,119 @@
|
||||
#include "fe.h"
|
||||
|
||||
/*
|
||||
Preconditions:
|
||||
|h| bounded by 1.1*2^26,1.1*2^25,1.1*2^26,1.1*2^25,etc.
|
||||
|
||||
Write p=2^255-19; q=floor(h/p).
|
||||
Basic claim: q = floor(2^(-255)(h + 19 2^(-25)h9 + 2^(-1))).
|
||||
|
||||
Proof:
|
||||
Have |h|<=p so |q|<=1 so |19^2 2^(-255) q|<1/4.
|
||||
Also have |h-2^230 h9|<2^231 so |19 2^(-255)(h-2^230 h9)|<1/4.
|
||||
|
||||
Write y=2^(-1)-19^2 2^(-255)q-19 2^(-255)(h-2^230 h9).
|
||||
Then 0<y<1.
|
||||
|
||||
Write r=h-pq.
|
||||
Have 0<=r<=p-1=2^255-20.
|
||||
Thus 0<=r+19(2^-255)r<r+19(2^-255)2^255<=2^255-1.
|
||||
|
||||
Write x=r+19(2^-255)r+y.
|
||||
Then 0<x<2^255 so floor(2^(-255)x) = 0 so floor(q+2^(-255)x) = q.
|
||||
|
||||
Have q+2^(-255)x = 2^(-255)(h + 19 2^(-25) h9 + 2^(-1))
|
||||
so floor(2^(-255)(h + 19 2^(-25) h9 + 2^(-1))) = q.
|
||||
*/
|
||||
|
||||
void fe_tobytes(unsigned char *s,const fe h)
|
||||
{
|
||||
crypto_int32 h0 = h[0];
|
||||
crypto_int32 h1 = h[1];
|
||||
crypto_int32 h2 = h[2];
|
||||
crypto_int32 h3 = h[3];
|
||||
crypto_int32 h4 = h[4];
|
||||
crypto_int32 h5 = h[5];
|
||||
crypto_int32 h6 = h[6];
|
||||
crypto_int32 h7 = h[7];
|
||||
crypto_int32 h8 = h[8];
|
||||
crypto_int32 h9 = h[9];
|
||||
crypto_int32 q;
|
||||
crypto_int32 carry0;
|
||||
crypto_int32 carry1;
|
||||
crypto_int32 carry2;
|
||||
crypto_int32 carry3;
|
||||
crypto_int32 carry4;
|
||||
crypto_int32 carry5;
|
||||
crypto_int32 carry6;
|
||||
crypto_int32 carry7;
|
||||
crypto_int32 carry8;
|
||||
crypto_int32 carry9;
|
||||
|
||||
q = (19 * h9 + (((crypto_int32) 1) << 24)) >> 25;
|
||||
q = (h0 + q) >> 26;
|
||||
q = (h1 + q) >> 25;
|
||||
q = (h2 + q) >> 26;
|
||||
q = (h3 + q) >> 25;
|
||||
q = (h4 + q) >> 26;
|
||||
q = (h5 + q) >> 25;
|
||||
q = (h6 + q) >> 26;
|
||||
q = (h7 + q) >> 25;
|
||||
q = (h8 + q) >> 26;
|
||||
q = (h9 + q) >> 25;
|
||||
|
||||
/* Goal: Output h-(2^255-19)q, which is between 0 and 2^255-20. */
|
||||
h0 += 19 * q;
|
||||
/* Goal: Output h-2^255 q, which is between 0 and 2^255-20. */
|
||||
|
||||
carry0 = h0 >> 26; h1 += carry0; h0 -= carry0 << 26;
|
||||
carry1 = h1 >> 25; h2 += carry1; h1 -= carry1 << 25;
|
||||
carry2 = h2 >> 26; h3 += carry2; h2 -= carry2 << 26;
|
||||
carry3 = h3 >> 25; h4 += carry3; h3 -= carry3 << 25;
|
||||
carry4 = h4 >> 26; h5 += carry4; h4 -= carry4 << 26;
|
||||
carry5 = h5 >> 25; h6 += carry5; h5 -= carry5 << 25;
|
||||
carry6 = h6 >> 26; h7 += carry6; h6 -= carry6 << 26;
|
||||
carry7 = h7 >> 25; h8 += carry7; h7 -= carry7 << 25;
|
||||
carry8 = h8 >> 26; h9 += carry8; h8 -= carry8 << 26;
|
||||
carry9 = h9 >> 25; h9 -= carry9 << 25;
|
||||
/* h10 = carry9 */
|
||||
|
||||
/*
|
||||
Goal: Output h0+...+2^255 h10-2^255 q, which is between 0 and 2^255-20.
|
||||
Have h0+...+2^230 h9 between 0 and 2^255-1;
|
||||
evidently 2^255 h10-2^255 q = 0.
|
||||
Goal: Output h0+...+2^230 h9.
|
||||
*/
|
||||
|
||||
s[0] = h0 >> 0;
|
||||
s[1] = h0 >> 8;
|
||||
s[2] = h0 >> 16;
|
||||
s[3] = (h0 >> 24) | (h1 << 2);
|
||||
s[4] = h1 >> 6;
|
||||
s[5] = h1 >> 14;
|
||||
s[6] = (h1 >> 22) | (h2 << 3);
|
||||
s[7] = h2 >> 5;
|
||||
s[8] = h2 >> 13;
|
||||
s[9] = (h2 >> 21) | (h3 << 5);
|
||||
s[10] = h3 >> 3;
|
||||
s[11] = h3 >> 11;
|
||||
s[12] = (h3 >> 19) | (h4 << 6);
|
||||
s[13] = h4 >> 2;
|
||||
s[14] = h4 >> 10;
|
||||
s[15] = h4 >> 18;
|
||||
s[16] = h5 >> 0;
|
||||
s[17] = h5 >> 8;
|
||||
s[18] = h5 >> 16;
|
||||
s[19] = (h5 >> 24) | (h6 << 1);
|
||||
s[20] = h6 >> 7;
|
||||
s[21] = h6 >> 15;
|
||||
s[22] = (h6 >> 23) | (h7 << 3);
|
||||
s[23] = h7 >> 5;
|
||||
s[24] = h7 >> 13;
|
||||
s[25] = (h7 >> 21) | (h8 << 4);
|
||||
s[26] = h8 >> 4;
|
||||
s[27] = h8 >> 12;
|
||||
s[28] = (h8 >> 20) | (h9 << 6);
|
||||
s[29] = h9 >> 2;
|
||||
s[30] = h9 >> 10;
|
||||
s[31] = h9 >> 18;
|
||||
}
|
95
src/ext/ed25519/ref10/ge.h
Normal file
95
src/ext/ed25519/ref10/ge.h
Normal file
@ -0,0 +1,95 @@
|
||||
#ifndef GE_H
|
||||
#define GE_H
|
||||
|
||||
/*
|
||||
ge means group element.
|
||||
|
||||
Here the group is the set of pairs (x,y) of field elements (see fe.h)
|
||||
satisfying -x^2 + y^2 = 1 + d x^2y^2
|
||||
where d = -121665/121666.
|
||||
|
||||
Representations:
|
||||
ge_p2 (projective): (X:Y:Z) satisfying x=X/Z, y=Y/Z
|
||||
ge_p3 (extended): (X:Y:Z:T) satisfying x=X/Z, y=Y/Z, XY=ZT
|
||||
ge_p1p1 (completed): ((X:Z),(Y:T)) satisfying x=X/Z, y=Y/T
|
||||
ge_precomp (Duif): (y+x,y-x,2dxy)
|
||||
*/
|
||||
|
||||
#include "fe.h"
|
||||
|
||||
typedef struct {
|
||||
fe X;
|
||||
fe Y;
|
||||
fe Z;
|
||||
} ge_p2;
|
||||
|
||||
typedef struct {
|
||||
fe X;
|
||||
fe Y;
|
||||
fe Z;
|
||||
fe T;
|
||||
} ge_p3;
|
||||
|
||||
typedef struct {
|
||||
fe X;
|
||||
fe Y;
|
||||
fe Z;
|
||||
fe T;
|
||||
} ge_p1p1;
|
||||
|
||||
typedef struct {
|
||||
fe yplusx;
|
||||
fe yminusx;
|
||||
fe xy2d;
|
||||
} ge_precomp;
|
||||
|
||||
typedef struct {
|
||||
fe YplusX;
|
||||
fe YminusX;
|
||||
fe Z;
|
||||
fe T2d;
|
||||
} ge_cached;
|
||||
|
||||
#define ge_frombytes_negate_vartime crypto_sign_ed25519_ref10_ge_frombytes_negate_vartime
|
||||
#define ge_tobytes crypto_sign_ed25519_ref10_ge_tobytes
|
||||
#define ge_p3_tobytes crypto_sign_ed25519_ref10_ge_p3_tobytes
|
||||
|
||||
#define ge_p2_0 crypto_sign_ed25519_ref10_ge_p2_0
|
||||
#define ge_p3_0 crypto_sign_ed25519_ref10_ge_p3_0
|
||||
#define ge_precomp_0 crypto_sign_ed25519_ref10_ge_precomp_0
|
||||
#define ge_p3_to_p2 crypto_sign_ed25519_ref10_ge_p3_to_p2
|
||||
#define ge_p3_to_cached crypto_sign_ed25519_ref10_ge_p3_to_cached
|
||||
#define ge_p1p1_to_p2 crypto_sign_ed25519_ref10_ge_p1p1_to_p2
|
||||
#define ge_p1p1_to_p3 crypto_sign_ed25519_ref10_ge_p1p1_to_p3
|
||||
#define ge_p2_dbl crypto_sign_ed25519_ref10_ge_p2_dbl
|
||||
#define ge_p3_dbl crypto_sign_ed25519_ref10_ge_p3_dbl
|
||||
|
||||
#define ge_madd crypto_sign_ed25519_ref10_ge_madd
|
||||
#define ge_msub crypto_sign_ed25519_ref10_ge_msub
|
||||
#define ge_add crypto_sign_ed25519_ref10_ge_add
|
||||
#define ge_sub crypto_sign_ed25519_ref10_ge_sub
|
||||
#define ge_scalarmult_base crypto_sign_ed25519_ref10_ge_scalarmult_base
|
||||
#define ge_double_scalarmult_vartime crypto_sign_ed25519_ref10_ge_double_scalarmult_vartime
|
||||
|
||||
extern void ge_tobytes(unsigned char *,const ge_p2 *);
|
||||
extern void ge_p3_tobytes(unsigned char *,const ge_p3 *);
|
||||
extern int ge_frombytes_negate_vartime(ge_p3 *,const unsigned char *);
|
||||
|
||||
extern void ge_p2_0(ge_p2 *);
|
||||
extern void ge_p3_0(ge_p3 *);
|
||||
extern void ge_precomp_0(ge_precomp *);
|
||||
extern void ge_p3_to_p2(ge_p2 *,const ge_p3 *);
|
||||
extern void ge_p3_to_cached(ge_cached *,const ge_p3 *);
|
||||
extern void ge_p1p1_to_p2(ge_p2 *,const ge_p1p1 *);
|
||||
extern void ge_p1p1_to_p3(ge_p3 *,const ge_p1p1 *);
|
||||
extern void ge_p2_dbl(ge_p1p1 *,const ge_p2 *);
|
||||
extern void ge_p3_dbl(ge_p1p1 *,const ge_p3 *);
|
||||
|
||||
extern void ge_madd(ge_p1p1 *,const ge_p3 *,const ge_precomp *);
|
||||
extern void ge_msub(ge_p1p1 *,const ge_p3 *,const ge_precomp *);
|
||||
extern void ge_add(ge_p1p1 *,const ge_p3 *,const ge_cached *);
|
||||
extern void ge_sub(ge_p1p1 *,const ge_p3 *,const ge_cached *);
|
||||
extern void ge_scalarmult_base(ge_p3 *,const unsigned char *);
|
||||
extern void ge_double_scalarmult_vartime(ge_p2 *,const unsigned char *,const ge_p3 *,const unsigned char *);
|
||||
|
||||
#endif
|
11
src/ext/ed25519/ref10/ge_add.c
Normal file
11
src/ext/ed25519/ref10/ge_add.c
Normal file
@ -0,0 +1,11 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p + q
|
||||
*/
|
||||
|
||||
void ge_add(ge_p1p1 *r,const ge_p3 *p,const ge_cached *q)
|
||||
{
|
||||
fe t0;
|
||||
#include "ge_add.h"
|
||||
}
|
97
src/ext/ed25519/ref10/ge_add.h
Normal file
97
src/ext/ed25519/ref10/ge_add.h
Normal file
@ -0,0 +1,97 @@
|
||||
|
||||
/* qhasm: enter ge_add */
|
||||
|
||||
/* qhasm: fe X1 */
|
||||
|
||||
/* qhasm: fe Y1 */
|
||||
|
||||
/* qhasm: fe Z1 */
|
||||
|
||||
/* qhasm: fe Z2 */
|
||||
|
||||
/* qhasm: fe T1 */
|
||||
|
||||
/* qhasm: fe ZZ */
|
||||
|
||||
/* qhasm: fe YpX2 */
|
||||
|
||||
/* qhasm: fe YmX2 */
|
||||
|
||||
/* qhasm: fe T2d2 */
|
||||
|
||||
/* qhasm: fe X3 */
|
||||
|
||||
/* qhasm: fe Y3 */
|
||||
|
||||
/* qhasm: fe Z3 */
|
||||
|
||||
/* qhasm: fe T3 */
|
||||
|
||||
/* qhasm: fe YpX1 */
|
||||
|
||||
/* qhasm: fe YmX1 */
|
||||
|
||||
/* qhasm: fe A */
|
||||
|
||||
/* qhasm: fe B */
|
||||
|
||||
/* qhasm: fe C */
|
||||
|
||||
/* qhasm: fe D */
|
||||
|
||||
/* qhasm: YpX1 = Y1+X1 */
|
||||
/* asm 1: fe_add(>YpX1=fe#1,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_add(>YpX1=r->X,<Y1=p->Y,<X1=p->X); */
|
||||
fe_add(r->X,p->Y,p->X);
|
||||
|
||||
/* qhasm: YmX1 = Y1-X1 */
|
||||
/* asm 1: fe_sub(>YmX1=fe#2,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_sub(>YmX1=r->Y,<Y1=p->Y,<X1=p->X); */
|
||||
fe_sub(r->Y,p->Y,p->X);
|
||||
|
||||
/* qhasm: A = YpX1*YpX2 */
|
||||
/* asm 1: fe_mul(>A=fe#3,<YpX1=fe#1,<YpX2=fe#15); */
|
||||
/* asm 2: fe_mul(>A=r->Z,<YpX1=r->X,<YpX2=q->YplusX); */
|
||||
fe_mul(r->Z,r->X,q->YplusX);
|
||||
|
||||
/* qhasm: B = YmX1*YmX2 */
|
||||
/* asm 1: fe_mul(>B=fe#2,<YmX1=fe#2,<YmX2=fe#16); */
|
||||
/* asm 2: fe_mul(>B=r->Y,<YmX1=r->Y,<YmX2=q->YminusX); */
|
||||
fe_mul(r->Y,r->Y,q->YminusX);
|
||||
|
||||
/* qhasm: C = T2d2*T1 */
|
||||
/* asm 1: fe_mul(>C=fe#4,<T2d2=fe#18,<T1=fe#14); */
|
||||
/* asm 2: fe_mul(>C=r->T,<T2d2=q->T2d,<T1=p->T); */
|
||||
fe_mul(r->T,q->T2d,p->T);
|
||||
|
||||
/* qhasm: ZZ = Z1*Z2 */
|
||||
/* asm 1: fe_mul(>ZZ=fe#1,<Z1=fe#13,<Z2=fe#17); */
|
||||
/* asm 2: fe_mul(>ZZ=r->X,<Z1=p->Z,<Z2=q->Z); */
|
||||
fe_mul(r->X,p->Z,q->Z);
|
||||
|
||||
/* qhasm: D = 2*ZZ */
|
||||
/* asm 1: fe_add(>D=fe#5,<ZZ=fe#1,<ZZ=fe#1); */
|
||||
/* asm 2: fe_add(>D=t0,<ZZ=r->X,<ZZ=r->X); */
|
||||
fe_add(t0,r->X,r->X);
|
||||
|
||||
/* qhasm: X3 = A-B */
|
||||
/* asm 1: fe_sub(>X3=fe#1,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_sub(>X3=r->X,<A=r->Z,<B=r->Y); */
|
||||
fe_sub(r->X,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Y3 = A+B */
|
||||
/* asm 1: fe_add(>Y3=fe#2,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_add(>Y3=r->Y,<A=r->Z,<B=r->Y); */
|
||||
fe_add(r->Y,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Z3 = D+C */
|
||||
/* asm 1: fe_add(>Z3=fe#3,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_add(>Z3=r->Z,<D=t0,<C=r->T); */
|
||||
fe_add(r->Z,t0,r->T);
|
||||
|
||||
/* qhasm: T3 = D-C */
|
||||
/* asm 1: fe_sub(>T3=fe#4,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_sub(>T3=r->T,<D=t0,<C=r->T); */
|
||||
fe_sub(r->T,t0,r->T);
|
||||
|
||||
/* qhasm: return */
|
49
src/ext/ed25519/ref10/ge_add.q
Normal file
49
src/ext/ed25519/ref10/ge_add.q
Normal file
@ -0,0 +1,49 @@
|
||||
:name:fe:r->X:r->Y:r->Z:r->T:t0:t1:t2:t3:t4:t5:p->X:p->Y:p->Z:p->T:q->YplusX:q->YminusX:q->Z:q->T2d:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>X1=fe#11:>Y1=fe#12:>Z1=fe#13:>T1=fe#14:>YpX2=fe#15:>YmX2=fe#16:>Z2=fe#17:>T2d2=fe#18:
|
||||
return:nofallthrough:<X3=fe#1:<Y3=fe#2:<Z3=fe#3:<T3=fe#4:leave:
|
||||
|
||||
h=f+g:<f=fe:<g=fe:>h=fe:asm/fe_add(>h,<f,<g);:
|
||||
h=f-g:<f=fe:<g=fe:>h=fe:asm/fe_sub(>h,<f,<g);:
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2:<f=fe:>h=fe:asm/fe_sq(>h,<f);:
|
||||
h=2*g:<g=fe:>h=fe:asm/fe_add(>h,<g,<g);:
|
||||
|
||||
:
|
||||
|
||||
enter ge_add
|
||||
|
||||
fe X1
|
||||
fe Y1
|
||||
fe Z1
|
||||
fe Z2
|
||||
fe T1
|
||||
fe ZZ
|
||||
fe YpX2
|
||||
fe YmX2
|
||||
fe T2d2
|
||||
fe X3
|
||||
fe Y3
|
||||
fe Z3
|
||||
fe T3
|
||||
fe YpX1
|
||||
fe YmX1
|
||||
fe A
|
||||
fe B
|
||||
fe C
|
||||
fe D
|
||||
|
||||
YpX1 = Y1+X1
|
||||
YmX1 = Y1-X1
|
||||
A = YpX1*YpX2
|
||||
B = YmX1*YmX2
|
||||
C = T2d2*T1
|
||||
ZZ = Z1*Z2
|
||||
D = 2*ZZ
|
||||
X3 = A-B
|
||||
Y3 = A+B
|
||||
Z3 = D+C
|
||||
T3 = D-C
|
||||
|
||||
return
|
96
src/ext/ed25519/ref10/ge_double_scalarmult.c
Normal file
96
src/ext/ed25519/ref10/ge_double_scalarmult.c
Normal file
@ -0,0 +1,96 @@
|
||||
#include "ge.h"
|
||||
|
||||
static void slide(signed char *r,const unsigned char *a)
|
||||
{
|
||||
int i;
|
||||
int b;
|
||||
int k;
|
||||
|
||||
for (i = 0;i < 256;++i)
|
||||
r[i] = 1 & (a[i >> 3] >> (i & 7));
|
||||
|
||||
for (i = 0;i < 256;++i)
|
||||
if (r[i]) {
|
||||
for (b = 1;b <= 6 && i + b < 256;++b) {
|
||||
if (r[i + b]) {
|
||||
if (r[i] + (r[i + b] << b) <= 15) {
|
||||
r[i] += r[i + b] << b; r[i + b] = 0;
|
||||
} else if (r[i] - (r[i + b] << b) >= -15) {
|
||||
r[i] -= r[i + b] << b;
|
||||
for (k = i + b;k < 256;++k) {
|
||||
if (!r[k]) {
|
||||
r[k] = 1;
|
||||
break;
|
||||
}
|
||||
r[k] = 0;
|
||||
}
|
||||
} else
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
static ge_precomp Bi[8] = {
|
||||
#include "base2.h"
|
||||
} ;
|
||||
|
||||
/*
|
||||
r = a * A + b * B
|
||||
where a = a[0]+256*a[1]+...+256^31 a[31].
|
||||
and b = b[0]+256*b[1]+...+256^31 b[31].
|
||||
B is the Ed25519 base point (x,4/5) with x positive.
|
||||
*/
|
||||
|
||||
void ge_double_scalarmult_vartime(ge_p2 *r,const unsigned char *a,const ge_p3 *A,const unsigned char *b)
|
||||
{
|
||||
signed char aslide[256];
|
||||
signed char bslide[256];
|
||||
ge_cached Ai[8]; /* A,3A,5A,7A,9A,11A,13A,15A */
|
||||
ge_p1p1 t;
|
||||
ge_p3 u;
|
||||
ge_p3 A2;
|
||||
int i;
|
||||
|
||||
slide(aslide,a);
|
||||
slide(bslide,b);
|
||||
|
||||
ge_p3_to_cached(&Ai[0],A);
|
||||
ge_p3_dbl(&t,A); ge_p1p1_to_p3(&A2,&t);
|
||||
ge_add(&t,&A2,&Ai[0]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[1],&u);
|
||||
ge_add(&t,&A2,&Ai[1]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[2],&u);
|
||||
ge_add(&t,&A2,&Ai[2]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[3],&u);
|
||||
ge_add(&t,&A2,&Ai[3]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[4],&u);
|
||||
ge_add(&t,&A2,&Ai[4]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[5],&u);
|
||||
ge_add(&t,&A2,&Ai[5]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[6],&u);
|
||||
ge_add(&t,&A2,&Ai[6]); ge_p1p1_to_p3(&u,&t); ge_p3_to_cached(&Ai[7],&u);
|
||||
|
||||
ge_p2_0(r);
|
||||
|
||||
for (i = 255;i >= 0;--i) {
|
||||
if (aslide[i] || bslide[i]) break;
|
||||
}
|
||||
|
||||
for (;i >= 0;--i) {
|
||||
ge_p2_dbl(&t,r);
|
||||
|
||||
if (aslide[i] > 0) {
|
||||
ge_p1p1_to_p3(&u,&t);
|
||||
ge_add(&t,&u,&Ai[aslide[i]/2]);
|
||||
} else if (aslide[i] < 0) {
|
||||
ge_p1p1_to_p3(&u,&t);
|
||||
ge_sub(&t,&u,&Ai[(-aslide[i])/2]);
|
||||
}
|
||||
|
||||
if (bslide[i] > 0) {
|
||||
ge_p1p1_to_p3(&u,&t);
|
||||
ge_madd(&t,&u,&Bi[bslide[i]/2]);
|
||||
} else if (bslide[i] < 0) {
|
||||
ge_p1p1_to_p3(&u,&t);
|
||||
ge_msub(&t,&u,&Bi[(-bslide[i])/2]);
|
||||
}
|
||||
|
||||
ge_p1p1_to_p2(r,&t);
|
||||
}
|
||||
}
|
50
src/ext/ed25519/ref10/ge_frombytes.c
Normal file
50
src/ext/ed25519/ref10/ge_frombytes.c
Normal file
@ -0,0 +1,50 @@
|
||||
#include "ge.h"
|
||||
|
||||
static const fe d = {
|
||||
#include "d.h"
|
||||
} ;
|
||||
|
||||
static const fe sqrtm1 = {
|
||||
#include "sqrtm1.h"
|
||||
} ;
|
||||
|
||||
int ge_frombytes_negate_vartime(ge_p3 *h,const unsigned char *s)
|
||||
{
|
||||
fe u;
|
||||
fe v;
|
||||
fe v3;
|
||||
fe vxx;
|
||||
fe check;
|
||||
|
||||
fe_frombytes(h->Y,s);
|
||||
fe_1(h->Z);
|
||||
fe_sq(u,h->Y);
|
||||
fe_mul(v,u,d);
|
||||
fe_sub(u,u,h->Z); /* u = y^2-1 */
|
||||
fe_add(v,v,h->Z); /* v = dy^2+1 */
|
||||
|
||||
fe_sq(v3,v);
|
||||
fe_mul(v3,v3,v); /* v3 = v^3 */
|
||||
fe_sq(h->X,v3);
|
||||
fe_mul(h->X,h->X,v);
|
||||
fe_mul(h->X,h->X,u); /* x = uv^7 */
|
||||
|
||||
fe_pow22523(h->X,h->X); /* x = (uv^7)^((q-5)/8) */
|
||||
fe_mul(h->X,h->X,v3);
|
||||
fe_mul(h->X,h->X,u); /* x = uv^3(uv^7)^((q-5)/8) */
|
||||
|
||||
fe_sq(vxx,h->X);
|
||||
fe_mul(vxx,vxx,v);
|
||||
fe_sub(check,vxx,u); /* vx^2-u */
|
||||
if (fe_isnonzero(check)) {
|
||||
fe_add(check,vxx,u); /* vx^2+u */
|
||||
if (fe_isnonzero(check)) return -1;
|
||||
fe_mul(h->X,h->X,sqrtm1);
|
||||
}
|
||||
|
||||
if (fe_isnegative(h->X) == (s[31] >> 7))
|
||||
fe_neg(h->X,h->X);
|
||||
|
||||
fe_mul(h->T,h->X,h->Y);
|
||||
return 0;
|
||||
}
|
11
src/ext/ed25519/ref10/ge_madd.c
Normal file
11
src/ext/ed25519/ref10/ge_madd.c
Normal file
@ -0,0 +1,11 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p + q
|
||||
*/
|
||||
|
||||
void ge_madd(ge_p1p1 *r,const ge_p3 *p,const ge_precomp *q)
|
||||
{
|
||||
fe t0;
|
||||
#include "ge_madd.h"
|
||||
}
|
88
src/ext/ed25519/ref10/ge_madd.h
Normal file
88
src/ext/ed25519/ref10/ge_madd.h
Normal file
@ -0,0 +1,88 @@
|
||||
|
||||
/* qhasm: enter ge_madd */
|
||||
|
||||
/* qhasm: fe X1 */
|
||||
|
||||
/* qhasm: fe Y1 */
|
||||
|
||||
/* qhasm: fe Z1 */
|
||||
|
||||
/* qhasm: fe T1 */
|
||||
|
||||
/* qhasm: fe ypx2 */
|
||||
|
||||
/* qhasm: fe ymx2 */
|
||||
|
||||
/* qhasm: fe xy2d2 */
|
||||
|
||||
/* qhasm: fe X3 */
|
||||
|
||||
/* qhasm: fe Y3 */
|
||||
|
||||
/* qhasm: fe Z3 */
|
||||
|
||||
/* qhasm: fe T3 */
|
||||
|
||||
/* qhasm: fe YpX1 */
|
||||
|
||||
/* qhasm: fe YmX1 */
|
||||
|
||||
/* qhasm: fe A */
|
||||
|
||||
/* qhasm: fe B */
|
||||
|
||||
/* qhasm: fe C */
|
||||
|
||||
/* qhasm: fe D */
|
||||
|
||||
/* qhasm: YpX1 = Y1+X1 */
|
||||
/* asm 1: fe_add(>YpX1=fe#1,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_add(>YpX1=r->X,<Y1=p->Y,<X1=p->X); */
|
||||
fe_add(r->X,p->Y,p->X);
|
||||
|
||||
/* qhasm: YmX1 = Y1-X1 */
|
||||
/* asm 1: fe_sub(>YmX1=fe#2,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_sub(>YmX1=r->Y,<Y1=p->Y,<X1=p->X); */
|
||||
fe_sub(r->Y,p->Y,p->X);
|
||||
|
||||
/* qhasm: A = YpX1*ypx2 */
|
||||
/* asm 1: fe_mul(>A=fe#3,<YpX1=fe#1,<ypx2=fe#15); */
|
||||
/* asm 2: fe_mul(>A=r->Z,<YpX1=r->X,<ypx2=q->yplusx); */
|
||||
fe_mul(r->Z,r->X,q->yplusx);
|
||||
|
||||
/* qhasm: B = YmX1*ymx2 */
|
||||
/* asm 1: fe_mul(>B=fe#2,<YmX1=fe#2,<ymx2=fe#16); */
|
||||
/* asm 2: fe_mul(>B=r->Y,<YmX1=r->Y,<ymx2=q->yminusx); */
|
||||
fe_mul(r->Y,r->Y,q->yminusx);
|
||||
|
||||
/* qhasm: C = xy2d2*T1 */
|
||||
/* asm 1: fe_mul(>C=fe#4,<xy2d2=fe#17,<T1=fe#14); */
|
||||
/* asm 2: fe_mul(>C=r->T,<xy2d2=q->xy2d,<T1=p->T); */
|
||||
fe_mul(r->T,q->xy2d,p->T);
|
||||
|
||||
/* qhasm: D = 2*Z1 */
|
||||
/* asm 1: fe_add(>D=fe#5,<Z1=fe#13,<Z1=fe#13); */
|
||||
/* asm 2: fe_add(>D=t0,<Z1=p->Z,<Z1=p->Z); */
|
||||
fe_add(t0,p->Z,p->Z);
|
||||
|
||||
/* qhasm: X3 = A-B */
|
||||
/* asm 1: fe_sub(>X3=fe#1,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_sub(>X3=r->X,<A=r->Z,<B=r->Y); */
|
||||
fe_sub(r->X,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Y3 = A+B */
|
||||
/* asm 1: fe_add(>Y3=fe#2,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_add(>Y3=r->Y,<A=r->Z,<B=r->Y); */
|
||||
fe_add(r->Y,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Z3 = D+C */
|
||||
/* asm 1: fe_add(>Z3=fe#3,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_add(>Z3=r->Z,<D=t0,<C=r->T); */
|
||||
fe_add(r->Z,t0,r->T);
|
||||
|
||||
/* qhasm: T3 = D-C */
|
||||
/* asm 1: fe_sub(>T3=fe#4,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_sub(>T3=r->T,<D=t0,<C=r->T); */
|
||||
fe_sub(r->T,t0,r->T);
|
||||
|
||||
/* qhasm: return */
|
46
src/ext/ed25519/ref10/ge_madd.q
Normal file
46
src/ext/ed25519/ref10/ge_madd.q
Normal file
@ -0,0 +1,46 @@
|
||||
:name:fe:r->X:r->Y:r->Z:r->T:t0:t1:t2:t3:t4:t5:p->X:p->Y:p->Z:p->T:q->yplusx:q->yminusx:q->xy2d:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>X1=fe#11:>Y1=fe#12:>Z1=fe#13:>T1=fe#14:>ypx2=fe#15:>ymx2=fe#16:>xy2d2=fe#17:
|
||||
return:nofallthrough:<X3=fe#1:<Y3=fe#2:<Z3=fe#3:<T3=fe#4:leave:
|
||||
|
||||
h=f+g:<f=fe:<g=fe:>h=fe:asm/fe_add(>h,<f,<g);:
|
||||
h=f-g:<f=fe:<g=fe:>h=fe:asm/fe_sub(>h,<f,<g);:
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2:<f=fe:>h=fe:asm/fe_sq(>h,<f);:
|
||||
h=2*g:<g=fe:>h=fe:asm/fe_add(>h,<g,<g);:
|
||||
|
||||
:
|
||||
|
||||
enter ge_madd
|
||||
|
||||
fe X1
|
||||
fe Y1
|
||||
fe Z1
|
||||
fe T1
|
||||
fe ypx2
|
||||
fe ymx2
|
||||
fe xy2d2
|
||||
fe X3
|
||||
fe Y3
|
||||
fe Z3
|
||||
fe T3
|
||||
fe YpX1
|
||||
fe YmX1
|
||||
fe A
|
||||
fe B
|
||||
fe C
|
||||
fe D
|
||||
|
||||
YpX1 = Y1+X1
|
||||
YmX1 = Y1-X1
|
||||
A = YpX1*ypx2
|
||||
B = YmX1*ymx2
|
||||
C = xy2d2*T1
|
||||
D = 2*Z1
|
||||
X3 = A-B
|
||||
Y3 = A+B
|
||||
Z3 = D+C
|
||||
T3 = D-C
|
||||
|
||||
return
|
11
src/ext/ed25519/ref10/ge_msub.c
Normal file
11
src/ext/ed25519/ref10/ge_msub.c
Normal file
@ -0,0 +1,11 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p - q
|
||||
*/
|
||||
|
||||
void ge_msub(ge_p1p1 *r,const ge_p3 *p,const ge_precomp *q)
|
||||
{
|
||||
fe t0;
|
||||
#include "ge_msub.h"
|
||||
}
|
88
src/ext/ed25519/ref10/ge_msub.h
Normal file
88
src/ext/ed25519/ref10/ge_msub.h
Normal file
@ -0,0 +1,88 @@
|
||||
|
||||
/* qhasm: enter ge_msub */
|
||||
|
||||
/* qhasm: fe X1 */
|
||||
|
||||
/* qhasm: fe Y1 */
|
||||
|
||||
/* qhasm: fe Z1 */
|
||||
|
||||
/* qhasm: fe T1 */
|
||||
|
||||
/* qhasm: fe ypx2 */
|
||||
|
||||
/* qhasm: fe ymx2 */
|
||||
|
||||
/* qhasm: fe xy2d2 */
|
||||
|
||||
/* qhasm: fe X3 */
|
||||
|
||||
/* qhasm: fe Y3 */
|
||||
|
||||
/* qhasm: fe Z3 */
|
||||
|
||||
/* qhasm: fe T3 */
|
||||
|
||||
/* qhasm: fe YpX1 */
|
||||
|
||||
/* qhasm: fe YmX1 */
|
||||
|
||||
/* qhasm: fe A */
|
||||
|
||||
/* qhasm: fe B */
|
||||
|
||||
/* qhasm: fe C */
|
||||
|
||||
/* qhasm: fe D */
|
||||
|
||||
/* qhasm: YpX1 = Y1+X1 */
|
||||
/* asm 1: fe_add(>YpX1=fe#1,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_add(>YpX1=r->X,<Y1=p->Y,<X1=p->X); */
|
||||
fe_add(r->X,p->Y,p->X);
|
||||
|
||||
/* qhasm: YmX1 = Y1-X1 */
|
||||
/* asm 1: fe_sub(>YmX1=fe#2,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_sub(>YmX1=r->Y,<Y1=p->Y,<X1=p->X); */
|
||||
fe_sub(r->Y,p->Y,p->X);
|
||||
|
||||
/* qhasm: A = YpX1*ymx2 */
|
||||
/* asm 1: fe_mul(>A=fe#3,<YpX1=fe#1,<ymx2=fe#16); */
|
||||
/* asm 2: fe_mul(>A=r->Z,<YpX1=r->X,<ymx2=q->yminusx); */
|
||||
fe_mul(r->Z,r->X,q->yminusx);
|
||||
|
||||
/* qhasm: B = YmX1*ypx2 */
|
||||
/* asm 1: fe_mul(>B=fe#2,<YmX1=fe#2,<ypx2=fe#15); */
|
||||
/* asm 2: fe_mul(>B=r->Y,<YmX1=r->Y,<ypx2=q->yplusx); */
|
||||
fe_mul(r->Y,r->Y,q->yplusx);
|
||||
|
||||
/* qhasm: C = xy2d2*T1 */
|
||||
/* asm 1: fe_mul(>C=fe#4,<xy2d2=fe#17,<T1=fe#14); */
|
||||
/* asm 2: fe_mul(>C=r->T,<xy2d2=q->xy2d,<T1=p->T); */
|
||||
fe_mul(r->T,q->xy2d,p->T);
|
||||
|
||||
/* qhasm: D = 2*Z1 */
|
||||
/* asm 1: fe_add(>D=fe#5,<Z1=fe#13,<Z1=fe#13); */
|
||||
/* asm 2: fe_add(>D=t0,<Z1=p->Z,<Z1=p->Z); */
|
||||
fe_add(t0,p->Z,p->Z);
|
||||
|
||||
/* qhasm: X3 = A-B */
|
||||
/* asm 1: fe_sub(>X3=fe#1,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_sub(>X3=r->X,<A=r->Z,<B=r->Y); */
|
||||
fe_sub(r->X,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Y3 = A+B */
|
||||
/* asm 1: fe_add(>Y3=fe#2,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_add(>Y3=r->Y,<A=r->Z,<B=r->Y); */
|
||||
fe_add(r->Y,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Z3 = D-C */
|
||||
/* asm 1: fe_sub(>Z3=fe#3,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_sub(>Z3=r->Z,<D=t0,<C=r->T); */
|
||||
fe_sub(r->Z,t0,r->T);
|
||||
|
||||
/* qhasm: T3 = D+C */
|
||||
/* asm 1: fe_add(>T3=fe#4,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_add(>T3=r->T,<D=t0,<C=r->T); */
|
||||
fe_add(r->T,t0,r->T);
|
||||
|
||||
/* qhasm: return */
|
46
src/ext/ed25519/ref10/ge_msub.q
Normal file
46
src/ext/ed25519/ref10/ge_msub.q
Normal file
@ -0,0 +1,46 @@
|
||||
:name:fe:r->X:r->Y:r->Z:r->T:t0:t1:t2:t3:t4:t5:p->X:p->Y:p->Z:p->T:q->yplusx:q->yminusx:q->xy2d:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>X1=fe#11:>Y1=fe#12:>Z1=fe#13:>T1=fe#14:>ypx2=fe#15:>ymx2=fe#16:>xy2d2=fe#17:
|
||||
return:nofallthrough:<X3=fe#1:<Y3=fe#2:<Z3=fe#3:<T3=fe#4:leave:
|
||||
|
||||
h=f+g:<f=fe:<g=fe:>h=fe:asm/fe_add(>h,<f,<g);:
|
||||
h=f-g:<f=fe:<g=fe:>h=fe:asm/fe_sub(>h,<f,<g);:
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2:<f=fe:>h=fe:asm/fe_sq(>h,<f);:
|
||||
h=2*g:<g=fe:>h=fe:asm/fe_add(>h,<g,<g);:
|
||||
|
||||
:
|
||||
|
||||
enter ge_msub
|
||||
|
||||
fe X1
|
||||
fe Y1
|
||||
fe Z1
|
||||
fe T1
|
||||
fe ypx2
|
||||
fe ymx2
|
||||
fe xy2d2
|
||||
fe X3
|
||||
fe Y3
|
||||
fe Z3
|
||||
fe T3
|
||||
fe YpX1
|
||||
fe YmX1
|
||||
fe A
|
||||
fe B
|
||||
fe C
|
||||
fe D
|
||||
|
||||
YpX1 = Y1+X1
|
||||
YmX1 = Y1-X1
|
||||
A = YpX1*ymx2
|
||||
B = YmX1*ypx2
|
||||
C = xy2d2*T1
|
||||
D = 2*Z1
|
||||
X3 = A-B
|
||||
Y3 = A+B
|
||||
Z3 = D-C
|
||||
T3 = D+C
|
||||
|
||||
return
|
12
src/ext/ed25519/ref10/ge_p1p1_to_p2.c
Normal file
12
src/ext/ed25519/ref10/ge_p1p1_to_p2.c
Normal file
@ -0,0 +1,12 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p
|
||||
*/
|
||||
|
||||
extern void ge_p1p1_to_p2(ge_p2 *r,const ge_p1p1 *p)
|
||||
{
|
||||
fe_mul(r->X,p->X,p->T);
|
||||
fe_mul(r->Y,p->Y,p->Z);
|
||||
fe_mul(r->Z,p->Z,p->T);
|
||||
}
|
13
src/ext/ed25519/ref10/ge_p1p1_to_p3.c
Normal file
13
src/ext/ed25519/ref10/ge_p1p1_to_p3.c
Normal file
@ -0,0 +1,13 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p
|
||||
*/
|
||||
|
||||
extern void ge_p1p1_to_p3(ge_p3 *r,const ge_p1p1 *p)
|
||||
{
|
||||
fe_mul(r->X,p->X,p->T);
|
||||
fe_mul(r->Y,p->Y,p->Z);
|
||||
fe_mul(r->Z,p->Z,p->T);
|
||||
fe_mul(r->T,p->X,p->Y);
|
||||
}
|
8
src/ext/ed25519/ref10/ge_p2_0.c
Normal file
8
src/ext/ed25519/ref10/ge_p2_0.c
Normal file
@ -0,0 +1,8 @@
|
||||
#include "ge.h"
|
||||
|
||||
void ge_p2_0(ge_p2 *h)
|
||||
{
|
||||
fe_0(h->X);
|
||||
fe_1(h->Y);
|
||||
fe_1(h->Z);
|
||||
}
|
11
src/ext/ed25519/ref10/ge_p2_dbl.c
Normal file
11
src/ext/ed25519/ref10/ge_p2_dbl.c
Normal file
@ -0,0 +1,11 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = 2 * p
|
||||
*/
|
||||
|
||||
void ge_p2_dbl(ge_p1p1 *r,const ge_p2 *p)
|
||||
{
|
||||
fe t0;
|
||||
#include "ge_p2_dbl.h"
|
||||
}
|
73
src/ext/ed25519/ref10/ge_p2_dbl.h
Normal file
73
src/ext/ed25519/ref10/ge_p2_dbl.h
Normal file
@ -0,0 +1,73 @@
|
||||
|
||||
/* qhasm: enter ge_p2_dbl */
|
||||
|
||||
/* qhasm: fe X1 */
|
||||
|
||||
/* qhasm: fe Y1 */
|
||||
|
||||
/* qhasm: fe Z1 */
|
||||
|
||||
/* qhasm: fe A */
|
||||
|
||||
/* qhasm: fe AA */
|
||||
|
||||
/* qhasm: fe XX */
|
||||
|
||||
/* qhasm: fe YY */
|
||||
|
||||
/* qhasm: fe B */
|
||||
|
||||
/* qhasm: fe X3 */
|
||||
|
||||
/* qhasm: fe Y3 */
|
||||
|
||||
/* qhasm: fe Z3 */
|
||||
|
||||
/* qhasm: fe T3 */
|
||||
|
||||
/* qhasm: XX=X1^2 */
|
||||
/* asm 1: fe_sq(>XX=fe#1,<X1=fe#11); */
|
||||
/* asm 2: fe_sq(>XX=r->X,<X1=p->X); */
|
||||
fe_sq(r->X,p->X);
|
||||
|
||||
/* qhasm: YY=Y1^2 */
|
||||
/* asm 1: fe_sq(>YY=fe#3,<Y1=fe#12); */
|
||||
/* asm 2: fe_sq(>YY=r->Z,<Y1=p->Y); */
|
||||
fe_sq(r->Z,p->Y);
|
||||
|
||||
/* qhasm: B=2*Z1^2 */
|
||||
/* asm 1: fe_sq2(>B=fe#4,<Z1=fe#13); */
|
||||
/* asm 2: fe_sq2(>B=r->T,<Z1=p->Z); */
|
||||
fe_sq2(r->T,p->Z);
|
||||
|
||||
/* qhasm: A=X1+Y1 */
|
||||
/* asm 1: fe_add(>A=fe#2,<X1=fe#11,<Y1=fe#12); */
|
||||
/* asm 2: fe_add(>A=r->Y,<X1=p->X,<Y1=p->Y); */
|
||||
fe_add(r->Y,p->X,p->Y);
|
||||
|
||||
/* qhasm: AA=A^2 */
|
||||
/* asm 1: fe_sq(>AA=fe#5,<A=fe#2); */
|
||||
/* asm 2: fe_sq(>AA=t0,<A=r->Y); */
|
||||
fe_sq(t0,r->Y);
|
||||
|
||||
/* qhasm: Y3=YY+XX */
|
||||
/* asm 1: fe_add(>Y3=fe#2,<YY=fe#3,<XX=fe#1); */
|
||||
/* asm 2: fe_add(>Y3=r->Y,<YY=r->Z,<XX=r->X); */
|
||||
fe_add(r->Y,r->Z,r->X);
|
||||
|
||||
/* qhasm: Z3=YY-XX */
|
||||
/* asm 1: fe_sub(>Z3=fe#3,<YY=fe#3,<XX=fe#1); */
|
||||
/* asm 2: fe_sub(>Z3=r->Z,<YY=r->Z,<XX=r->X); */
|
||||
fe_sub(r->Z,r->Z,r->X);
|
||||
|
||||
/* qhasm: X3=AA-Y3 */
|
||||
/* asm 1: fe_sub(>X3=fe#1,<AA=fe#5,<Y3=fe#2); */
|
||||
/* asm 2: fe_sub(>X3=r->X,<AA=t0,<Y3=r->Y); */
|
||||
fe_sub(r->X,t0,r->Y);
|
||||
|
||||
/* qhasm: T3=B-Z3 */
|
||||
/* asm 1: fe_sub(>T3=fe#4,<B=fe#4,<Z3=fe#3); */
|
||||
/* asm 2: fe_sub(>T3=r->T,<B=r->T,<Z3=r->Z); */
|
||||
fe_sub(r->T,r->T,r->Z);
|
||||
|
||||
/* qhasm: return */
|
41
src/ext/ed25519/ref10/ge_p2_dbl.q
Normal file
41
src/ext/ed25519/ref10/ge_p2_dbl.q
Normal file
@ -0,0 +1,41 @@
|
||||
:name:fe:r->X:r->Y:r->Z:r->T:t0:t1:t2:t3:t4:t5:p->X:p->Y:p->Z:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>X1=fe#11:>Y1=fe#12:>Z1=fe#13:
|
||||
return:nofallthrough:<X3=fe#1:<Y3=fe#2:<Z3=fe#3:<T3=fe#4:leave:
|
||||
|
||||
h=f+g:<f=fe:<g=fe:>h=fe:asm/fe_add(>h,<f,<g);:
|
||||
h=f-g:<f=fe:<g=fe:>h=fe:asm/fe_sub(>h,<f,<g);:
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2:<f=fe:>h=fe:asm/fe_sq(>h,<f);:
|
||||
h=2*f^2:<f=fe:>h=fe:asm/fe_sq2(>h,<f);:
|
||||
h=2*g:<g=fe:>h=fe:asm/fe_add(>h,<g,<g);:
|
||||
|
||||
:
|
||||
|
||||
enter ge_p2_dbl
|
||||
|
||||
fe X1
|
||||
fe Y1
|
||||
fe Z1
|
||||
fe A
|
||||
fe AA
|
||||
fe XX
|
||||
fe YY
|
||||
fe B
|
||||
fe X3
|
||||
fe Y3
|
||||
fe Z3
|
||||
fe T3
|
||||
|
||||
XX=X1^2
|
||||
YY=Y1^2
|
||||
B=2*Z1^2
|
||||
A=X1+Y1
|
||||
AA=A^2
|
||||
Y3=YY+XX
|
||||
Z3=YY-XX
|
||||
X3=AA-Y3
|
||||
T3=B-Z3
|
||||
|
||||
return
|
9
src/ext/ed25519/ref10/ge_p3_0.c
Normal file
9
src/ext/ed25519/ref10/ge_p3_0.c
Normal file
@ -0,0 +1,9 @@
|
||||
#include "ge.h"
|
||||
|
||||
void ge_p3_0(ge_p3 *h)
|
||||
{
|
||||
fe_0(h->X);
|
||||
fe_1(h->Y);
|
||||
fe_1(h->Z);
|
||||
fe_0(h->T);
|
||||
}
|
12
src/ext/ed25519/ref10/ge_p3_dbl.c
Normal file
12
src/ext/ed25519/ref10/ge_p3_dbl.c
Normal file
@ -0,0 +1,12 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = 2 * p
|
||||
*/
|
||||
|
||||
void ge_p3_dbl(ge_p1p1 *r,const ge_p3 *p)
|
||||
{
|
||||
ge_p2 q;
|
||||
ge_p3_to_p2(&q,p);
|
||||
ge_p2_dbl(r,&q);
|
||||
}
|
17
src/ext/ed25519/ref10/ge_p3_to_cached.c
Normal file
17
src/ext/ed25519/ref10/ge_p3_to_cached.c
Normal file
@ -0,0 +1,17 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p
|
||||
*/
|
||||
|
||||
static const fe d2 = {
|
||||
#include "d2.h"
|
||||
} ;
|
||||
|
||||
extern void ge_p3_to_cached(ge_cached *r,const ge_p3 *p)
|
||||
{
|
||||
fe_add(r->YplusX,p->Y,p->X);
|
||||
fe_sub(r->YminusX,p->Y,p->X);
|
||||
fe_copy(r->Z,p->Z);
|
||||
fe_mul(r->T2d,p->T,d2);
|
||||
}
|
12
src/ext/ed25519/ref10/ge_p3_to_p2.c
Normal file
12
src/ext/ed25519/ref10/ge_p3_to_p2.c
Normal file
@ -0,0 +1,12 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p
|
||||
*/
|
||||
|
||||
extern void ge_p3_to_p2(ge_p2 *r,const ge_p3 *p)
|
||||
{
|
||||
fe_copy(r->X,p->X);
|
||||
fe_copy(r->Y,p->Y);
|
||||
fe_copy(r->Z,p->Z);
|
||||
}
|
14
src/ext/ed25519/ref10/ge_p3_tobytes.c
Normal file
14
src/ext/ed25519/ref10/ge_p3_tobytes.c
Normal file
@ -0,0 +1,14 @@
|
||||
#include "ge.h"
|
||||
|
||||
void ge_p3_tobytes(unsigned char *s,const ge_p3 *h)
|
||||
{
|
||||
fe recip;
|
||||
fe x;
|
||||
fe y;
|
||||
|
||||
fe_invert(recip,h->Z);
|
||||
fe_mul(x,h->X,recip);
|
||||
fe_mul(y,h->Y,recip);
|
||||
fe_tobytes(s,y);
|
||||
s[31] ^= fe_isnegative(x) << 7;
|
||||
}
|
8
src/ext/ed25519/ref10/ge_precomp_0.c
Normal file
8
src/ext/ed25519/ref10/ge_precomp_0.c
Normal file
@ -0,0 +1,8 @@
|
||||
#include "ge.h"
|
||||
|
||||
void ge_precomp_0(ge_precomp *h)
|
||||
{
|
||||
fe_1(h->yplusx);
|
||||
fe_1(h->yminusx);
|
||||
fe_0(h->xy2d);
|
||||
}
|
109
src/ext/ed25519/ref10/ge_scalarmult_base.c
Normal file
109
src/ext/ed25519/ref10/ge_scalarmult_base.c
Normal file
@ -0,0 +1,109 @@
|
||||
#include "ge.h"
|
||||
#include "crypto_uint32.h"
|
||||
|
||||
/* Rename this so as not to interfere with select() which torint.h apparently
|
||||
* grabs. :p */
|
||||
#define select ed25519_ref10_select
|
||||
|
||||
static unsigned char equal(signed char b,signed char c)
|
||||
{
|
||||
unsigned char ub = b;
|
||||
unsigned char uc = c;
|
||||
unsigned char x = ub ^ uc; /* 0: yes; 1..255: no */
|
||||
crypto_uint32 y = x; /* 0: yes; 1..255: no */
|
||||
y -= 1; /* 4294967295: yes; 0..254: no */
|
||||
y >>= 31; /* 1: yes; 0: no */
|
||||
return y;
|
||||
}
|
||||
|
||||
static unsigned char negative(signed char b)
|
||||
{
|
||||
uint64_t x = b; /* 18446744073709551361..18446744073709551615: yes; 0..255: no */
|
||||
x >>= 63; /* 1: yes; 0: no */
|
||||
return x;
|
||||
}
|
||||
|
||||
static void cmov(ge_precomp *t,ge_precomp *u,unsigned char b)
|
||||
{
|
||||
fe_cmov(t->yplusx,u->yplusx,b);
|
||||
fe_cmov(t->yminusx,u->yminusx,b);
|
||||
fe_cmov(t->xy2d,u->xy2d,b);
|
||||
}
|
||||
|
||||
/* base[i][j] = (j+1)*256^i*B */
|
||||
static ge_precomp base[32][8] = {
|
||||
#include "base.h"
|
||||
} ;
|
||||
|
||||
static void select(ge_precomp *t,int pos,signed char b)
|
||||
{
|
||||
ge_precomp minust;
|
||||
unsigned char bnegative = negative(b);
|
||||
unsigned char babs = b - (((-bnegative) & b) << 1);
|
||||
|
||||
ge_precomp_0(t);
|
||||
cmov(t,&base[pos][0],equal(babs,1));
|
||||
cmov(t,&base[pos][1],equal(babs,2));
|
||||
cmov(t,&base[pos][2],equal(babs,3));
|
||||
cmov(t,&base[pos][3],equal(babs,4));
|
||||
cmov(t,&base[pos][4],equal(babs,5));
|
||||
cmov(t,&base[pos][5],equal(babs,6));
|
||||
cmov(t,&base[pos][6],equal(babs,7));
|
||||
cmov(t,&base[pos][7],equal(babs,8));
|
||||
fe_copy(minust.yplusx,t->yminusx);
|
||||
fe_copy(minust.yminusx,t->yplusx);
|
||||
fe_neg(minust.xy2d,t->xy2d);
|
||||
cmov(t,&minust,bnegative);
|
||||
}
|
||||
|
||||
/*
|
||||
h = a * B
|
||||
where a = a[0]+256*a[1]+...+256^31 a[31]
|
||||
B is the Ed25519 base point (x,4/5) with x positive.
|
||||
|
||||
Preconditions:
|
||||
a[31] <= 127
|
||||
*/
|
||||
|
||||
void ge_scalarmult_base(ge_p3 *h,const unsigned char *a)
|
||||
{
|
||||
signed char e[64];
|
||||
signed char carry;
|
||||
ge_p1p1 r;
|
||||
ge_p2 s;
|
||||
ge_precomp t;
|
||||
int i;
|
||||
|
||||
for (i = 0;i < 32;++i) {
|
||||
e[2 * i + 0] = (a[i] >> 0) & 15;
|
||||
e[2 * i + 1] = (a[i] >> 4) & 15;
|
||||
}
|
||||
/* each e[i] is between 0 and 15 */
|
||||
/* e[63] is between 0 and 7 */
|
||||
|
||||
carry = 0;
|
||||
for (i = 0;i < 63;++i) {
|
||||
e[i] += carry;
|
||||
carry = e[i] + 8;
|
||||
carry >>= 4;
|
||||
e[i] -= carry << 4;
|
||||
}
|
||||
e[63] += carry;
|
||||
/* each e[i] is between -8 and 8 */
|
||||
|
||||
ge_p3_0(h);
|
||||
for (i = 1;i < 64;i += 2) {
|
||||
select(&t,i / 2,e[i]);
|
||||
ge_madd(&r,h,&t); ge_p1p1_to_p3(h,&r);
|
||||
}
|
||||
|
||||
ge_p3_dbl(&r,h); ge_p1p1_to_p2(&s,&r);
|
||||
ge_p2_dbl(&r,&s); ge_p1p1_to_p2(&s,&r);
|
||||
ge_p2_dbl(&r,&s); ge_p1p1_to_p2(&s,&r);
|
||||
ge_p2_dbl(&r,&s); ge_p1p1_to_p3(h,&r);
|
||||
|
||||
for (i = 0;i < 64;i += 2) {
|
||||
select(&t,i / 2,e[i]);
|
||||
ge_madd(&r,h,&t); ge_p1p1_to_p3(h,&r);
|
||||
}
|
||||
}
|
11
src/ext/ed25519/ref10/ge_sub.c
Normal file
11
src/ext/ed25519/ref10/ge_sub.c
Normal file
@ -0,0 +1,11 @@
|
||||
#include "ge.h"
|
||||
|
||||
/*
|
||||
r = p - q
|
||||
*/
|
||||
|
||||
void ge_sub(ge_p1p1 *r,const ge_p3 *p,const ge_cached *q)
|
||||
{
|
||||
fe t0;
|
||||
#include "ge_sub.h"
|
||||
}
|
97
src/ext/ed25519/ref10/ge_sub.h
Normal file
97
src/ext/ed25519/ref10/ge_sub.h
Normal file
@ -0,0 +1,97 @@
|
||||
|
||||
/* qhasm: enter ge_sub */
|
||||
|
||||
/* qhasm: fe X1 */
|
||||
|
||||
/* qhasm: fe Y1 */
|
||||
|
||||
/* qhasm: fe Z1 */
|
||||
|
||||
/* qhasm: fe Z2 */
|
||||
|
||||
/* qhasm: fe T1 */
|
||||
|
||||
/* qhasm: fe ZZ */
|
||||
|
||||
/* qhasm: fe YpX2 */
|
||||
|
||||
/* qhasm: fe YmX2 */
|
||||
|
||||
/* qhasm: fe T2d2 */
|
||||
|
||||
/* qhasm: fe X3 */
|
||||
|
||||
/* qhasm: fe Y3 */
|
||||
|
||||
/* qhasm: fe Z3 */
|
||||
|
||||
/* qhasm: fe T3 */
|
||||
|
||||
/* qhasm: fe YpX1 */
|
||||
|
||||
/* qhasm: fe YmX1 */
|
||||
|
||||
/* qhasm: fe A */
|
||||
|
||||
/* qhasm: fe B */
|
||||
|
||||
/* qhasm: fe C */
|
||||
|
||||
/* qhasm: fe D */
|
||||
|
||||
/* qhasm: YpX1 = Y1+X1 */
|
||||
/* asm 1: fe_add(>YpX1=fe#1,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_add(>YpX1=r->X,<Y1=p->Y,<X1=p->X); */
|
||||
fe_add(r->X,p->Y,p->X);
|
||||
|
||||
/* qhasm: YmX1 = Y1-X1 */
|
||||
/* asm 1: fe_sub(>YmX1=fe#2,<Y1=fe#12,<X1=fe#11); */
|
||||
/* asm 2: fe_sub(>YmX1=r->Y,<Y1=p->Y,<X1=p->X); */
|
||||
fe_sub(r->Y,p->Y,p->X);
|
||||
|
||||
/* qhasm: A = YpX1*YmX2 */
|
||||
/* asm 1: fe_mul(>A=fe#3,<YpX1=fe#1,<YmX2=fe#16); */
|
||||
/* asm 2: fe_mul(>A=r->Z,<YpX1=r->X,<YmX2=q->YminusX); */
|
||||
fe_mul(r->Z,r->X,q->YminusX);
|
||||
|
||||
/* qhasm: B = YmX1*YpX2 */
|
||||
/* asm 1: fe_mul(>B=fe#2,<YmX1=fe#2,<YpX2=fe#15); */
|
||||
/* asm 2: fe_mul(>B=r->Y,<YmX1=r->Y,<YpX2=q->YplusX); */
|
||||
fe_mul(r->Y,r->Y,q->YplusX);
|
||||
|
||||
/* qhasm: C = T2d2*T1 */
|
||||
/* asm 1: fe_mul(>C=fe#4,<T2d2=fe#18,<T1=fe#14); */
|
||||
/* asm 2: fe_mul(>C=r->T,<T2d2=q->T2d,<T1=p->T); */
|
||||
fe_mul(r->T,q->T2d,p->T);
|
||||
|
||||
/* qhasm: ZZ = Z1*Z2 */
|
||||
/* asm 1: fe_mul(>ZZ=fe#1,<Z1=fe#13,<Z2=fe#17); */
|
||||
/* asm 2: fe_mul(>ZZ=r->X,<Z1=p->Z,<Z2=q->Z); */
|
||||
fe_mul(r->X,p->Z,q->Z);
|
||||
|
||||
/* qhasm: D = 2*ZZ */
|
||||
/* asm 1: fe_add(>D=fe#5,<ZZ=fe#1,<ZZ=fe#1); */
|
||||
/* asm 2: fe_add(>D=t0,<ZZ=r->X,<ZZ=r->X); */
|
||||
fe_add(t0,r->X,r->X);
|
||||
|
||||
/* qhasm: X3 = A-B */
|
||||
/* asm 1: fe_sub(>X3=fe#1,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_sub(>X3=r->X,<A=r->Z,<B=r->Y); */
|
||||
fe_sub(r->X,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Y3 = A+B */
|
||||
/* asm 1: fe_add(>Y3=fe#2,<A=fe#3,<B=fe#2); */
|
||||
/* asm 2: fe_add(>Y3=r->Y,<A=r->Z,<B=r->Y); */
|
||||
fe_add(r->Y,r->Z,r->Y);
|
||||
|
||||
/* qhasm: Z3 = D-C */
|
||||
/* asm 1: fe_sub(>Z3=fe#3,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_sub(>Z3=r->Z,<D=t0,<C=r->T); */
|
||||
fe_sub(r->Z,t0,r->T);
|
||||
|
||||
/* qhasm: T3 = D+C */
|
||||
/* asm 1: fe_add(>T3=fe#4,<D=fe#5,<C=fe#4); */
|
||||
/* asm 2: fe_add(>T3=r->T,<D=t0,<C=r->T); */
|
||||
fe_add(r->T,t0,r->T);
|
||||
|
||||
/* qhasm: return */
|
49
src/ext/ed25519/ref10/ge_sub.q
Normal file
49
src/ext/ed25519/ref10/ge_sub.q
Normal file
@ -0,0 +1,49 @@
|
||||
:name:fe:r->X:r->Y:r->Z:r->T:t0:t1:t2:t3:t4:t5:p->X:p->Y:p->Z:p->T:q->YplusX:q->YminusX:q->Z:q->T2d:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>X1=fe#11:>Y1=fe#12:>Z1=fe#13:>T1=fe#14:>YpX2=fe#15:>YmX2=fe#16:>Z2=fe#17:>T2d2=fe#18:
|
||||
return:nofallthrough:<X3=fe#1:<Y3=fe#2:<Z3=fe#3:<T3=fe#4:leave:
|
||||
|
||||
h=f+g:<f=fe:<g=fe:>h=fe:asm/fe_add(>h,<f,<g);:
|
||||
h=f-g:<f=fe:<g=fe:>h=fe:asm/fe_sub(>h,<f,<g);:
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2:<f=fe:>h=fe:asm/fe_sq(>h,<f);:
|
||||
h=2*g:<g=fe:>h=fe:asm/fe_add(>h,<g,<g);:
|
||||
|
||||
:
|
||||
|
||||
enter ge_sub
|
||||
|
||||
fe X1
|
||||
fe Y1
|
||||
fe Z1
|
||||
fe Z2
|
||||
fe T1
|
||||
fe ZZ
|
||||
fe YpX2
|
||||
fe YmX2
|
||||
fe T2d2
|
||||
fe X3
|
||||
fe Y3
|
||||
fe Z3
|
||||
fe T3
|
||||
fe YpX1
|
||||
fe YmX1
|
||||
fe A
|
||||
fe B
|
||||
fe C
|
||||
fe D
|
||||
|
||||
YpX1 = Y1+X1
|
||||
YmX1 = Y1-X1
|
||||
A = YpX1*YmX2
|
||||
B = YmX1*YpX2
|
||||
C = T2d2*T1
|
||||
ZZ = Z1*Z2
|
||||
D = 2*ZZ
|
||||
X3 = A-B
|
||||
Y3 = A+B
|
||||
Z3 = D-C
|
||||
T3 = D+C
|
||||
|
||||
return
|
14
src/ext/ed25519/ref10/ge_tobytes.c
Normal file
14
src/ext/ed25519/ref10/ge_tobytes.c
Normal file
@ -0,0 +1,14 @@
|
||||
#include "ge.h"
|
||||
|
||||
void ge_tobytes(unsigned char *s,const ge_p2 *h)
|
||||
{
|
||||
fe recip;
|
||||
fe x;
|
||||
fe y;
|
||||
|
||||
fe_invert(recip,h->Z);
|
||||
fe_mul(x,h->X,recip);
|
||||
fe_mul(y,h->Y,recip);
|
||||
fe_tobytes(s,y);
|
||||
s[31] ^= fe_isnegative(x) << 7;
|
||||
}
|
37
src/ext/ed25519/ref10/keyconv.c
Normal file
37
src/ext/ed25519/ref10/keyconv.c
Normal file
@ -0,0 +1,37 @@
|
||||
/* Added to ref10 for Tor. We place this in the public domain. Alternatively,
|
||||
* you may have it under the Creative Commons 0 "CC0" license. */
|
||||
#include "fe.h"
|
||||
#include "ed25519_ref10.h"
|
||||
|
||||
int ed25519_ref10_pubkey_from_curve25519_pubkey(unsigned char *out,
|
||||
const unsigned char *inp,
|
||||
int signbit)
|
||||
{
|
||||
fe u;
|
||||
fe one;
|
||||
fe y;
|
||||
fe uplus1;
|
||||
fe uminus1;
|
||||
fe inv_uplus1;
|
||||
|
||||
/* From prop228:
|
||||
|
||||
Given a curve25519 x-coordinate (u), we can get the y coordinate
|
||||
of the ed25519 key using
|
||||
|
||||
y = (u-1)/(u+1)
|
||||
*/
|
||||
fe_frombytes(u, inp);
|
||||
fe_1(one);
|
||||
fe_sub(uminus1, u, one);
|
||||
fe_add(uplus1, u, one);
|
||||
fe_invert(inv_uplus1, uplus1);
|
||||
fe_mul(y, uminus1, inv_uplus1);
|
||||
|
||||
fe_tobytes(out, y);
|
||||
|
||||
/* propagate sign. */
|
||||
out[31] |= (!!signbit) << 7;
|
||||
|
||||
return 0;
|
||||
}
|
51
src/ext/ed25519/ref10/keypair.c
Normal file
51
src/ext/ed25519/ref10/keypair.c
Normal file
@ -0,0 +1,51 @@
|
||||
/* Modified for Tor: new API, 64-byte secret keys. */
|
||||
#include <string.h>
|
||||
#include "randombytes.h"
|
||||
#include "crypto_sign.h"
|
||||
#include "crypto_hash_sha512.h"
|
||||
#include "ge.h"
|
||||
|
||||
int
|
||||
crypto_sign_seckey(unsigned char *sk)
|
||||
{
|
||||
unsigned char seed[32];
|
||||
|
||||
if (randombytes(seed,32) < 0)
|
||||
return -1;
|
||||
|
||||
crypto_sign_seckey_expand(sk, seed);
|
||||
|
||||
memwipe(seed, 0, 32);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int crypto_sign_seckey_expand(unsigned char *sk, const unsigned char *skseed)
|
||||
{
|
||||
crypto_hash_sha512(sk,skseed,32);
|
||||
sk[0] &= 248;
|
||||
sk[31] &= 63;
|
||||
sk[31] |= 64;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int crypto_sign_pubkey(unsigned char *pk,const unsigned char *sk)
|
||||
{
|
||||
ge_p3 A;
|
||||
|
||||
ge_scalarmult_base(&A,sk);
|
||||
ge_p3_tobytes(pk,&A);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int crypto_sign_keypair(unsigned char *pk,unsigned char *sk)
|
||||
{
|
||||
crypto_sign_seckey(sk);
|
||||
crypto_sign_pubkey(pk, sk);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
42
src/ext/ed25519/ref10/open.c
Normal file
42
src/ext/ed25519/ref10/open.c
Normal file
@ -0,0 +1,42 @@
|
||||
/* (Modified by Tor to verify signature separately from message) */
|
||||
#include <string.h>
|
||||
#include "crypto_sign.h"
|
||||
#include "crypto_hash_sha512.h"
|
||||
#include "crypto_verify_32.h"
|
||||
#include "ge.h"
|
||||
#include "sc.h"
|
||||
|
||||
/* 'signature' must be 64-bytes long. */
|
||||
int crypto_sign_open(
|
||||
const unsigned char *signature,
|
||||
const unsigned char *m,uint64_t mlen,
|
||||
const unsigned char *pk
|
||||
)
|
||||
{
|
||||
unsigned char pkcopy[32];
|
||||
unsigned char rcopy[32];
|
||||
unsigned char scopy[32];
|
||||
unsigned char h[64];
|
||||
unsigned char rcheck[32];
|
||||
ge_p3 A;
|
||||
ge_p2 R;
|
||||
|
||||
if (signature[63] & 224) goto badsig;
|
||||
if (ge_frombytes_negate_vartime(&A,pk) != 0) goto badsig;
|
||||
|
||||
memmove(pkcopy,pk,32);
|
||||
memmove(rcopy,signature,32);
|
||||
memmove(scopy,signature + 32,32);
|
||||
|
||||
crypto_hash_sha512_3(h, rcopy, 32, pkcopy, 32, m, mlen);
|
||||
sc_reduce(h);
|
||||
|
||||
ge_double_scalarmult_vartime(&R,h,&A,scopy);
|
||||
ge_tobytes(rcheck,&R);
|
||||
if (crypto_verify_32(rcheck,rcopy) == 0) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
badsig:
|
||||
return -1;
|
||||
}
|
160
src/ext/ed25519/ref10/pow22523.h
Normal file
160
src/ext/ed25519/ref10/pow22523.h
Normal file
@ -0,0 +1,160 @@
|
||||
|
||||
/* qhasm: fe z1 */
|
||||
|
||||
/* qhasm: fe z2 */
|
||||
|
||||
/* qhasm: fe z8 */
|
||||
|
||||
/* qhasm: fe z9 */
|
||||
|
||||
/* qhasm: fe z11 */
|
||||
|
||||
/* qhasm: fe z22 */
|
||||
|
||||
/* qhasm: fe z_5_0 */
|
||||
|
||||
/* qhasm: fe z_10_5 */
|
||||
|
||||
/* qhasm: fe z_10_0 */
|
||||
|
||||
/* qhasm: fe z_20_10 */
|
||||
|
||||
/* qhasm: fe z_20_0 */
|
||||
|
||||
/* qhasm: fe z_40_20 */
|
||||
|
||||
/* qhasm: fe z_40_0 */
|
||||
|
||||
/* qhasm: fe z_50_10 */
|
||||
|
||||
/* qhasm: fe z_50_0 */
|
||||
|
||||
/* qhasm: fe z_100_50 */
|
||||
|
||||
/* qhasm: fe z_100_0 */
|
||||
|
||||
/* qhasm: fe z_200_100 */
|
||||
|
||||
/* qhasm: fe z_200_0 */
|
||||
|
||||
/* qhasm: fe z_250_50 */
|
||||
|
||||
/* qhasm: fe z_250_0 */
|
||||
|
||||
/* qhasm: fe z_252_2 */
|
||||
|
||||
/* qhasm: fe z_252_3 */
|
||||
|
||||
/* qhasm: enter pow22523 */
|
||||
|
||||
/* qhasm: z2 = z1^2^1 */
|
||||
/* asm 1: fe_sq(>z2=fe#1,<z1=fe#11); for (i = 1;i < 1;++i) fe_sq(>z2=fe#1,>z2=fe#1); */
|
||||
/* asm 2: fe_sq(>z2=t0,<z1=z); for (i = 1;i < 1;++i) fe_sq(>z2=t0,>z2=t0); */
|
||||
fe_sq(t0,z); for (i = 1;i < 1;++i) fe_sq(t0,t0);
|
||||
|
||||
/* qhasm: z8 = z2^2^2 */
|
||||
/* asm 1: fe_sq(>z8=fe#2,<z2=fe#1); for (i = 1;i < 2;++i) fe_sq(>z8=fe#2,>z8=fe#2); */
|
||||
/* asm 2: fe_sq(>z8=t1,<z2=t0); for (i = 1;i < 2;++i) fe_sq(>z8=t1,>z8=t1); */
|
||||
fe_sq(t1,t0); for (i = 1;i < 2;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z9 = z1*z8 */
|
||||
/* asm 1: fe_mul(>z9=fe#2,<z1=fe#11,<z8=fe#2); */
|
||||
/* asm 2: fe_mul(>z9=t1,<z1=z,<z8=t1); */
|
||||
fe_mul(t1,z,t1);
|
||||
|
||||
/* qhasm: z11 = z2*z9 */
|
||||
/* asm 1: fe_mul(>z11=fe#1,<z2=fe#1,<z9=fe#2); */
|
||||
/* asm 2: fe_mul(>z11=t0,<z2=t0,<z9=t1); */
|
||||
fe_mul(t0,t0,t1);
|
||||
|
||||
/* qhasm: z22 = z11^2^1 */
|
||||
/* asm 1: fe_sq(>z22=fe#1,<z11=fe#1); for (i = 1;i < 1;++i) fe_sq(>z22=fe#1,>z22=fe#1); */
|
||||
/* asm 2: fe_sq(>z22=t0,<z11=t0); for (i = 1;i < 1;++i) fe_sq(>z22=t0,>z22=t0); */
|
||||
fe_sq(t0,t0); for (i = 1;i < 1;++i) fe_sq(t0,t0);
|
||||
|
||||
/* qhasm: z_5_0 = z9*z22 */
|
||||
/* asm 1: fe_mul(>z_5_0=fe#1,<z9=fe#2,<z22=fe#1); */
|
||||
/* asm 2: fe_mul(>z_5_0=t0,<z9=t1,<z22=t0); */
|
||||
fe_mul(t0,t1,t0);
|
||||
|
||||
/* qhasm: z_10_5 = z_5_0^2^5 */
|
||||
/* asm 1: fe_sq(>z_10_5=fe#2,<z_5_0=fe#1); for (i = 1;i < 5;++i) fe_sq(>z_10_5=fe#2,>z_10_5=fe#2); */
|
||||
/* asm 2: fe_sq(>z_10_5=t1,<z_5_0=t0); for (i = 1;i < 5;++i) fe_sq(>z_10_5=t1,>z_10_5=t1); */
|
||||
fe_sq(t1,t0); for (i = 1;i < 5;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_10_0 = z_10_5*z_5_0 */
|
||||
/* asm 1: fe_mul(>z_10_0=fe#1,<z_10_5=fe#2,<z_5_0=fe#1); */
|
||||
/* asm 2: fe_mul(>z_10_0=t0,<z_10_5=t1,<z_5_0=t0); */
|
||||
fe_mul(t0,t1,t0);
|
||||
|
||||
/* qhasm: z_20_10 = z_10_0^2^10 */
|
||||
/* asm 1: fe_sq(>z_20_10=fe#2,<z_10_0=fe#1); for (i = 1;i < 10;++i) fe_sq(>z_20_10=fe#2,>z_20_10=fe#2); */
|
||||
/* asm 2: fe_sq(>z_20_10=t1,<z_10_0=t0); for (i = 1;i < 10;++i) fe_sq(>z_20_10=t1,>z_20_10=t1); */
|
||||
fe_sq(t1,t0); for (i = 1;i < 10;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_20_0 = z_20_10*z_10_0 */
|
||||
/* asm 1: fe_mul(>z_20_0=fe#2,<z_20_10=fe#2,<z_10_0=fe#1); */
|
||||
/* asm 2: fe_mul(>z_20_0=t1,<z_20_10=t1,<z_10_0=t0); */
|
||||
fe_mul(t1,t1,t0);
|
||||
|
||||
/* qhasm: z_40_20 = z_20_0^2^20 */
|
||||
/* asm 1: fe_sq(>z_40_20=fe#3,<z_20_0=fe#2); for (i = 1;i < 20;++i) fe_sq(>z_40_20=fe#3,>z_40_20=fe#3); */
|
||||
/* asm 2: fe_sq(>z_40_20=t2,<z_20_0=t1); for (i = 1;i < 20;++i) fe_sq(>z_40_20=t2,>z_40_20=t2); */
|
||||
fe_sq(t2,t1); for (i = 1;i < 20;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_40_0 = z_40_20*z_20_0 */
|
||||
/* asm 1: fe_mul(>z_40_0=fe#2,<z_40_20=fe#3,<z_20_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_40_0=t1,<z_40_20=t2,<z_20_0=t1); */
|
||||
fe_mul(t1,t2,t1);
|
||||
|
||||
/* qhasm: z_50_10 = z_40_0^2^10 */
|
||||
/* asm 1: fe_sq(>z_50_10=fe#2,<z_40_0=fe#2); for (i = 1;i < 10;++i) fe_sq(>z_50_10=fe#2,>z_50_10=fe#2); */
|
||||
/* asm 2: fe_sq(>z_50_10=t1,<z_40_0=t1); for (i = 1;i < 10;++i) fe_sq(>z_50_10=t1,>z_50_10=t1); */
|
||||
fe_sq(t1,t1); for (i = 1;i < 10;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_50_0 = z_50_10*z_10_0 */
|
||||
/* asm 1: fe_mul(>z_50_0=fe#1,<z_50_10=fe#2,<z_10_0=fe#1); */
|
||||
/* asm 2: fe_mul(>z_50_0=t0,<z_50_10=t1,<z_10_0=t0); */
|
||||
fe_mul(t0,t1,t0);
|
||||
|
||||
/* qhasm: z_100_50 = z_50_0^2^50 */
|
||||
/* asm 1: fe_sq(>z_100_50=fe#2,<z_50_0=fe#1); for (i = 1;i < 50;++i) fe_sq(>z_100_50=fe#2,>z_100_50=fe#2); */
|
||||
/* asm 2: fe_sq(>z_100_50=t1,<z_50_0=t0); for (i = 1;i < 50;++i) fe_sq(>z_100_50=t1,>z_100_50=t1); */
|
||||
fe_sq(t1,t0); for (i = 1;i < 50;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_100_0 = z_100_50*z_50_0 */
|
||||
/* asm 1: fe_mul(>z_100_0=fe#2,<z_100_50=fe#2,<z_50_0=fe#1); */
|
||||
/* asm 2: fe_mul(>z_100_0=t1,<z_100_50=t1,<z_50_0=t0); */
|
||||
fe_mul(t1,t1,t0);
|
||||
|
||||
/* qhasm: z_200_100 = z_100_0^2^100 */
|
||||
/* asm 1: fe_sq(>z_200_100=fe#3,<z_100_0=fe#2); for (i = 1;i < 100;++i) fe_sq(>z_200_100=fe#3,>z_200_100=fe#3); */
|
||||
/* asm 2: fe_sq(>z_200_100=t2,<z_100_0=t1); for (i = 1;i < 100;++i) fe_sq(>z_200_100=t2,>z_200_100=t2); */
|
||||
fe_sq(t2,t1); for (i = 1;i < 100;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_200_0 = z_200_100*z_100_0 */
|
||||
/* asm 1: fe_mul(>z_200_0=fe#2,<z_200_100=fe#3,<z_100_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_200_0=t1,<z_200_100=t2,<z_100_0=t1); */
|
||||
fe_mul(t1,t2,t1);
|
||||
|
||||
/* qhasm: z_250_50 = z_200_0^2^50 */
|
||||
/* asm 1: fe_sq(>z_250_50=fe#2,<z_200_0=fe#2); for (i = 1;i < 50;++i) fe_sq(>z_250_50=fe#2,>z_250_50=fe#2); */
|
||||
/* asm 2: fe_sq(>z_250_50=t1,<z_200_0=t1); for (i = 1;i < 50;++i) fe_sq(>z_250_50=t1,>z_250_50=t1); */
|
||||
fe_sq(t1,t1); for (i = 1;i < 50;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_250_0 = z_250_50*z_50_0 */
|
||||
/* asm 1: fe_mul(>z_250_0=fe#1,<z_250_50=fe#2,<z_50_0=fe#1); */
|
||||
/* asm 2: fe_mul(>z_250_0=t0,<z_250_50=t1,<z_50_0=t0); */
|
||||
fe_mul(t0,t1,t0);
|
||||
|
||||
/* qhasm: z_252_2 = z_250_0^2^2 */
|
||||
/* asm 1: fe_sq(>z_252_2=fe#1,<z_250_0=fe#1); for (i = 1;i < 2;++i) fe_sq(>z_252_2=fe#1,>z_252_2=fe#1); */
|
||||
/* asm 2: fe_sq(>z_252_2=t0,<z_250_0=t0); for (i = 1;i < 2;++i) fe_sq(>z_252_2=t0,>z_252_2=t0); */
|
||||
fe_sq(t0,t0); for (i = 1;i < 2;++i) fe_sq(t0,t0);
|
||||
|
||||
/* qhasm: z_252_3 = z_252_2*z1 */
|
||||
/* asm 1: fe_mul(>z_252_3=fe#12,<z_252_2=fe#1,<z1=fe#11); */
|
||||
/* asm 2: fe_mul(>z_252_3=out,<z_252_2=t0,<z1=z); */
|
||||
fe_mul(out,t0,z);
|
||||
|
||||
/* qhasm: return */
|
61
src/ext/ed25519/ref10/pow22523.q
Normal file
61
src/ext/ed25519/ref10/pow22523.q
Normal file
@ -0,0 +1,61 @@
|
||||
:name:fe:t0:t1:t2:t3:t4:t5:t6:t7:t8:t9:z:out:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>z1=fe#11:
|
||||
return:nofallthrough:<z_252_3=fe#12:leave:
|
||||
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2^k:<f=fe:>h=fe:#k:asm/fe_sq(>h,<f); for (i = 1;i !lt; #k;++i) fe_sq(>h,>h);:
|
||||
|
||||
:
|
||||
|
||||
fe z1
|
||||
fe z2
|
||||
fe z8
|
||||
fe z9
|
||||
fe z11
|
||||
fe z22
|
||||
fe z_5_0
|
||||
fe z_10_5
|
||||
fe z_10_0
|
||||
fe z_20_10
|
||||
fe z_20_0
|
||||
fe z_40_20
|
||||
fe z_40_0
|
||||
fe z_50_10
|
||||
fe z_50_0
|
||||
fe z_100_50
|
||||
fe z_100_0
|
||||
fe z_200_100
|
||||
fe z_200_0
|
||||
fe z_250_50
|
||||
fe z_250_0
|
||||
fe z_252_2
|
||||
fe z_252_3
|
||||
|
||||
enter pow22523
|
||||
|
||||
z2 = z1^2^1
|
||||
z8 = z2^2^2
|
||||
z9 = z1*z8
|
||||
z11 = z2*z9
|
||||
z22 = z11^2^1
|
||||
z_5_0 = z9*z22
|
||||
z_10_5 = z_5_0^2^5
|
||||
z_10_0 = z_10_5*z_5_0
|
||||
z_20_10 = z_10_0^2^10
|
||||
z_20_0 = z_20_10*z_10_0
|
||||
z_40_20 = z_20_0^2^20
|
||||
z_40_0 = z_40_20*z_20_0
|
||||
z_50_10 = z_40_0^2^10
|
||||
z_50_0 = z_50_10*z_10_0
|
||||
z_100_50 = z_50_0^2^50
|
||||
z_100_0 = z_100_50*z_50_0
|
||||
z_200_100 = z_100_0^2^100
|
||||
z_200_0 = z_200_100*z_100_0
|
||||
z_250_50 = z_200_0^2^50
|
||||
z_250_0 = z_250_50*z_50_0
|
||||
z_252_2 = z_250_0^2^2
|
||||
z_252_3 = z_252_2*z1
|
||||
|
||||
return
|
160
src/ext/ed25519/ref10/pow225521.h
Normal file
160
src/ext/ed25519/ref10/pow225521.h
Normal file
@ -0,0 +1,160 @@
|
||||
|
||||
/* qhasm: fe z1 */
|
||||
|
||||
/* qhasm: fe z2 */
|
||||
|
||||
/* qhasm: fe z8 */
|
||||
|
||||
/* qhasm: fe z9 */
|
||||
|
||||
/* qhasm: fe z11 */
|
||||
|
||||
/* qhasm: fe z22 */
|
||||
|
||||
/* qhasm: fe z_5_0 */
|
||||
|
||||
/* qhasm: fe z_10_5 */
|
||||
|
||||
/* qhasm: fe z_10_0 */
|
||||
|
||||
/* qhasm: fe z_20_10 */
|
||||
|
||||
/* qhasm: fe z_20_0 */
|
||||
|
||||
/* qhasm: fe z_40_20 */
|
||||
|
||||
/* qhasm: fe z_40_0 */
|
||||
|
||||
/* qhasm: fe z_50_10 */
|
||||
|
||||
/* qhasm: fe z_50_0 */
|
||||
|
||||
/* qhasm: fe z_100_50 */
|
||||
|
||||
/* qhasm: fe z_100_0 */
|
||||
|
||||
/* qhasm: fe z_200_100 */
|
||||
|
||||
/* qhasm: fe z_200_0 */
|
||||
|
||||
/* qhasm: fe z_250_50 */
|
||||
|
||||
/* qhasm: fe z_250_0 */
|
||||
|
||||
/* qhasm: fe z_255_5 */
|
||||
|
||||
/* qhasm: fe z_255_21 */
|
||||
|
||||
/* qhasm: enter pow225521 */
|
||||
|
||||
/* qhasm: z2 = z1^2^1 */
|
||||
/* asm 1: fe_sq(>z2=fe#1,<z1=fe#11); for (i = 1;i < 1;++i) fe_sq(>z2=fe#1,>z2=fe#1); */
|
||||
/* asm 2: fe_sq(>z2=t0,<z1=z); for (i = 1;i < 1;++i) fe_sq(>z2=t0,>z2=t0); */
|
||||
fe_sq(t0,z); for (i = 1;i < 1;++i) fe_sq(t0,t0);
|
||||
|
||||
/* qhasm: z8 = z2^2^2 */
|
||||
/* asm 1: fe_sq(>z8=fe#2,<z2=fe#1); for (i = 1;i < 2;++i) fe_sq(>z8=fe#2,>z8=fe#2); */
|
||||
/* asm 2: fe_sq(>z8=t1,<z2=t0); for (i = 1;i < 2;++i) fe_sq(>z8=t1,>z8=t1); */
|
||||
fe_sq(t1,t0); for (i = 1;i < 2;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z9 = z1*z8 */
|
||||
/* asm 1: fe_mul(>z9=fe#2,<z1=fe#11,<z8=fe#2); */
|
||||
/* asm 2: fe_mul(>z9=t1,<z1=z,<z8=t1); */
|
||||
fe_mul(t1,z,t1);
|
||||
|
||||
/* qhasm: z11 = z2*z9 */
|
||||
/* asm 1: fe_mul(>z11=fe#1,<z2=fe#1,<z9=fe#2); */
|
||||
/* asm 2: fe_mul(>z11=t0,<z2=t0,<z9=t1); */
|
||||
fe_mul(t0,t0,t1);
|
||||
|
||||
/* qhasm: z22 = z11^2^1 */
|
||||
/* asm 1: fe_sq(>z22=fe#3,<z11=fe#1); for (i = 1;i < 1;++i) fe_sq(>z22=fe#3,>z22=fe#3); */
|
||||
/* asm 2: fe_sq(>z22=t2,<z11=t0); for (i = 1;i < 1;++i) fe_sq(>z22=t2,>z22=t2); */
|
||||
fe_sq(t2,t0); for (i = 1;i < 1;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_5_0 = z9*z22 */
|
||||
/* asm 1: fe_mul(>z_5_0=fe#2,<z9=fe#2,<z22=fe#3); */
|
||||
/* asm 2: fe_mul(>z_5_0=t1,<z9=t1,<z22=t2); */
|
||||
fe_mul(t1,t1,t2);
|
||||
|
||||
/* qhasm: z_10_5 = z_5_0^2^5 */
|
||||
/* asm 1: fe_sq(>z_10_5=fe#3,<z_5_0=fe#2); for (i = 1;i < 5;++i) fe_sq(>z_10_5=fe#3,>z_10_5=fe#3); */
|
||||
/* asm 2: fe_sq(>z_10_5=t2,<z_5_0=t1); for (i = 1;i < 5;++i) fe_sq(>z_10_5=t2,>z_10_5=t2); */
|
||||
fe_sq(t2,t1); for (i = 1;i < 5;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_10_0 = z_10_5*z_5_0 */
|
||||
/* asm 1: fe_mul(>z_10_0=fe#2,<z_10_5=fe#3,<z_5_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_10_0=t1,<z_10_5=t2,<z_5_0=t1); */
|
||||
fe_mul(t1,t2,t1);
|
||||
|
||||
/* qhasm: z_20_10 = z_10_0^2^10 */
|
||||
/* asm 1: fe_sq(>z_20_10=fe#3,<z_10_0=fe#2); for (i = 1;i < 10;++i) fe_sq(>z_20_10=fe#3,>z_20_10=fe#3); */
|
||||
/* asm 2: fe_sq(>z_20_10=t2,<z_10_0=t1); for (i = 1;i < 10;++i) fe_sq(>z_20_10=t2,>z_20_10=t2); */
|
||||
fe_sq(t2,t1); for (i = 1;i < 10;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_20_0 = z_20_10*z_10_0 */
|
||||
/* asm 1: fe_mul(>z_20_0=fe#3,<z_20_10=fe#3,<z_10_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_20_0=t2,<z_20_10=t2,<z_10_0=t1); */
|
||||
fe_mul(t2,t2,t1);
|
||||
|
||||
/* qhasm: z_40_20 = z_20_0^2^20 */
|
||||
/* asm 1: fe_sq(>z_40_20=fe#4,<z_20_0=fe#3); for (i = 1;i < 20;++i) fe_sq(>z_40_20=fe#4,>z_40_20=fe#4); */
|
||||
/* asm 2: fe_sq(>z_40_20=t3,<z_20_0=t2); for (i = 1;i < 20;++i) fe_sq(>z_40_20=t3,>z_40_20=t3); */
|
||||
fe_sq(t3,t2); for (i = 1;i < 20;++i) fe_sq(t3,t3);
|
||||
|
||||
/* qhasm: z_40_0 = z_40_20*z_20_0 */
|
||||
/* asm 1: fe_mul(>z_40_0=fe#3,<z_40_20=fe#4,<z_20_0=fe#3); */
|
||||
/* asm 2: fe_mul(>z_40_0=t2,<z_40_20=t3,<z_20_0=t2); */
|
||||
fe_mul(t2,t3,t2);
|
||||
|
||||
/* qhasm: z_50_10 = z_40_0^2^10 */
|
||||
/* asm 1: fe_sq(>z_50_10=fe#3,<z_40_0=fe#3); for (i = 1;i < 10;++i) fe_sq(>z_50_10=fe#3,>z_50_10=fe#3); */
|
||||
/* asm 2: fe_sq(>z_50_10=t2,<z_40_0=t2); for (i = 1;i < 10;++i) fe_sq(>z_50_10=t2,>z_50_10=t2); */
|
||||
fe_sq(t2,t2); for (i = 1;i < 10;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_50_0 = z_50_10*z_10_0 */
|
||||
/* asm 1: fe_mul(>z_50_0=fe#2,<z_50_10=fe#3,<z_10_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_50_0=t1,<z_50_10=t2,<z_10_0=t1); */
|
||||
fe_mul(t1,t2,t1);
|
||||
|
||||
/* qhasm: z_100_50 = z_50_0^2^50 */
|
||||
/* asm 1: fe_sq(>z_100_50=fe#3,<z_50_0=fe#2); for (i = 1;i < 50;++i) fe_sq(>z_100_50=fe#3,>z_100_50=fe#3); */
|
||||
/* asm 2: fe_sq(>z_100_50=t2,<z_50_0=t1); for (i = 1;i < 50;++i) fe_sq(>z_100_50=t2,>z_100_50=t2); */
|
||||
fe_sq(t2,t1); for (i = 1;i < 50;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_100_0 = z_100_50*z_50_0 */
|
||||
/* asm 1: fe_mul(>z_100_0=fe#3,<z_100_50=fe#3,<z_50_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_100_0=t2,<z_100_50=t2,<z_50_0=t1); */
|
||||
fe_mul(t2,t2,t1);
|
||||
|
||||
/* qhasm: z_200_100 = z_100_0^2^100 */
|
||||
/* asm 1: fe_sq(>z_200_100=fe#4,<z_100_0=fe#3); for (i = 1;i < 100;++i) fe_sq(>z_200_100=fe#4,>z_200_100=fe#4); */
|
||||
/* asm 2: fe_sq(>z_200_100=t3,<z_100_0=t2); for (i = 1;i < 100;++i) fe_sq(>z_200_100=t3,>z_200_100=t3); */
|
||||
fe_sq(t3,t2); for (i = 1;i < 100;++i) fe_sq(t3,t3);
|
||||
|
||||
/* qhasm: z_200_0 = z_200_100*z_100_0 */
|
||||
/* asm 1: fe_mul(>z_200_0=fe#3,<z_200_100=fe#4,<z_100_0=fe#3); */
|
||||
/* asm 2: fe_mul(>z_200_0=t2,<z_200_100=t3,<z_100_0=t2); */
|
||||
fe_mul(t2,t3,t2);
|
||||
|
||||
/* qhasm: z_250_50 = z_200_0^2^50 */
|
||||
/* asm 1: fe_sq(>z_250_50=fe#3,<z_200_0=fe#3); for (i = 1;i < 50;++i) fe_sq(>z_250_50=fe#3,>z_250_50=fe#3); */
|
||||
/* asm 2: fe_sq(>z_250_50=t2,<z_200_0=t2); for (i = 1;i < 50;++i) fe_sq(>z_250_50=t2,>z_250_50=t2); */
|
||||
fe_sq(t2,t2); for (i = 1;i < 50;++i) fe_sq(t2,t2);
|
||||
|
||||
/* qhasm: z_250_0 = z_250_50*z_50_0 */
|
||||
/* asm 1: fe_mul(>z_250_0=fe#2,<z_250_50=fe#3,<z_50_0=fe#2); */
|
||||
/* asm 2: fe_mul(>z_250_0=t1,<z_250_50=t2,<z_50_0=t1); */
|
||||
fe_mul(t1,t2,t1);
|
||||
|
||||
/* qhasm: z_255_5 = z_250_0^2^5 */
|
||||
/* asm 1: fe_sq(>z_255_5=fe#2,<z_250_0=fe#2); for (i = 1;i < 5;++i) fe_sq(>z_255_5=fe#2,>z_255_5=fe#2); */
|
||||
/* asm 2: fe_sq(>z_255_5=t1,<z_250_0=t1); for (i = 1;i < 5;++i) fe_sq(>z_255_5=t1,>z_255_5=t1); */
|
||||
fe_sq(t1,t1); for (i = 1;i < 5;++i) fe_sq(t1,t1);
|
||||
|
||||
/* qhasm: z_255_21 = z_255_5*z11 */
|
||||
/* asm 1: fe_mul(>z_255_21=fe#12,<z_255_5=fe#2,<z11=fe#1); */
|
||||
/* asm 2: fe_mul(>z_255_21=out,<z_255_5=t1,<z11=t0); */
|
||||
fe_mul(out,t1,t0);
|
||||
|
||||
/* qhasm: return */
|
61
src/ext/ed25519/ref10/pow225521.q
Normal file
61
src/ext/ed25519/ref10/pow225521.q
Normal file
@ -0,0 +1,61 @@
|
||||
:name:fe:t0:t1:t2:t3:t4:t5:t6:t7:t8:t9:z:out:
|
||||
fe r:var/r=fe:
|
||||
|
||||
enter f:enter/f:>z1=fe#11:
|
||||
return:nofallthrough:<z_255_21=fe#12:leave:
|
||||
|
||||
h=f*g:<f=fe:<g=fe:>h=fe:asm/fe_mul(>h,<f,<g);:
|
||||
h=f^2^k:<f=fe:>h=fe:#k:asm/fe_sq(>h,<f); for (i = 1;i !lt; #k;++i) fe_sq(>h,>h);:
|
||||
|
||||
:
|
||||
|
||||
fe z1
|
||||
fe z2
|
||||
fe z8
|
||||
fe z9
|
||||
fe z11
|
||||
fe z22
|
||||
fe z_5_0
|
||||
fe z_10_5
|
||||
fe z_10_0
|
||||
fe z_20_10
|
||||
fe z_20_0
|
||||
fe z_40_20
|
||||
fe z_40_0
|
||||
fe z_50_10
|
||||
fe z_50_0
|
||||
fe z_100_50
|
||||
fe z_100_0
|
||||
fe z_200_100
|
||||
fe z_200_0
|
||||
fe z_250_50
|
||||
fe z_250_0
|
||||
fe z_255_5
|
||||
fe z_255_21
|
||||
|
||||
enter pow225521
|
||||
|
||||
z2 = z1^2^1
|
||||
z8 = z2^2^2
|
||||
z9 = z1*z8
|
||||
z11 = z2*z9
|
||||
z22 = z11^2^1
|
||||
z_5_0 = z9*z22
|
||||
z_10_5 = z_5_0^2^5
|
||||
z_10_0 = z_10_5*z_5_0
|
||||
z_20_10 = z_10_0^2^10
|
||||
z_20_0 = z_20_10*z_10_0
|
||||
z_40_20 = z_20_0^2^20
|
||||
z_40_0 = z_40_20*z_20_0
|
||||
z_50_10 = z_40_0^2^10
|
||||
z_50_0 = z_50_10*z_10_0
|
||||
z_100_50 = z_50_0^2^50
|
||||
z_100_0 = z_100_50*z_50_0
|
||||
z_200_100 = z_100_0^2^100
|
||||
z_200_0 = z_200_100*z_100_0
|
||||
z_250_50 = z_200_0^2^50
|
||||
z_250_0 = z_250_50*z_50_0
|
||||
z_255_5 = z_250_0^2^5
|
||||
z_255_21 = z_255_5*z11
|
||||
|
||||
return
|
4
src/ext/ed25519/ref10/q2h.sh
Executable file
4
src/ext/ed25519/ref10/q2h.sh
Executable file
@ -0,0 +1,4 @@
|
||||
#!/bin/sh
|
||||
sed 's/^#.*//' \
|
||||
| qhasm-generic \
|
||||
| sed 's_//\(.*\)$_/*\1 */_'
|
4
src/ext/ed25519/ref10/randombytes.h
Normal file
4
src/ext/ed25519/ref10/randombytes.h
Normal file
@ -0,0 +1,4 @@
|
||||
/* Added for Tor. */
|
||||
#include "crypto.h"
|
||||
#define randombytes(b, n) \
|
||||
(crypto_strongest_rand((b), (n)))
|
15
src/ext/ed25519/ref10/sc.h
Normal file
15
src/ext/ed25519/ref10/sc.h
Normal file
@ -0,0 +1,15 @@
|
||||
#ifndef SC_H
|
||||
#define SC_H
|
||||
|
||||
/*
|
||||
The set of scalars is \Z/l
|
||||
where l = 2^252 + 27742317777372353535851937790883648493.
|
||||
*/
|
||||
|
||||
#define sc_reduce crypto_sign_ed25519_ref10_sc_reduce
|
||||
#define sc_muladd crypto_sign_ed25519_ref10_sc_muladd
|
||||
|
||||
extern void sc_reduce(unsigned char *);
|
||||
extern void sc_muladd(unsigned char *,const unsigned char *,const unsigned char *,const unsigned char *);
|
||||
|
||||
#endif
|
368
src/ext/ed25519/ref10/sc_muladd.c
Normal file
368
src/ext/ed25519/ref10/sc_muladd.c
Normal file
@ -0,0 +1,368 @@
|
||||
#include "sc.h"
|
||||
#include "crypto_int64.h"
|
||||
#include "crypto_uint32.h"
|
||||
#include "crypto_uint64.h"
|
||||
|
||||
static crypto_uint64 load_3(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
return result;
|
||||
}
|
||||
|
||||
static crypto_uint64 load_4(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
result |= ((crypto_uint64) in[3]) << 24;
|
||||
return result;
|
||||
}
|
||||
|
||||
/*
|
||||
Input:
|
||||
a[0]+256*a[1]+...+256^31*a[31] = a
|
||||
b[0]+256*b[1]+...+256^31*b[31] = b
|
||||
c[0]+256*c[1]+...+256^31*c[31] = c
|
||||
|
||||
Output:
|
||||
s[0]+256*s[1]+...+256^31*s[31] = (ab+c) mod l
|
||||
where l = 2^252 + 27742317777372353535851937790883648493.
|
||||
*/
|
||||
|
||||
void sc_muladd(unsigned char *s,const unsigned char *a,const unsigned char *b,const unsigned char *c)
|
||||
{
|
||||
crypto_int64 a0 = 2097151 & load_3(a);
|
||||
crypto_int64 a1 = 2097151 & (load_4(a + 2) >> 5);
|
||||
crypto_int64 a2 = 2097151 & (load_3(a + 5) >> 2);
|
||||
crypto_int64 a3 = 2097151 & (load_4(a + 7) >> 7);
|
||||
crypto_int64 a4 = 2097151 & (load_4(a + 10) >> 4);
|
||||
crypto_int64 a5 = 2097151 & (load_3(a + 13) >> 1);
|
||||
crypto_int64 a6 = 2097151 & (load_4(a + 15) >> 6);
|
||||
crypto_int64 a7 = 2097151 & (load_3(a + 18) >> 3);
|
||||
crypto_int64 a8 = 2097151 & load_3(a + 21);
|
||||
crypto_int64 a9 = 2097151 & (load_4(a + 23) >> 5);
|
||||
crypto_int64 a10 = 2097151 & (load_3(a + 26) >> 2);
|
||||
crypto_int64 a11 = (load_4(a + 28) >> 7);
|
||||
crypto_int64 b0 = 2097151 & load_3(b);
|
||||
crypto_int64 b1 = 2097151 & (load_4(b + 2) >> 5);
|
||||
crypto_int64 b2 = 2097151 & (load_3(b + 5) >> 2);
|
||||
crypto_int64 b3 = 2097151 & (load_4(b + 7) >> 7);
|
||||
crypto_int64 b4 = 2097151 & (load_4(b + 10) >> 4);
|
||||
crypto_int64 b5 = 2097151 & (load_3(b + 13) >> 1);
|
||||
crypto_int64 b6 = 2097151 & (load_4(b + 15) >> 6);
|
||||
crypto_int64 b7 = 2097151 & (load_3(b + 18) >> 3);
|
||||
crypto_int64 b8 = 2097151 & load_3(b + 21);
|
||||
crypto_int64 b9 = 2097151 & (load_4(b + 23) >> 5);
|
||||
crypto_int64 b10 = 2097151 & (load_3(b + 26) >> 2);
|
||||
crypto_int64 b11 = (load_4(b + 28) >> 7);
|
||||
crypto_int64 c0 = 2097151 & load_3(c);
|
||||
crypto_int64 c1 = 2097151 & (load_4(c + 2) >> 5);
|
||||
crypto_int64 c2 = 2097151 & (load_3(c + 5) >> 2);
|
||||
crypto_int64 c3 = 2097151 & (load_4(c + 7) >> 7);
|
||||
crypto_int64 c4 = 2097151 & (load_4(c + 10) >> 4);
|
||||
crypto_int64 c5 = 2097151 & (load_3(c + 13) >> 1);
|
||||
crypto_int64 c6 = 2097151 & (load_4(c + 15) >> 6);
|
||||
crypto_int64 c7 = 2097151 & (load_3(c + 18) >> 3);
|
||||
crypto_int64 c8 = 2097151 & load_3(c + 21);
|
||||
crypto_int64 c9 = 2097151 & (load_4(c + 23) >> 5);
|
||||
crypto_int64 c10 = 2097151 & (load_3(c + 26) >> 2);
|
||||
crypto_int64 c11 = (load_4(c + 28) >> 7);
|
||||
crypto_int64 s0;
|
||||
crypto_int64 s1;
|
||||
crypto_int64 s2;
|
||||
crypto_int64 s3;
|
||||
crypto_int64 s4;
|
||||
crypto_int64 s5;
|
||||
crypto_int64 s6;
|
||||
crypto_int64 s7;
|
||||
crypto_int64 s8;
|
||||
crypto_int64 s9;
|
||||
crypto_int64 s10;
|
||||
crypto_int64 s11;
|
||||
crypto_int64 s12;
|
||||
crypto_int64 s13;
|
||||
crypto_int64 s14;
|
||||
crypto_int64 s15;
|
||||
crypto_int64 s16;
|
||||
crypto_int64 s17;
|
||||
crypto_int64 s18;
|
||||
crypto_int64 s19;
|
||||
crypto_int64 s20;
|
||||
crypto_int64 s21;
|
||||
crypto_int64 s22;
|
||||
crypto_int64 s23;
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
crypto_int64 carry10;
|
||||
crypto_int64 carry11;
|
||||
crypto_int64 carry12;
|
||||
crypto_int64 carry13;
|
||||
crypto_int64 carry14;
|
||||
crypto_int64 carry15;
|
||||
crypto_int64 carry16;
|
||||
crypto_int64 carry17;
|
||||
crypto_int64 carry18;
|
||||
crypto_int64 carry19;
|
||||
crypto_int64 carry20;
|
||||
crypto_int64 carry21;
|
||||
crypto_int64 carry22;
|
||||
|
||||
s0 = c0 + a0*b0;
|
||||
s1 = c1 + a0*b1 + a1*b0;
|
||||
s2 = c2 + a0*b2 + a1*b1 + a2*b0;
|
||||
s3 = c3 + a0*b3 + a1*b2 + a2*b1 + a3*b0;
|
||||
s4 = c4 + a0*b4 + a1*b3 + a2*b2 + a3*b1 + a4*b0;
|
||||
s5 = c5 + a0*b5 + a1*b4 + a2*b3 + a3*b2 + a4*b1 + a5*b0;
|
||||
s6 = c6 + a0*b6 + a1*b5 + a2*b4 + a3*b3 + a4*b2 + a5*b1 + a6*b0;
|
||||
s7 = c7 + a0*b7 + a1*b6 + a2*b5 + a3*b4 + a4*b3 + a5*b2 + a6*b1 + a7*b0;
|
||||
s8 = c8 + a0*b8 + a1*b7 + a2*b6 + a3*b5 + a4*b4 + a5*b3 + a6*b2 + a7*b1 + a8*b0;
|
||||
s9 = c9 + a0*b9 + a1*b8 + a2*b7 + a3*b6 + a4*b5 + a5*b4 + a6*b3 + a7*b2 + a8*b1 + a9*b0;
|
||||
s10 = c10 + a0*b10 + a1*b9 + a2*b8 + a3*b7 + a4*b6 + a5*b5 + a6*b4 + a7*b3 + a8*b2 + a9*b1 + a10*b0;
|
||||
s11 = c11 + a0*b11 + a1*b10 + a2*b9 + a3*b8 + a4*b7 + a5*b6 + a6*b5 + a7*b4 + a8*b3 + a9*b2 + a10*b1 + a11*b0;
|
||||
s12 = a1*b11 + a2*b10 + a3*b9 + a4*b8 + a5*b7 + a6*b6 + a7*b5 + a8*b4 + a9*b3 + a10*b2 + a11*b1;
|
||||
s13 = a2*b11 + a3*b10 + a4*b9 + a5*b8 + a6*b7 + a7*b6 + a8*b5 + a9*b4 + a10*b3 + a11*b2;
|
||||
s14 = a3*b11 + a4*b10 + a5*b9 + a6*b8 + a7*b7 + a8*b6 + a9*b5 + a10*b4 + a11*b3;
|
||||
s15 = a4*b11 + a5*b10 + a6*b9 + a7*b8 + a8*b7 + a9*b6 + a10*b5 + a11*b4;
|
||||
s16 = a5*b11 + a6*b10 + a7*b9 + a8*b8 + a9*b7 + a10*b6 + a11*b5;
|
||||
s17 = a6*b11 + a7*b10 + a8*b9 + a9*b8 + a10*b7 + a11*b6;
|
||||
s18 = a7*b11 + a8*b10 + a9*b9 + a10*b8 + a11*b7;
|
||||
s19 = a8*b11 + a9*b10 + a10*b9 + a11*b8;
|
||||
s20 = a9*b11 + a10*b10 + a11*b9;
|
||||
s21 = a10*b11 + a11*b10;
|
||||
s22 = a11*b11;
|
||||
s23 = 0;
|
||||
|
||||
carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21;
|
||||
carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21;
|
||||
carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21;
|
||||
carry18 = (s18 + (1<<20)) >> 21; s19 += carry18; s18 -= carry18 << 21;
|
||||
carry20 = (s20 + (1<<20)) >> 21; s21 += carry20; s20 -= carry20 << 21;
|
||||
carry22 = (s22 + (1<<20)) >> 21; s23 += carry22; s22 -= carry22 << 21;
|
||||
|
||||
carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21;
|
||||
carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21;
|
||||
carry17 = (s17 + (1<<20)) >> 21; s18 += carry17; s17 -= carry17 << 21;
|
||||
carry19 = (s19 + (1<<20)) >> 21; s20 += carry19; s19 -= carry19 << 21;
|
||||
carry21 = (s21 + (1<<20)) >> 21; s22 += carry21; s21 -= carry21 << 21;
|
||||
|
||||
s11 += s23 * 666643;
|
||||
s12 += s23 * 470296;
|
||||
s13 += s23 * 654183;
|
||||
s14 -= s23 * 997805;
|
||||
s15 += s23 * 136657;
|
||||
s16 -= s23 * 683901;
|
||||
s23 = 0;
|
||||
|
||||
s10 += s22 * 666643;
|
||||
s11 += s22 * 470296;
|
||||
s12 += s22 * 654183;
|
||||
s13 -= s22 * 997805;
|
||||
s14 += s22 * 136657;
|
||||
s15 -= s22 * 683901;
|
||||
s22 = 0;
|
||||
|
||||
s9 += s21 * 666643;
|
||||
s10 += s21 * 470296;
|
||||
s11 += s21 * 654183;
|
||||
s12 -= s21 * 997805;
|
||||
s13 += s21 * 136657;
|
||||
s14 -= s21 * 683901;
|
||||
s21 = 0;
|
||||
|
||||
s8 += s20 * 666643;
|
||||
s9 += s20 * 470296;
|
||||
s10 += s20 * 654183;
|
||||
s11 -= s20 * 997805;
|
||||
s12 += s20 * 136657;
|
||||
s13 -= s20 * 683901;
|
||||
s20 = 0;
|
||||
|
||||
s7 += s19 * 666643;
|
||||
s8 += s19 * 470296;
|
||||
s9 += s19 * 654183;
|
||||
s10 -= s19 * 997805;
|
||||
s11 += s19 * 136657;
|
||||
s12 -= s19 * 683901;
|
||||
s19 = 0;
|
||||
|
||||
s6 += s18 * 666643;
|
||||
s7 += s18 * 470296;
|
||||
s8 += s18 * 654183;
|
||||
s9 -= s18 * 997805;
|
||||
s10 += s18 * 136657;
|
||||
s11 -= s18 * 683901;
|
||||
s18 = 0;
|
||||
|
||||
carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21;
|
||||
carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21;
|
||||
carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21;
|
||||
|
||||
carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21;
|
||||
carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21;
|
||||
|
||||
s5 += s17 * 666643;
|
||||
s6 += s17 * 470296;
|
||||
s7 += s17 * 654183;
|
||||
s8 -= s17 * 997805;
|
||||
s9 += s17 * 136657;
|
||||
s10 -= s17 * 683901;
|
||||
s17 = 0;
|
||||
|
||||
s4 += s16 * 666643;
|
||||
s5 += s16 * 470296;
|
||||
s6 += s16 * 654183;
|
||||
s7 -= s16 * 997805;
|
||||
s8 += s16 * 136657;
|
||||
s9 -= s16 * 683901;
|
||||
s16 = 0;
|
||||
|
||||
s3 += s15 * 666643;
|
||||
s4 += s15 * 470296;
|
||||
s5 += s15 * 654183;
|
||||
s6 -= s15 * 997805;
|
||||
s7 += s15 * 136657;
|
||||
s8 -= s15 * 683901;
|
||||
s15 = 0;
|
||||
|
||||
s2 += s14 * 666643;
|
||||
s3 += s14 * 470296;
|
||||
s4 += s14 * 654183;
|
||||
s5 -= s14 * 997805;
|
||||
s6 += s14 * 136657;
|
||||
s7 -= s14 * 683901;
|
||||
s14 = 0;
|
||||
|
||||
s1 += s13 * 666643;
|
||||
s2 += s13 * 470296;
|
||||
s3 += s13 * 654183;
|
||||
s4 -= s13 * 997805;
|
||||
s5 += s13 * 136657;
|
||||
s6 -= s13 * 683901;
|
||||
s13 = 0;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
|
||||
carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
carry11 = s11 >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
|
||||
s[0] = s0 >> 0;
|
||||
s[1] = s0 >> 8;
|
||||
s[2] = (s0 >> 16) | (s1 << 5);
|
||||
s[3] = s1 >> 3;
|
||||
s[4] = s1 >> 11;
|
||||
s[5] = (s1 >> 19) | (s2 << 2);
|
||||
s[6] = s2 >> 6;
|
||||
s[7] = (s2 >> 14) | (s3 << 7);
|
||||
s[8] = s3 >> 1;
|
||||
s[9] = s3 >> 9;
|
||||
s[10] = (s3 >> 17) | (s4 << 4);
|
||||
s[11] = s4 >> 4;
|
||||
s[12] = s4 >> 12;
|
||||
s[13] = (s4 >> 20) | (s5 << 1);
|
||||
s[14] = s5 >> 7;
|
||||
s[15] = (s5 >> 15) | (s6 << 6);
|
||||
s[16] = s6 >> 2;
|
||||
s[17] = s6 >> 10;
|
||||
s[18] = (s6 >> 18) | (s7 << 3);
|
||||
s[19] = s7 >> 5;
|
||||
s[20] = s7 >> 13;
|
||||
s[21] = s8 >> 0;
|
||||
s[22] = s8 >> 8;
|
||||
s[23] = (s8 >> 16) | (s9 << 5);
|
||||
s[24] = s9 >> 3;
|
||||
s[25] = s9 >> 11;
|
||||
s[26] = (s9 >> 19) | (s10 << 2);
|
||||
s[27] = s10 >> 6;
|
||||
s[28] = (s10 >> 14) | (s11 << 7);
|
||||
s[29] = s11 >> 1;
|
||||
s[30] = s11 >> 9;
|
||||
s[31] = s11 >> 17;
|
||||
}
|
275
src/ext/ed25519/ref10/sc_reduce.c
Normal file
275
src/ext/ed25519/ref10/sc_reduce.c
Normal file
@ -0,0 +1,275 @@
|
||||
#include "sc.h"
|
||||
#include "crypto_int64.h"
|
||||
#include "crypto_uint32.h"
|
||||
#include "crypto_uint64.h"
|
||||
|
||||
static crypto_uint64 load_3(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
return result;
|
||||
}
|
||||
|
||||
static crypto_uint64 load_4(const unsigned char *in)
|
||||
{
|
||||
crypto_uint64 result;
|
||||
result = (crypto_uint64) in[0];
|
||||
result |= ((crypto_uint64) in[1]) << 8;
|
||||
result |= ((crypto_uint64) in[2]) << 16;
|
||||
result |= ((crypto_uint64) in[3]) << 24;
|
||||
return result;
|
||||
}
|
||||
|
||||
/*
|
||||
Input:
|
||||
s[0]+256*s[1]+...+256^63*s[63] = s
|
||||
|
||||
Output:
|
||||
s[0]+256*s[1]+...+256^31*s[31] = s mod l
|
||||
where l = 2^252 + 27742317777372353535851937790883648493.
|
||||
Overwrites s in place.
|
||||
*/
|
||||
|
||||
void sc_reduce(unsigned char *s)
|
||||
{
|
||||
crypto_int64 s0 = 2097151 & load_3(s);
|
||||
crypto_int64 s1 = 2097151 & (load_4(s + 2) >> 5);
|
||||
crypto_int64 s2 = 2097151 & (load_3(s + 5) >> 2);
|
||||
crypto_int64 s3 = 2097151 & (load_4(s + 7) >> 7);
|
||||
crypto_int64 s4 = 2097151 & (load_4(s + 10) >> 4);
|
||||
crypto_int64 s5 = 2097151 & (load_3(s + 13) >> 1);
|
||||
crypto_int64 s6 = 2097151 & (load_4(s + 15) >> 6);
|
||||
crypto_int64 s7 = 2097151 & (load_3(s + 18) >> 3);
|
||||
crypto_int64 s8 = 2097151 & load_3(s + 21);
|
||||
crypto_int64 s9 = 2097151 & (load_4(s + 23) >> 5);
|
||||
crypto_int64 s10 = 2097151 & (load_3(s + 26) >> 2);
|
||||
crypto_int64 s11 = 2097151 & (load_4(s + 28) >> 7);
|
||||
crypto_int64 s12 = 2097151 & (load_4(s + 31) >> 4);
|
||||
crypto_int64 s13 = 2097151 & (load_3(s + 34) >> 1);
|
||||
crypto_int64 s14 = 2097151 & (load_4(s + 36) >> 6);
|
||||
crypto_int64 s15 = 2097151 & (load_3(s + 39) >> 3);
|
||||
crypto_int64 s16 = 2097151 & load_3(s + 42);
|
||||
crypto_int64 s17 = 2097151 & (load_4(s + 44) >> 5);
|
||||
crypto_int64 s18 = 2097151 & (load_3(s + 47) >> 2);
|
||||
crypto_int64 s19 = 2097151 & (load_4(s + 49) >> 7);
|
||||
crypto_int64 s20 = 2097151 & (load_4(s + 52) >> 4);
|
||||
crypto_int64 s21 = 2097151 & (load_3(s + 55) >> 1);
|
||||
crypto_int64 s22 = 2097151 & (load_4(s + 57) >> 6);
|
||||
crypto_int64 s23 = (load_4(s + 60) >> 3);
|
||||
crypto_int64 carry0;
|
||||
crypto_int64 carry1;
|
||||
crypto_int64 carry2;
|
||||
crypto_int64 carry3;
|
||||
crypto_int64 carry4;
|
||||
crypto_int64 carry5;
|
||||
crypto_int64 carry6;
|
||||
crypto_int64 carry7;
|
||||
crypto_int64 carry8;
|
||||
crypto_int64 carry9;
|
||||
crypto_int64 carry10;
|
||||
crypto_int64 carry11;
|
||||
crypto_int64 carry12;
|
||||
crypto_int64 carry13;
|
||||
crypto_int64 carry14;
|
||||
crypto_int64 carry15;
|
||||
crypto_int64 carry16;
|
||||
|
||||
s11 += s23 * 666643;
|
||||
s12 += s23 * 470296;
|
||||
s13 += s23 * 654183;
|
||||
s14 -= s23 * 997805;
|
||||
s15 += s23 * 136657;
|
||||
s16 -= s23 * 683901;
|
||||
s23 = 0;
|
||||
|
||||
s10 += s22 * 666643;
|
||||
s11 += s22 * 470296;
|
||||
s12 += s22 * 654183;
|
||||
s13 -= s22 * 997805;
|
||||
s14 += s22 * 136657;
|
||||
s15 -= s22 * 683901;
|
||||
s22 = 0;
|
||||
|
||||
s9 += s21 * 666643;
|
||||
s10 += s21 * 470296;
|
||||
s11 += s21 * 654183;
|
||||
s12 -= s21 * 997805;
|
||||
s13 += s21 * 136657;
|
||||
s14 -= s21 * 683901;
|
||||
s21 = 0;
|
||||
|
||||
s8 += s20 * 666643;
|
||||
s9 += s20 * 470296;
|
||||
s10 += s20 * 654183;
|
||||
s11 -= s20 * 997805;
|
||||
s12 += s20 * 136657;
|
||||
s13 -= s20 * 683901;
|
||||
s20 = 0;
|
||||
|
||||
s7 += s19 * 666643;
|
||||
s8 += s19 * 470296;
|
||||
s9 += s19 * 654183;
|
||||
s10 -= s19 * 997805;
|
||||
s11 += s19 * 136657;
|
||||
s12 -= s19 * 683901;
|
||||
s19 = 0;
|
||||
|
||||
s6 += s18 * 666643;
|
||||
s7 += s18 * 470296;
|
||||
s8 += s18 * 654183;
|
||||
s9 -= s18 * 997805;
|
||||
s10 += s18 * 136657;
|
||||
s11 -= s18 * 683901;
|
||||
s18 = 0;
|
||||
|
||||
carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
carry12 = (s12 + (1<<20)) >> 21; s13 += carry12; s12 -= carry12 << 21;
|
||||
carry14 = (s14 + (1<<20)) >> 21; s15 += carry14; s14 -= carry14 << 21;
|
||||
carry16 = (s16 + (1<<20)) >> 21; s17 += carry16; s16 -= carry16 << 21;
|
||||
|
||||
carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
carry13 = (s13 + (1<<20)) >> 21; s14 += carry13; s13 -= carry13 << 21;
|
||||
carry15 = (s15 + (1<<20)) >> 21; s16 += carry15; s15 -= carry15 << 21;
|
||||
|
||||
s5 += s17 * 666643;
|
||||
s6 += s17 * 470296;
|
||||
s7 += s17 * 654183;
|
||||
s8 -= s17 * 997805;
|
||||
s9 += s17 * 136657;
|
||||
s10 -= s17 * 683901;
|
||||
s17 = 0;
|
||||
|
||||
s4 += s16 * 666643;
|
||||
s5 += s16 * 470296;
|
||||
s6 += s16 * 654183;
|
||||
s7 -= s16 * 997805;
|
||||
s8 += s16 * 136657;
|
||||
s9 -= s16 * 683901;
|
||||
s16 = 0;
|
||||
|
||||
s3 += s15 * 666643;
|
||||
s4 += s15 * 470296;
|
||||
s5 += s15 * 654183;
|
||||
s6 -= s15 * 997805;
|
||||
s7 += s15 * 136657;
|
||||
s8 -= s15 * 683901;
|
||||
s15 = 0;
|
||||
|
||||
s2 += s14 * 666643;
|
||||
s3 += s14 * 470296;
|
||||
s4 += s14 * 654183;
|
||||
s5 -= s14 * 997805;
|
||||
s6 += s14 * 136657;
|
||||
s7 -= s14 * 683901;
|
||||
s14 = 0;
|
||||
|
||||
s1 += s13 * 666643;
|
||||
s2 += s13 * 470296;
|
||||
s3 += s13 * 654183;
|
||||
s4 -= s13 * 997805;
|
||||
s5 += s13 * 136657;
|
||||
s6 -= s13 * 683901;
|
||||
s13 = 0;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = (s0 + (1<<20)) >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry2 = (s2 + (1<<20)) >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry4 = (s4 + (1<<20)) >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry6 = (s6 + (1<<20)) >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry8 = (s8 + (1<<20)) >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry10 = (s10 + (1<<20)) >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
|
||||
carry1 = (s1 + (1<<20)) >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry3 = (s3 + (1<<20)) >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry5 = (s5 + (1<<20)) >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry7 = (s7 + (1<<20)) >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry9 = (s9 + (1<<20)) >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry11 = (s11 + (1<<20)) >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
carry11 = s11 >> 21; s12 += carry11; s11 -= carry11 << 21;
|
||||
|
||||
s0 += s12 * 666643;
|
||||
s1 += s12 * 470296;
|
||||
s2 += s12 * 654183;
|
||||
s3 -= s12 * 997805;
|
||||
s4 += s12 * 136657;
|
||||
s5 -= s12 * 683901;
|
||||
s12 = 0;
|
||||
|
||||
carry0 = s0 >> 21; s1 += carry0; s0 -= carry0 << 21;
|
||||
carry1 = s1 >> 21; s2 += carry1; s1 -= carry1 << 21;
|
||||
carry2 = s2 >> 21; s3 += carry2; s2 -= carry2 << 21;
|
||||
carry3 = s3 >> 21; s4 += carry3; s3 -= carry3 << 21;
|
||||
carry4 = s4 >> 21; s5 += carry4; s4 -= carry4 << 21;
|
||||
carry5 = s5 >> 21; s6 += carry5; s5 -= carry5 << 21;
|
||||
carry6 = s6 >> 21; s7 += carry6; s6 -= carry6 << 21;
|
||||
carry7 = s7 >> 21; s8 += carry7; s7 -= carry7 << 21;
|
||||
carry8 = s8 >> 21; s9 += carry8; s8 -= carry8 << 21;
|
||||
carry9 = s9 >> 21; s10 += carry9; s9 -= carry9 << 21;
|
||||
carry10 = s10 >> 21; s11 += carry10; s10 -= carry10 << 21;
|
||||
|
||||
s[0] = s0 >> 0;
|
||||
s[1] = s0 >> 8;
|
||||
s[2] = (s0 >> 16) | (s1 << 5);
|
||||
s[3] = s1 >> 3;
|
||||
s[4] = s1 >> 11;
|
||||
s[5] = (s1 >> 19) | (s2 << 2);
|
||||
s[6] = s2 >> 6;
|
||||
s[7] = (s2 >> 14) | (s3 << 7);
|
||||
s[8] = s3 >> 1;
|
||||
s[9] = s3 >> 9;
|
||||
s[10] = (s3 >> 17) | (s4 << 4);
|
||||
s[11] = s4 >> 4;
|
||||
s[12] = s4 >> 12;
|
||||
s[13] = (s4 >> 20) | (s5 << 1);
|
||||
s[14] = s5 >> 7;
|
||||
s[15] = (s5 >> 15) | (s6 << 6);
|
||||
s[16] = s6 >> 2;
|
||||
s[17] = s6 >> 10;
|
||||
s[18] = (s6 >> 18) | (s7 << 3);
|
||||
s[19] = s7 >> 5;
|
||||
s[20] = s7 >> 13;
|
||||
s[21] = s8 >> 0;
|
||||
s[22] = s8 >> 8;
|
||||
s[23] = (s8 >> 16) | (s9 << 5);
|
||||
s[24] = s9 >> 3;
|
||||
s[25] = s9 >> 11;
|
||||
s[26] = (s9 >> 19) | (s10 << 2);
|
||||
s[27] = s10 >> 6;
|
||||
s[28] = (s10 >> 14) | (s11 << 7);
|
||||
s[29] = s11 >> 1;
|
||||
s[30] = s11 >> 9;
|
||||
s[31] = s11 >> 17;
|
||||
}
|
29
src/ext/ed25519/ref10/sign.c
Normal file
29
src/ext/ed25519/ref10/sign.c
Normal file
@ -0,0 +1,29 @@
|
||||
/* (Modified by Tor to generate detached signatures.) */
|
||||
#include <string.h>
|
||||
#include "crypto_sign.h"
|
||||
#include "crypto_hash_sha512.h"
|
||||
#include "ge.h"
|
||||
#include "sc.h"
|
||||
|
||||
int crypto_sign(
|
||||
unsigned char *sig,
|
||||
const unsigned char *m,uint64_t mlen,
|
||||
const unsigned char *sk,const unsigned char *pk
|
||||
)
|
||||
{
|
||||
unsigned char nonce[64];
|
||||
unsigned char hram[64];
|
||||
ge_p3 R;
|
||||
|
||||
crypto_hash_sha512_2(nonce, sk+32, 32, m, mlen);
|
||||
|
||||
sc_reduce(nonce);
|
||||
ge_scalarmult_base(&R,nonce);
|
||||
ge_p3_tobytes(sig,&R);
|
||||
|
||||
crypto_hash_sha512_3(hram, sig, 32, pk, 32, m, mlen);
|
||||
sc_reduce(hram);
|
||||
sc_muladd(sig + 32,hram,sk,nonce);
|
||||
|
||||
return 0;
|
||||
}
|
1
src/ext/ed25519/ref10/sqrtm1.h
Normal file
1
src/ext/ed25519/ref10/sqrtm1.h
Normal file
@ -0,0 +1 @@
|
||||
-32595792,-7943725,9377950,3500415,12389472,-272473,-25146209,-2005654,326686,11406482
|
28
src/ext/ed25519/ref10/sqrtm1.py
Normal file
28
src/ext/ed25519/ref10/sqrtm1.py
Normal file
@ -0,0 +1,28 @@
|
||||
q = 2**255 - 19
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
def radix255(x):
|
||||
x = x % q
|
||||
if x + x > q: x -= q
|
||||
x = [x,0,0,0,0,0,0,0,0,0]
|
||||
bits = [26,25,26,25,26,25,26,25,26,25]
|
||||
for i in range(9):
|
||||
carry = (x[i] + 2**(bits[i]-1)) / 2**bits[i]
|
||||
x[i] -= carry * 2**bits[i]
|
||||
x[i + 1] += carry
|
||||
result = ""
|
||||
for i in range(9):
|
||||
result = result+str(x[i])+","
|
||||
result = result+str(x[9])
|
||||
return result
|
||||
|
||||
I = expmod(2,(q-1)/4,q)
|
||||
print radix255(I)
|
@ -15,4 +15,71 @@ EXTHEADERS = \
|
||||
|
||||
noinst_HEADERS+= $(EXTHEADERS)
|
||||
|
||||
src_ext_ed25519_ref10_libed25519_ref10_a_CFLAGS=
|
||||
|
||||
src_ext_ed25519_ref10_libed25519_ref10_a_SOURCES= \
|
||||
src/ext/ed25519/ref10/fe_0.c \
|
||||
src/ext/ed25519/ref10/fe_1.c \
|
||||
src/ext/ed25519/ref10/fe_add.c \
|
||||
src/ext/ed25519/ref10/fe_cmov.c \
|
||||
src/ext/ed25519/ref10/fe_copy.c \
|
||||
src/ext/ed25519/ref10/fe_frombytes.c \
|
||||
src/ext/ed25519/ref10/fe_invert.c \
|
||||
src/ext/ed25519/ref10/fe_isnegative.c \
|
||||
src/ext/ed25519/ref10/fe_isnonzero.c \
|
||||
src/ext/ed25519/ref10/fe_mul.c \
|
||||
src/ext/ed25519/ref10/fe_neg.c \
|
||||
src/ext/ed25519/ref10/fe_pow22523.c \
|
||||
src/ext/ed25519/ref10/fe_sq.c \
|
||||
src/ext/ed25519/ref10/fe_sq2.c \
|
||||
src/ext/ed25519/ref10/fe_sub.c \
|
||||
src/ext/ed25519/ref10/fe_tobytes.c \
|
||||
src/ext/ed25519/ref10/ge_add.c \
|
||||
src/ext/ed25519/ref10/ge_double_scalarmult.c \
|
||||
src/ext/ed25519/ref10/ge_frombytes.c \
|
||||
src/ext/ed25519/ref10/ge_madd.c \
|
||||
src/ext/ed25519/ref10/ge_msub.c \
|
||||
src/ext/ed25519/ref10/ge_p1p1_to_p2.c \
|
||||
src/ext/ed25519/ref10/ge_p1p1_to_p3.c \
|
||||
src/ext/ed25519/ref10/ge_p2_0.c \
|
||||
src/ext/ed25519/ref10/ge_p2_dbl.c \
|
||||
src/ext/ed25519/ref10/ge_p3_0.c \
|
||||
src/ext/ed25519/ref10/ge_p3_dbl.c \
|
||||
src/ext/ed25519/ref10/ge_p3_to_cached.c \
|
||||
src/ext/ed25519/ref10/ge_p3_to_p2.c \
|
||||
src/ext/ed25519/ref10/ge_p3_tobytes.c \
|
||||
src/ext/ed25519/ref10/ge_precomp_0.c \
|
||||
src/ext/ed25519/ref10/ge_scalarmult_base.c \
|
||||
src/ext/ed25519/ref10/ge_sub.c \
|
||||
src/ext/ed25519/ref10/ge_tobytes.c \
|
||||
src/ext/ed25519/ref10/keypair.c \
|
||||
src/ext/ed25519/ref10/open.c \
|
||||
src/ext/ed25519/ref10/sc_muladd.c \
|
||||
src/ext/ed25519/ref10/sc_reduce.c \
|
||||
src/ext/ed25519/ref10/sign.c \
|
||||
src/ext/ed25519/ref10/keyconv.c \
|
||||
src/ext/ed25519/ref10/blinding.c
|
||||
|
||||
ED25519_REF10_HDRS = \
|
||||
src/ext/ed25519/ref10/api.h \
|
||||
src/ext/ed25519/ref10/base.h \
|
||||
src/ext/ed25519/ref10/base2.h \
|
||||
src/ext/ed25519/ref10/d.h \
|
||||
src/ext/ed25519/ref10/d2.h \
|
||||
src/ext/ed25519/ref10/fe.h \
|
||||
src/ext/ed25519/ref10/ge.h \
|
||||
src/ext/ed25519/ref10/ge_add.h \
|
||||
src/ext/ed25519/ref10/ge_madd.h \
|
||||
src/ext/ed25519/ref10/ge_msub.h \
|
||||
src/ext/ed25519/ref10/ge_p2_dbl.h \
|
||||
src/ext/ed25519/ref10/ge_sub.h \
|
||||
src/ext/ed25519/ref10/pow22523.h \
|
||||
src/ext/ed25519/ref10/pow225521.h \
|
||||
src/ext/ed25519/ref10/sc.h \
|
||||
src/ext/ed25519/ref10/sqrtm1.h
|
||||
|
||||
noinst_HEADERS += $(ED25519_REF10_HDRS)
|
||||
|
||||
LIBED25519_REF10=src/ext/ed25519/ref10/libed25519_ref10.a
|
||||
noinst_LIBRARIES += $(LIBED25519_REF10)
|
||||
|
||||
|
@ -30,6 +30,7 @@ const char tor_git_revision[] = "";
|
||||
#include "crypto_curve25519.h"
|
||||
#include "onion_ntor.h"
|
||||
#endif
|
||||
#include "crypto_ed25519.h"
|
||||
|
||||
#if defined(HAVE_CLOCK_GETTIME) && defined(CLOCK_PROCESS_CPUTIME_ID)
|
||||
static uint64_t nanostart;
|
||||
@ -79,6 +80,9 @@ perftime(void)
|
||||
#define NANOCOUNT(start,end,iters) \
|
||||
( ((double)((end)-(start))) / (iters) )
|
||||
|
||||
#define MICROCOUNT(start,end,iters) \
|
||||
( NANOCOUNT((start), (end), (iters)) / 1000.0 )
|
||||
|
||||
/** Run AES performance benchmarks. */
|
||||
static void
|
||||
bench_aes(void)
|
||||
@ -234,6 +238,63 @@ bench_onion_ntor(void)
|
||||
}
|
||||
#endif
|
||||
|
||||
static void
|
||||
bench_ed25519(void)
|
||||
{
|
||||
uint64_t start, end;
|
||||
const int iters = 1<<12;
|
||||
int i;
|
||||
const uint8_t msg[] = "but leaving, could not tell what they had heard";
|
||||
ed25519_signature_t sig;
|
||||
ed25519_keypair_t kp;
|
||||
curve25519_keypair_t curve_kp;
|
||||
ed25519_public_key_t pubkey_tmp;
|
||||
|
||||
ed25519_secret_key_generate(&kp.seckey, 0);
|
||||
start = perftime();
|
||||
for (i = 0; i < iters; ++i) {
|
||||
ed25519_public_key_generate(&kp.pubkey, &kp.seckey);
|
||||
}
|
||||
end = perftime();
|
||||
printf("Generate public key: %.2f usec\n",
|
||||
MICROCOUNT(start, end, iters));
|
||||
|
||||
start = perftime();
|
||||
for (i = 0; i < iters; ++i) {
|
||||
ed25519_sign(&sig, msg, sizeof(msg), &kp);
|
||||
}
|
||||
end = perftime();
|
||||
printf("Sign a short message: %.2f usec\n",
|
||||
MICROCOUNT(start, end, iters));
|
||||
|
||||
start = perftime();
|
||||
for (i = 0; i < iters; ++i) {
|
||||
ed25519_checksig(&sig, msg, sizeof(msg), &kp.pubkey);
|
||||
}
|
||||
end = perftime();
|
||||
printf("Verify signature: %.2f usec\n",
|
||||
MICROCOUNT(start, end, iters));
|
||||
|
||||
curve25519_keypair_generate(&curve_kp, 0);
|
||||
start = perftime();
|
||||
for (i = 0; i < iters; ++i) {
|
||||
ed25519_public_key_from_curve25519_public_key(&pubkey_tmp,
|
||||
&curve_kp.pubkey, 1);
|
||||
}
|
||||
end = perftime();
|
||||
printf("Convert public point from curve25519: %.2f usec\n",
|
||||
MICROCOUNT(start, end, iters));
|
||||
|
||||
curve25519_keypair_generate(&curve_kp, 0);
|
||||
start = perftime();
|
||||
for (i = 0; i < iters; ++i) {
|
||||
ed25519_public_blind(&pubkey_tmp, &kp.pubkey, msg);
|
||||
}
|
||||
end = perftime();
|
||||
printf("Blind a public key: %.2f usec\n",
|
||||
MICROCOUNT(start, end, iters));
|
||||
}
|
||||
|
||||
static void
|
||||
bench_cell_aes(void)
|
||||
{
|
||||
@ -515,6 +576,7 @@ static struct benchmark_t benchmarks[] = {
|
||||
#ifdef CURVE25519_ENABLED
|
||||
ENT(onion_ntor),
|
||||
#endif
|
||||
ENT(ed25519),
|
||||
ENT(cell_aes),
|
||||
ENT(cell_ops),
|
||||
ENT(dh),
|
||||
|
234
src/test/ed25519_exts_ref.py
Normal file
234
src/test/ed25519_exts_ref.py
Normal file
@ -0,0 +1,234 @@
|
||||
#!/usr/bin/python
|
||||
# Copyright 2014, The Tor Project, Inc
|
||||
# See LICENSE for licensing information
|
||||
|
||||
"""
|
||||
Reference implementations for the ed25519 tweaks that Tor uses.
|
||||
|
||||
Includes self-tester and test vector generator.
|
||||
"""
|
||||
|
||||
import slow_ed25519
|
||||
from slow_ed25519 import *
|
||||
|
||||
import os
|
||||
import random
|
||||
import slownacl_curve25519
|
||||
import unittest
|
||||
import binascii
|
||||
import textwrap
|
||||
|
||||
#define a synonym that doesn't look like 1
|
||||
ell = l
|
||||
|
||||
# This replaces expmod above and makes it go a lot faster.
|
||||
slow_ed25519.expmod = pow
|
||||
|
||||
def curve25519ToEd25519(c, sign):
|
||||
u = decodeint(c)
|
||||
y = ((u - 1) * inv(u + 1)) % q
|
||||
x = xrecover(y)
|
||||
if x & 1 != sign: x = q-x
|
||||
return encodepoint([x,y])
|
||||
|
||||
def blindESK(esk, param):
|
||||
h = H("Derive temporary signing key" + param)
|
||||
mult = 2**(b-2) + sum(2**i * bit(h,i) for i in range(3,b-2))
|
||||
s = decodeint(esk[:32])
|
||||
s_prime = (s * mult) % ell
|
||||
k = esk[32:]
|
||||
assert(len(k) == 32)
|
||||
k_prime = H("Derive temporary signing key hash input" + k)[:32]
|
||||
return encodeint(s_prime) + k_prime
|
||||
|
||||
def blindPK(pk, param):
|
||||
h = H("Derive temporary signing key" + param)
|
||||
mult = 2**(b-2) + sum(2**i * bit(h,i) for i in range(3,b-2))
|
||||
P = decodepoint(pk)
|
||||
return encodepoint(scalarmult(P, mult))
|
||||
|
||||
def expandSK(sk):
|
||||
h = H(sk)
|
||||
a = 2**(b-2) + sum(2**i * bit(h,i) for i in range(3,b-2))
|
||||
k = ''.join([h[i] for i in range(b/8,b/4)])
|
||||
assert len(k) == 32
|
||||
return encodeint(a)+k
|
||||
|
||||
def publickeyFromESK(h):
|
||||
a = decodeint(h[:32])
|
||||
A = scalarmult(B,a)
|
||||
return encodepoint(A)
|
||||
|
||||
def signatureWithESK(m,h,pk):
|
||||
a = decodeint(h[:32])
|
||||
r = Hint(''.join([h[i] for i in range(b/8,b/4)]) + m)
|
||||
R = scalarmult(B,r)
|
||||
S = (r + Hint(encodepoint(R) + pk + m) * a) % l
|
||||
return encodepoint(R) + encodeint(S)
|
||||
|
||||
def newSK():
|
||||
return os.urandom(32)
|
||||
|
||||
# ------------------------------------------------------------
|
||||
|
||||
MSG = "This is extremely silly. But it is also incredibly serious business!"
|
||||
|
||||
class SelfTest(unittest.TestCase):
|
||||
|
||||
def _testSignatures(self, esk, pk):
|
||||
sig = signatureWithESK(MSG, esk, pk)
|
||||
checkvalid(sig, MSG, pk)
|
||||
bad = False
|
||||
try:
|
||||
checkvalid(sig, MSG*2, pk)
|
||||
bad = True
|
||||
except Exception:
|
||||
pass
|
||||
|
||||
self.failIf(bad)
|
||||
|
||||
def testExpand(self):
|
||||
sk = newSK()
|
||||
pk = publickey(sk)
|
||||
esk = expandSK(sk)
|
||||
sig1 = signature(MSG, sk, pk)
|
||||
sig2 = signatureWithESK(MSG, esk, pk)
|
||||
self.assertEquals(sig1, sig2)
|
||||
|
||||
def testSignatures(self):
|
||||
sk = newSK()
|
||||
esk = expandSK(sk)
|
||||
pk = publickeyFromESK(esk)
|
||||
pk2 = publickey(sk)
|
||||
self.assertEquals(pk, pk2)
|
||||
|
||||
self._testSignatures(esk, pk)
|
||||
|
||||
def testDerivation(self):
|
||||
priv = slownacl_curve25519.Private()
|
||||
pub = priv.get_public()
|
||||
|
||||
ed_pub0 = publickeyFromESK(priv.private)
|
||||
sign = (ord(ed_pub0[31]) & 255) >> 7
|
||||
ed_pub1 = curve25519ToEd25519(pub.public, sign)
|
||||
|
||||
self.assertEquals(ed_pub0, ed_pub1)
|
||||
|
||||
def testBlinding(self):
|
||||
sk = newSK()
|
||||
esk = expandSK(sk)
|
||||
pk = publickeyFromESK(esk)
|
||||
param = os.urandom(32)
|
||||
besk = blindESK(esk, param)
|
||||
bpk = blindPK(pk, param)
|
||||
bpk2 = publickeyFromESK(besk)
|
||||
self.assertEquals(bpk, bpk2)
|
||||
|
||||
self._testSignatures(besk, bpk)
|
||||
|
||||
# ------------------------------------------------------------
|
||||
|
||||
# From pprint.pprint([ binascii.b2a_hex(os.urandom(32)) for _ in xrange(8) ])
|
||||
RAND_INPUTS = [
|
||||
'26c76712d89d906e6672dafa614c42e5cb1caac8c6568e4d2493087db51f0d36',
|
||||
'fba7a5366b5cb98c2667a18783f5cf8f4f8d1a2ce939ad22a6e685edde85128d',
|
||||
'67e3aa7a14fac8445d15e45e38a523481a69ae35513c9e4143eb1c2196729a0e',
|
||||
'd51385942033a76dc17f089a59e6a5a7fe80d9c526ae8ddd8c3a506b99d3d0a6',
|
||||
'5c8eac469bb3f1b85bc7cd893f52dc42a9ab66f1b02b5ce6a68e9b175d3bb433',
|
||||
'eda433d483059b6d1ff8b7cfbd0fe406bfb23722c8f3c8252629284573b61b86',
|
||||
'4377c40431c30883c5fbd9bc92ae48d1ed8a47b81d13806beac5351739b5533d',
|
||||
'c6bbcce615839756aed2cc78b1de13884dd3618f48367a17597a16c1cd7a290b']
|
||||
|
||||
# From pprint.pprint([ binascii.b2a_hex(os.urandom(32)) for _ in xrange(8) ])
|
||||
BLINDING_PARAMS = [
|
||||
'54a513898b471d1d448a2f3c55c1de2c0ef718c447b04497eeb999ed32027823',
|
||||
'831e9b5325b5d31b7ae6197e9c7a7baf2ec361e08248bce055908971047a2347',
|
||||
'ac78a1d46faf3bfbbdc5af5f053dc6dc9023ed78236bec1760dadfd0b2603760',
|
||||
'f9c84dc0ac31571507993df94da1b3d28684a12ad14e67d0a068aba5c53019fc',
|
||||
'b1fe79d1dec9bc108df69f6612c72812755751f21ecc5af99663b30be8b9081f',
|
||||
'81f1512b63ab5fb5c1711a4ec83d379c420574aedffa8c3368e1c3989a3a0084',
|
||||
'97f45142597c473a4b0e9a12d64561133ad9e1155fe5a9807fe6af8a93557818',
|
||||
'3f44f6a5a92cde816635dfc12ade70539871078d2ff097278be2a555c9859cd0']
|
||||
|
||||
PREFIX = "ED25519_"
|
||||
|
||||
def writeArray(name, array):
|
||||
print "static const char *{prefix}{name}[] = {{".format(
|
||||
prefix=PREFIX,name=name)
|
||||
for a in array:
|
||||
h = binascii.b2a_hex(a)
|
||||
if len(h) > 70:
|
||||
h1 = h[:70]
|
||||
h2 = h[70:]
|
||||
print ' "{0}"\n "{1}",'.format(h1,h2)
|
||||
else:
|
||||
print ' "{0}",'.format(h)
|
||||
print "};\n"
|
||||
|
||||
def comment(text, initial="/**"):
|
||||
print initial
|
||||
print textwrap.fill(text,initial_indent=" * ",subsequent_indent=" * ")
|
||||
print " */"
|
||||
|
||||
def makeTestVectors():
|
||||
comment("""Test vectors for our ed25519 implementation and related
|
||||
functions. These were automatically generated by the
|
||||
ed25519_exts_ref.py script.""", initial="/*")
|
||||
|
||||
|
||||
comment("""Secret key seeds used as inputs for the ed25519 test vectors.
|
||||
Randomly generated. """)
|
||||
secretKeys = [ binascii.a2b_hex(r) for r in RAND_INPUTS ]
|
||||
writeArray("SECRET_KEYS", secretKeys)
|
||||
|
||||
comment("""Secret ed25519 keys after expansion from seeds. This is how Tor
|
||||
represents them internally.""")
|
||||
expandedSecretKeys = [ expandSK(sk) for sk in secretKeys ]
|
||||
writeArray("EXPANDED_SECRET_KEYS", expandedSecretKeys)
|
||||
|
||||
comment("""Public keys derived from the above secret keys""")
|
||||
publicKeys = [ publickey(sk) for sk in secretKeys ]
|
||||
writeArray("PUBLIC_KEYS", publicKeys)
|
||||
|
||||
comment("""The curve25519 public keys from which the ed25519 keys can be
|
||||
derived. Used to test our 'derive ed25519 from curve25519'
|
||||
code.""")
|
||||
writeArray("CURVE25519_PUBLIC_KEYS",
|
||||
(slownacl_curve25519.smult_curve25519_base(sk[:32])
|
||||
for sk in expandedSecretKeys))
|
||||
|
||||
comment("""Parameters used for key blinding tests. Randomly generated.""")
|
||||
blindingParams = [ binascii.a2b_hex(r) for r in BLINDING_PARAMS ]
|
||||
writeArray("BLINDING_PARAMS", blindingParams)
|
||||
|
||||
comment("""Blinded secret keys for testing key blinding. The nth blinded
|
||||
key corresponds to the nth secret key blidned with the nth
|
||||
blinding parameter.""")
|
||||
writeArray("BLINDED_SECRET_KEYS",
|
||||
(blindESK(expandSK(sk), bp)
|
||||
for sk,bp in zip(secretKeys,blindingParams)))
|
||||
|
||||
comment("""Blinded public keys for testing key blinding. The nth blinded
|
||||
key corresponds to the nth public key blidned with the nth
|
||||
blinding parameter.""")
|
||||
writeArray("BLINDED_PUBLIC_KEYS",
|
||||
(blindPK(pk, bp) for pk,bp in zip(publicKeys,blindingParams)))
|
||||
|
||||
comment("""Signatures of the public keys, made with their corresponding
|
||||
secret keys.""")
|
||||
writeArray("SELF_SIGNATURES",
|
||||
(signature(pk, sk, pk) for pk,sk in zip(publicKeys,secretKeys)))
|
||||
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
import sys
|
||||
if len(sys.argv) == 1 or sys.argv[1] not in ("SelfTest", "MakeVectors"):
|
||||
print "You should specify one of 'SelfTest' or 'MakeVectors'"
|
||||
sys.exit(1)
|
||||
if sys.argv[1] == 'SelfTest':
|
||||
unittest.main()
|
||||
else:
|
||||
makeTestVectors()
|
||||
|
||||
|
150
src/test/ed25519_vectors.inc
Normal file
150
src/test/ed25519_vectors.inc
Normal file
@ -0,0 +1,150 @@
|
||||
/*
|
||||
* Test vectors for our ed25519 implementation and related
|
||||
* functions. These were automatically generated by the
|
||||
* ed25519_exts_ref.py script.
|
||||
*/
|
||||
/**
|
||||
* Secret key seeds used as inputs for the ed25519 test vectors.
|
||||
* Randomly generated.
|
||||
*/
|
||||
static const char *ED25519_SECRET_KEYS[] = {
|
||||
"26c76712d89d906e6672dafa614c42e5cb1caac8c6568e4d2493087db51f0d36",
|
||||
"fba7a5366b5cb98c2667a18783f5cf8f4f8d1a2ce939ad22a6e685edde85128d",
|
||||
"67e3aa7a14fac8445d15e45e38a523481a69ae35513c9e4143eb1c2196729a0e",
|
||||
"d51385942033a76dc17f089a59e6a5a7fe80d9c526ae8ddd8c3a506b99d3d0a6",
|
||||
"5c8eac469bb3f1b85bc7cd893f52dc42a9ab66f1b02b5ce6a68e9b175d3bb433",
|
||||
"eda433d483059b6d1ff8b7cfbd0fe406bfb23722c8f3c8252629284573b61b86",
|
||||
"4377c40431c30883c5fbd9bc92ae48d1ed8a47b81d13806beac5351739b5533d",
|
||||
"c6bbcce615839756aed2cc78b1de13884dd3618f48367a17597a16c1cd7a290b",
|
||||
};
|
||||
|
||||
/**
|
||||
* Secret ed25519 keys after expansion from seeds. This is how Tor
|
||||
* represents them internally.
|
||||
*/
|
||||
static const char *ED25519_EXPANDED_SECRET_KEYS[] = {
|
||||
"c0a4de23cc64392d85aa1da82b3defddbea946d13bb053bf8489fa9296281f495022f1"
|
||||
"f7ec0dcf52f07d4c7965c4eaed121d5d88d0a8ff546b06116a20e97755",
|
||||
"18a8a69a06790dac778e882f7e868baacfa12521a5c058f5194f3a729184514a2a656f"
|
||||
"e7799c3e41f43d756da8d9cd47a061316cfe6147e23ea2f90d1ca45f30",
|
||||
"58d84f8862d2ecfa30eb491a81c36d05b574310ea69dae18ecb57e992a896656b98218"
|
||||
"7ee96c15bf4caeeab2d0b0ae4cd0b8d17470fc7efa98bb26428f4ef36d",
|
||||
"50702d20b3550c6e16033db5ad4fba16436f1ecc7485be6af62b0732ceb5d173c47ccd"
|
||||
"9d044b6ea99dd99256adcc9c62191be194e7cb1a5b58ddcec85d876a2b",
|
||||
"7077464c864c2ed5ed21c9916dc3b3ba6256f8b742fec67658d8d233dadc8d5a7a82c3"
|
||||
"71083cc86892c2c8782dda2a09b6baf016aec51b689183ae59ce932ff2",
|
||||
"8883c1387a6c86fc0bd7b9f157b4e4cd83f6885bf55e2706d2235d4527a2f05311a359"
|
||||
"5953282e436df0349e1bb313a19b3ddbf7a7b91ecce8a2c34abadb38b3",
|
||||
"186791ac8d03a3ac8efed6ac360467edd5a3bed2d02b3be713ddd5be53b3287ee37436"
|
||||
"e5fd7ac43794394507ad440ecfdf59c4c255f19b768a273109e06d7d8e",
|
||||
"b003077c1e52a62308eef7950b2d532e1d4a7eea50ad22d8ac11b892851f1c40ffb9c9"
|
||||
"ff8dcd0c6c233f665a2e176324d92416bfcfcd1f787424c0c667452d86",
|
||||
};
|
||||
|
||||
/**
|
||||
* Public keys derived from the above secret keys
|
||||
*/
|
||||
static const char *ED25519_PUBLIC_KEYS[] = {
|
||||
"c2247870536a192d142d056abefca68d6193158e7c1a59c1654c954eccaff894",
|
||||
"1519a3b15816a1aafab0b213892026ebf5c0dc232c58b21088d88cb90e9b940d",
|
||||
"081faa81992e360ea22c06af1aba096e7a73f1c665bc8b3e4e531c46455fd1dd",
|
||||
"73cfa1189a723aad7966137cbffa35140bb40d7e16eae4c40b79b5f0360dd65a",
|
||||
"66c1a77104d86461b6f98f73acf3cd229c80624495d2d74d6fda1e940080a96b",
|
||||
"d21c294db0e64cb2d8976625786ede1d9754186ae8197a64d72f68c792eecc19",
|
||||
"c4d58b4cf85a348ff3d410dd936fa460c4f18da962c01b1963792b9dcc8a6ea6",
|
||||
"95126f14d86494020665face03f2d42ee2b312a85bc729903eb17522954a1c4a",
|
||||
};
|
||||
|
||||
/**
|
||||
* The curve25519 public keys from which the ed25519 keys can be
|
||||
* derived. Used to test our 'derive ed25519 from curve25519'
|
||||
* code.
|
||||
*/
|
||||
static const char *ED25519_CURVE25519_PUBLIC_KEYS[] = {
|
||||
"17ba77846e04c7ee5ca17cade774ac1884408f9701f439d4df32cbd8736c6a1f",
|
||||
"022be2124bc1899a78ba2b4167d191af3b59cadf94f0382bc31ce183a117f161",
|
||||
"bf4fd38ef22f718f03c0a12ba5127bd1e3afd494793753f519728b29cc577571",
|
||||
"56c493e490261cef31633efd2461d2b896908e90459e4eecde950a895aef681d",
|
||||
"089675a3e8ff2a7d8b2844a79269c95b7f97a4b8b5ea0cbeec669c6f2dea9b39",
|
||||
"59e20dcb691c4a345fe86c8a79ac817e5b514d84bbf0512a842a08e43f7f087e",
|
||||
"9e43b820b320eda35f66f122c155b2bf8e2192c468617b7115bf067d19e08369",
|
||||
"861f33296cb57f8f01e4a5e8a7e5d5d7043a6247586ab36dea8a1a3c4403ee30",
|
||||
};
|
||||
|
||||
/**
|
||||
* Parameters used for key blinding tests. Randomly generated.
|
||||
*/
|
||||
static const char *ED25519_BLINDING_PARAMS[] = {
|
||||
"54a513898b471d1d448a2f3c55c1de2c0ef718c447b04497eeb999ed32027823",
|
||||
"831e9b5325b5d31b7ae6197e9c7a7baf2ec361e08248bce055908971047a2347",
|
||||
"ac78a1d46faf3bfbbdc5af5f053dc6dc9023ed78236bec1760dadfd0b2603760",
|
||||
"f9c84dc0ac31571507993df94da1b3d28684a12ad14e67d0a068aba5c53019fc",
|
||||
"b1fe79d1dec9bc108df69f6612c72812755751f21ecc5af99663b30be8b9081f",
|
||||
"81f1512b63ab5fb5c1711a4ec83d379c420574aedffa8c3368e1c3989a3a0084",
|
||||
"97f45142597c473a4b0e9a12d64561133ad9e1155fe5a9807fe6af8a93557818",
|
||||
"3f44f6a5a92cde816635dfc12ade70539871078d2ff097278be2a555c9859cd0",
|
||||
};
|
||||
|
||||
/**
|
||||
* Blinded secret keys for testing key blinding. The nth blinded
|
||||
* key corresponds to the nth secret key blidned with the nth
|
||||
* blinding parameter.
|
||||
*/
|
||||
static const char *ED25519_BLINDED_SECRET_KEYS[] = {
|
||||
"014e83abadb2ca9a27e0ffe23920333d817729f48700e97656ec2823d694050e171d43"
|
||||
"f24e3f53e70ec7ac280044ac77d4942dee5d6807118a59bdf3ee647e89",
|
||||
"fad8cca0b4335847795288b1452508752b253e64e6c7c78d4a02dbbd7d46aa0eb8ceff"
|
||||
"20dfcf53eb52b891fc078c934efbf0353af7242e7dc51bb32a093afa29",
|
||||
"116eb0ae0a4a91763365bdf86db427b00862db448487808788cc339ac10e5e089217f5"
|
||||
"2e92797462bd890fc274672e05c98f2c82970d640084781334aae0f940",
|
||||
"bd1fbb0ee5acddc4adbcf5f33e95d9445f40326ce579fdd764a24483a9ccb20f509ece"
|
||||
"e77082ce088f7c19d5a00e955eeef8df6fa41686abc1030c2d76807733",
|
||||
"237f5345cefe8573ce9fa7e216381a1172796c9e3f70668ab503b1352952530fb57b95"
|
||||
"a440570659a440a3e4771465022a8e67af86bdf2d0990c54e7bb87ff9a",
|
||||
"ba8ff23bc4ad2b739e1ccffc9fbc7837053ea81cdfdb15073f56411cfbae1d0ec492fc"
|
||||
"87d5ec2a1b185ca5a40541fdef0b1e128fd5c2380c888bfa924711bcab",
|
||||
"0fa68f969de038c7a90a4a74ee6167c77582006f2dedecc1956501ba6b6fb10391b476"
|
||||
"8f8e556d78f4bdcb9a13b6f6066fe81d3134ae965dc48cd0785b3af2b8",
|
||||
"deaa3456d1c21944d5dcd361a646858c6cf9336b0a6851d925717eb1ae186902053d9c"
|
||||
"00c81e1331c06ab50087be8cfc7dc11691b132614474f1aa9c2503cccd",
|
||||
};
|
||||
|
||||
/**
|
||||
* Blinded public keys for testing key blinding. The nth blinded
|
||||
* key corresponds to the nth public key blidned with the nth
|
||||
* blinding parameter.
|
||||
*/
|
||||
static const char *ED25519_BLINDED_PUBLIC_KEYS[] = {
|
||||
"722d6da6348e618967ef782e71061e27163a8b35f21856475d9d2023f65b6495",
|
||||
"1dffa0586da6cbfcff2024eedf4fc6c818242d9a82dbbe635d6da1b975a1160d",
|
||||
"5ed81f98fed5a6acda4ea6da2c34fab0ab359d950c510c256473f1f33ff438b4",
|
||||
"6e6f92a54fb282120c46d9603df41135f025bc1f58f283809d04be96aeb04040",
|
||||
"cda236f28edc4c7e02d18007b8dab49d669265b0f7aefb1824d7cc8e73a2cd63",
|
||||
"367b03b17b67ca7329b89a520bdab91782402a41cd67264e34b5541a4b3f875b",
|
||||
"8d486b03ac4e3b486b7a1d563706c7fdac75aee789a7cf6f22789eedeff61a31",
|
||||
"9f297ff0aa2ceda91c5ab1b6446f12533d145940de6d850dc323417afde0cb78",
|
||||
};
|
||||
|
||||
/**
|
||||
* Signatures of the public keys, made with their corresponding
|
||||
* secret keys.
|
||||
*/
|
||||
static const char *ED25519_SELF_SIGNATURES[] = {
|
||||
"d23188eac3773a316d46006fa59c095060be8b1a23582a0dd99002a82a0662bd246d84"
|
||||
"49e172e04c5f46ac0d1404cebe4aabd8a75a1457aa06cae41f3334f104",
|
||||
"3a785ac1201c97ee5f6f0d99323960d5f264c7825e61aa7cc81262f15bef75eb4fa572"
|
||||
"3add9b9d45b12311b6d403eb3ac79ff8e4e631fc3cd51e4ad2185b200b",
|
||||
"cf431fd0416bfbd20c9d95ef9b723e2acddffb33900edc72195dea95965d52d888d30b"
|
||||
"7b8a677c0bd8ae1417b1e1a0ec6700deadd5d8b54b6689275e04a04509",
|
||||
"2375380cd72d1a6c642aeddff862be8a5804b916acb72c02d9ed052c1561881aa658a5"
|
||||
"af856fcd6d43113e42f698cd6687c99efeef7f2ce045824440d26c5d00",
|
||||
"2385a472f599ca965bbe4d610e391cdeabeba9c336694b0d6249e551458280be122c24"
|
||||
"41dd9746a81bbfb9cd619364bab0df37ff4ceb7aefd24469c39d3bc508",
|
||||
"e500cd0b8cfff35442f88008d894f3a2fa26ef7d3a0ca5714ae0d3e2d40caae58ba7cd"
|
||||
"f69dd126994dad6be536fcda846d89dd8138d1683cc144c8853dce7607",
|
||||
"d187b9e334b0050154de10bf69b3e4208a584e1a65015ec28b14bcc252cf84b8baa9c9"
|
||||
"4867daa60f2a82d09ba9652d41e8dde292b624afc8d2c26441b95e3c0e",
|
||||
"815213640a643d198bd056e02bba74e1c8d2d931643e84497adf3347eb485079c9afe0"
|
||||
"afce9284cdc084946b561abbb214f1304ca11228ff82702185cf28f60d",
|
||||
};
|
||||
|
@ -74,7 +74,8 @@ src_test_bench_LDADD = src/or/libtor.a src/common/libor.a \
|
||||
|
||||
noinst_HEADERS+= \
|
||||
src/test/test.h \
|
||||
src/test/test_descriptors.inc
|
||||
src/test/test_descriptors.inc \
|
||||
src/test/ed25519_vectors.inc
|
||||
|
||||
if CURVE25519_ENABLED
|
||||
noinst_PROGRAMS+= src/test/test-ntor-cl
|
||||
|
115
src/test/slow_ed25519.py
Normal file
115
src/test/slow_ed25519.py
Normal file
@ -0,0 +1,115 @@
|
||||
# This is the ed25519 implementation from
|
||||
# http://ed25519.cr.yp.to/python/ed25519.py .
|
||||
# It is in the public domain.
|
||||
#
|
||||
# It isn't constant-time. Don't use it except for testing. Also, see
|
||||
# warnings about how very slow it is. Only use this for generating
|
||||
# test vectors, I'd suggest.
|
||||
#
|
||||
# Don't edit this file. Mess with ed25519_ref.py
|
||||
|
||||
import hashlib
|
||||
|
||||
b = 256
|
||||
q = 2**255 - 19
|
||||
l = 2**252 + 27742317777372353535851937790883648493
|
||||
|
||||
def H(m):
|
||||
return hashlib.sha512(m).digest()
|
||||
|
||||
def expmod(b,e,m):
|
||||
if e == 0: return 1
|
||||
t = expmod(b,e/2,m)**2 % m
|
||||
if e & 1: t = (t*b) % m
|
||||
return t
|
||||
|
||||
def inv(x):
|
||||
return expmod(x,q-2,q)
|
||||
|
||||
d = -121665 * inv(121666)
|
||||
I = expmod(2,(q-1)/4,q)
|
||||
|
||||
def xrecover(y):
|
||||
xx = (y*y-1) * inv(d*y*y+1)
|
||||
x = expmod(xx,(q+3)/8,q)
|
||||
if (x*x - xx) % q != 0: x = (x*I) % q
|
||||
if x % 2 != 0: x = q-x
|
||||
return x
|
||||
|
||||
By = 4 * inv(5)
|
||||
Bx = xrecover(By)
|
||||
B = [Bx % q,By % q]
|
||||
|
||||
def edwards(P,Q):
|
||||
x1 = P[0]
|
||||
y1 = P[1]
|
||||
x2 = Q[0]
|
||||
y2 = Q[1]
|
||||
x3 = (x1*y2+x2*y1) * inv(1+d*x1*x2*y1*y2)
|
||||
y3 = (y1*y2+x1*x2) * inv(1-d*x1*x2*y1*y2)
|
||||
return [x3 % q,y3 % q]
|
||||
|
||||
def scalarmult(P,e):
|
||||
if e == 0: return [0,1]
|
||||
Q = scalarmult(P,e/2)
|
||||
Q = edwards(Q,Q)
|
||||
if e & 1: Q = edwards(Q,P)
|
||||
return Q
|
||||
|
||||
def encodeint(y):
|
||||
bits = [(y >> i) & 1 for i in range(b)]
|
||||
return ''.join([chr(sum([bits[i * 8 + j] << j for j in range(8)])) for i in range(b/8)])
|
||||
|
||||
def encodepoint(P):
|
||||
x = P[0]
|
||||
y = P[1]
|
||||
bits = [(y >> i) & 1 for i in range(b - 1)] + [x & 1]
|
||||
return ''.join([chr(sum([bits[i * 8 + j] << j for j in range(8)])) for i in range(b/8)])
|
||||
|
||||
def bit(h,i):
|
||||
return (ord(h[i/8]) >> (i%8)) & 1
|
||||
|
||||
def publickey(sk):
|
||||
h = H(sk)
|
||||
a = 2**(b-2) + sum(2**i * bit(h,i) for i in range(3,b-2))
|
||||
A = scalarmult(B,a)
|
||||
return encodepoint(A)
|
||||
|
||||
def Hint(m):
|
||||
h = H(m)
|
||||
return sum(2**i * bit(h,i) for i in range(2*b))
|
||||
|
||||
def signature(m,sk,pk):
|
||||
h = H(sk)
|
||||
a = 2**(b-2) + sum(2**i * bit(h,i) for i in range(3,b-2))
|
||||
r = Hint(''.join([h[i] for i in range(b/8,b/4)]) + m)
|
||||
R = scalarmult(B,r)
|
||||
S = (r + Hint(encodepoint(R) + pk + m) * a) % l
|
||||
return encodepoint(R) + encodeint(S)
|
||||
|
||||
def isoncurve(P):
|
||||
x = P[0]
|
||||
y = P[1]
|
||||
return (-x*x + y*y - 1 - d*x*x*y*y) % q == 0
|
||||
|
||||
def decodeint(s):
|
||||
return sum(2**i * bit(s,i) for i in range(0,b))
|
||||
|
||||
def decodepoint(s):
|
||||
y = sum(2**i * bit(s,i) for i in range(0,b-1))
|
||||
x = xrecover(y)
|
||||
if x & 1 != bit(s,b-1): x = q-x
|
||||
P = [x,y]
|
||||
if not isoncurve(P): raise Exception("decoding point that is not on curve")
|
||||
return P
|
||||
|
||||
def checkvalid(s,m,pk):
|
||||
if len(s) != b/4: raise Exception("signature length is wrong")
|
||||
if len(pk) != b/8: raise Exception("public-key length is wrong")
|
||||
R = decodepoint(s[0:b/8])
|
||||
A = decodepoint(pk)
|
||||
S = decodeint(s[b/8:b/4])
|
||||
h = Hint(encodepoint(R) + pk + m)
|
||||
if scalarmult(B,S) != edwards(R,scalarmult(A,h)):
|
||||
raise Exception("signature does not pass verification")
|
||||
|
@ -13,6 +13,8 @@
|
||||
#include "siphash.h"
|
||||
#ifdef CURVE25519_ENABLED
|
||||
#include "crypto_curve25519.h"
|
||||
#include "crypto_ed25519.h"
|
||||
#include "ed25519_vectors.inc"
|
||||
#endif
|
||||
#include "crypto_s2k.h"
|
||||
#include "crypto_pwbox.h"
|
||||
@ -1516,8 +1518,364 @@ test_crypto_curve25519_persist(void *arg)
|
||||
tor_free(tag);
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_simple(void *arg)
|
||||
{
|
||||
ed25519_keypair_t kp1, kp2;
|
||||
ed25519_public_key_t pub1, pub2;
|
||||
ed25519_secret_key_t sec1, sec2;
|
||||
ed25519_signature_t sig1, sig2;
|
||||
const uint8_t msg[] =
|
||||
"GNU will be able to run Unix programs, "
|
||||
"but will not be identical to Unix.";
|
||||
const uint8_t msg2[] =
|
||||
"Microsoft Windows extends the features of the DOS operating system, "
|
||||
"yet is compatible with most existing applications that run under DOS.";
|
||||
size_t msg_len = strlen((const char*)msg);
|
||||
size_t msg2_len = strlen((const char*)msg2);
|
||||
|
||||
(void)arg;
|
||||
|
||||
tt_int_op(0, ==, ed25519_secret_key_generate(&sec1, 0));
|
||||
tt_int_op(0, ==, ed25519_secret_key_generate(&sec2, 1));
|
||||
|
||||
tt_int_op(0, ==, ed25519_public_key_generate(&pub1, &sec1));
|
||||
tt_int_op(0, ==, ed25519_public_key_generate(&pub2, &sec1));
|
||||
|
||||
tt_mem_op(pub1.pubkey, ==, pub2.pubkey, sizeof(pub1.pubkey));
|
||||
|
||||
memcpy(&kp1.pubkey, &pub1, sizeof(pub1));
|
||||
memcpy(&kp1.seckey, &sec1, sizeof(sec1));
|
||||
tt_int_op(0, ==, ed25519_sign(&sig1, msg, msg_len, &kp1));
|
||||
tt_int_op(0, ==, ed25519_sign(&sig2, msg, msg_len, &kp1));
|
||||
|
||||
/* Ed25519 signatures are deterministic */
|
||||
tt_mem_op(sig1.sig, ==, sig2.sig, sizeof(sig1.sig));
|
||||
|
||||
/* Basic signature is valid. */
|
||||
tt_int_op(0, ==, ed25519_checksig(&sig1, msg, msg_len, &pub1));
|
||||
|
||||
/* Altered signature doesn't work. */
|
||||
sig1.sig[0] ^= 3;
|
||||
tt_int_op(-1, ==, ed25519_checksig(&sig1, msg, msg_len, &pub1));
|
||||
|
||||
/* Wrong public key doesn't work. */
|
||||
tt_int_op(0, ==, ed25519_public_key_generate(&pub2, &sec2));
|
||||
tt_int_op(-1, ==, ed25519_checksig(&sig2, msg, msg_len, &pub2));
|
||||
|
||||
/* Wrong message doesn't work. */
|
||||
tt_int_op(0, ==, ed25519_checksig(&sig2, msg, msg_len, &pub1));
|
||||
tt_int_op(-1, ==, ed25519_checksig(&sig2, msg, msg_len-1, &pub1));
|
||||
tt_int_op(-1, ==, ed25519_checksig(&sig2, msg2, msg2_len, &pub1));
|
||||
|
||||
/* Batch signature checking works with some bad. */
|
||||
tt_int_op(0, ==, ed25519_keypair_generate(&kp2, 0));
|
||||
tt_int_op(0, ==, ed25519_sign(&sig1, msg, msg_len, &kp2));
|
||||
{
|
||||
ed25519_checkable_t ch[] = {
|
||||
{ &pub1, sig2, msg, msg_len }, /*ok*/
|
||||
{ &pub1, sig2, msg, msg_len-1 }, /*bad*/
|
||||
{ &kp2.pubkey, sig2, msg2, msg2_len }, /*bad*/
|
||||
{ &kp2.pubkey, sig1, msg, msg_len }, /*ok*/
|
||||
};
|
||||
int okay[4];
|
||||
tt_int_op(-2, ==, ed25519_checksig_batch(okay, ch, 4));
|
||||
tt_int_op(okay[0], ==, 1);
|
||||
tt_int_op(okay[1], ==, 0);
|
||||
tt_int_op(okay[2], ==, 0);
|
||||
tt_int_op(okay[3], ==, 1);
|
||||
tt_int_op(-2, ==, ed25519_checksig_batch(NULL, ch, 4));
|
||||
}
|
||||
|
||||
/* Batch signature checking works with all good. */
|
||||
{
|
||||
ed25519_checkable_t ch[] = {
|
||||
{ &pub1, sig2, msg, msg_len }, /*ok*/
|
||||
{ &kp2.pubkey, sig1, msg, msg_len }, /*ok*/
|
||||
};
|
||||
int okay[2];
|
||||
tt_int_op(0, ==, ed25519_checksig_batch(okay, ch, 2));
|
||||
tt_int_op(okay[0], ==, 1);
|
||||
tt_int_op(okay[1], ==, 1);
|
||||
tt_int_op(0, ==, ed25519_checksig_batch(NULL, ch, 2));
|
||||
}
|
||||
|
||||
done:
|
||||
;
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_test_vectors(void *arg)
|
||||
{
|
||||
char *mem_op_hex_tmp=NULL;
|
||||
int i;
|
||||
struct {
|
||||
const char *sk;
|
||||
const char *pk;
|
||||
const char *sig;
|
||||
const char *msg;
|
||||
} items[] = {
|
||||
/* These test vectors were generated with the "ref" implementation of
|
||||
* ed25519 from SUPERCOP-20130419 */
|
||||
{ "4c6574277320686f706520746865726520617265206e6f206275677320696e20",
|
||||
"f3e0e493b30f56e501aeb868fc912fe0c8b76621efca47a78f6d75875193dd87",
|
||||
"b5d7fd6fd3adf643647ce1fe87a2931dedd1a4e38e6c662bedd35cdd80bfac51"
|
||||
"1b2c7d1ee6bd929ac213014e1a8dc5373854c7b25dbe15ec96bf6c94196fae06",
|
||||
"506c6561736520657863757365206d7920667269656e642e2048652069736e2774"
|
||||
"204e554c2d7465726d696e617465642e"
|
||||
},
|
||||
|
||||
{ "74686520696d706c656d656e746174696f6e20776869636820617265206e6f74",
|
||||
"407f0025a1e1351a4cb68e92f5c0ebaf66e7aaf93a4006a4d1a66e3ede1cfeac",
|
||||
"02884fde1c3c5944d0ecf2d133726fc820c303aae695adceabf3a1e01e95bf28"
|
||||
"da88c0966f5265e9c6f8edc77b3b96b5c91baec3ca993ccd21a3f64203600601",
|
||||
"506c6561736520657863757365206d7920667269656e642e2048652069736e2774"
|
||||
"204e554c2d7465726d696e617465642e"
|
||||
},
|
||||
{ "6578706f73656420627920456e676c697368207465787420617320696e707574",
|
||||
"61681cb5fbd69f9bc5a462a21a7ab319011237b940bc781cdc47fcbe327e7706",
|
||||
"6a127d0414de7510125d4bc214994ffb9b8857a46330832d05d1355e882344ad"
|
||||
"f4137e3ca1f13eb9cc75c887ef2309b98c57528b4acd9f6376c6898889603209",
|
||||
"506c6561736520657863757365206d7920667269656e642e2048652069736e2774"
|
||||
"204e554c2d7465726d696e617465642e"
|
||||
},
|
||||
|
||||
/* These come from "sign.input" in ed25519's page */
|
||||
{ "5b5a619f8ce1c66d7ce26e5a2ae7b0c04febcd346d286c929e19d0d5973bfef9",
|
||||
"6fe83693d011d111131c4f3fbaaa40a9d3d76b30012ff73bb0e39ec27ab18257",
|
||||
"0f9ad9793033a2fa06614b277d37381e6d94f65ac2a5a94558d09ed6ce922258"
|
||||
"c1a567952e863ac94297aec3c0d0c8ddf71084e504860bb6ba27449b55adc40e",
|
||||
"5a8d9d0a22357e6655f9c785"
|
||||
},
|
||||
{ "940c89fe40a81dafbdb2416d14ae469119869744410c3303bfaa0241dac57800",
|
||||
"a2eb8c0501e30bae0cf842d2bde8dec7386f6b7fc3981b8c57c9792bb94cf2dd",
|
||||
"d8bb64aad8c9955a115a793addd24f7f2b077648714f49c4694ec995b330d09d"
|
||||
"640df310f447fd7b6cb5c14f9fe9f490bcf8cfadbfd2169c8ac20d3b8af49a0c",
|
||||
"b87d3813e03f58cf19fd0b6395"
|
||||
},
|
||||
{ "9acad959d216212d789a119252ebfe0c96512a23c73bd9f3b202292d6916a738",
|
||||
"cf3af898467a5b7a52d33d53bc037e2642a8da996903fc252217e9c033e2f291",
|
||||
"6ee3fe81e23c60eb2312b2006b3b25e6838e02106623f844c44edb8dafd66ab0"
|
||||
"671087fd195df5b8f58a1d6e52af42908053d55c7321010092748795ef94cf06",
|
||||
"55c7fa434f5ed8cdec2b7aeac173",
|
||||
},
|
||||
{ "d5aeee41eeb0e9d1bf8337f939587ebe296161e6bf5209f591ec939e1440c300",
|
||||
"fd2a565723163e29f53c9de3d5e8fbe36a7ab66e1439ec4eae9c0a604af291a5",
|
||||
"f68d04847e5b249737899c014d31c805c5007a62c0a10d50bb1538c5f3550395"
|
||||
"1fbc1e08682f2cc0c92efe8f4985dec61dcbd54d4b94a22547d24451271c8b00",
|
||||
"0a688e79be24f866286d4646b5d81c"
|
||||
},
|
||||
|
||||
{ NULL, NULL, NULL, NULL}
|
||||
};
|
||||
|
||||
(void)arg;
|
||||
|
||||
for (i = 0; items[i].pk; ++i) {
|
||||
ed25519_keypair_t kp;
|
||||
ed25519_signature_t sig;
|
||||
uint8_t sk_seed[32];
|
||||
uint8_t *msg;
|
||||
size_t msg_len;
|
||||
base16_decode((char*)sk_seed, sizeof(sk_seed),
|
||||
items[i].sk, 64);
|
||||
ed25519_secret_key_from_seed(&kp.seckey, sk_seed);
|
||||
tt_int_op(0, ==, ed25519_public_key_generate(&kp.pubkey, &kp.seckey));
|
||||
test_memeq_hex(kp.pubkey.pubkey, items[i].pk);
|
||||
|
||||
msg_len = strlen(items[i].msg) / 2;
|
||||
msg = tor_malloc(msg_len);
|
||||
base16_decode((char*)msg, msg_len, items[i].msg, strlen(items[i].msg));
|
||||
|
||||
tt_int_op(0, ==, ed25519_sign(&sig, msg, msg_len, &kp));
|
||||
test_memeq_hex(sig.sig, items[i].sig);
|
||||
|
||||
tor_free(msg);
|
||||
}
|
||||
|
||||
done:
|
||||
tor_free(mem_op_hex_tmp);
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_encode(void *arg)
|
||||
{
|
||||
char buf[ED25519_BASE64_LEN+1];
|
||||
ed25519_keypair_t kp;
|
||||
ed25519_public_key_t pk;
|
||||
char *mem_op_hex_tmp = NULL;
|
||||
(void) arg;
|
||||
|
||||
/* Test roundtrip. */
|
||||
tt_int_op(0, ==, ed25519_keypair_generate(&kp, 0));
|
||||
tt_int_op(0, ==, ed25519_public_to_base64(buf, &kp.pubkey));
|
||||
tt_int_op(ED25519_BASE64_LEN, ==, strlen(buf));
|
||||
tt_int_op(0, ==, ed25519_public_from_base64(&pk, buf));
|
||||
tt_mem_op(kp.pubkey.pubkey, ==, pk.pubkey, ED25519_PUBKEY_LEN);
|
||||
|
||||
/* Test known value. */
|
||||
tt_int_op(0, ==, ed25519_public_from_base64(&pk,
|
||||
"lVIuIctLjbGZGU5wKMNXxXlSE3cW4kaqkqm04u6pxvM"));
|
||||
test_memeq_hex(pk.pubkey,
|
||||
"95522e21cb4b8db199194e7028c357c57952137716e246aa92a9b4e2eea9c6f3");
|
||||
|
||||
done:
|
||||
tor_free(mem_op_hex_tmp);
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_convert(void *arg)
|
||||
{
|
||||
const uint8_t msg[] =
|
||||
"The eyes are not here / There are no eyes here.";
|
||||
const int N = 30;
|
||||
int i;
|
||||
(void)arg;
|
||||
|
||||
for (i = 0; i < N; ++i) {
|
||||
curve25519_keypair_t curve25519_keypair;
|
||||
ed25519_keypair_t ed25519_keypair;
|
||||
ed25519_public_key_t ed25519_pubkey;
|
||||
|
||||
int bit=0;
|
||||
ed25519_signature_t sig;
|
||||
|
||||
tt_int_op(0,==,curve25519_keypair_generate(&curve25519_keypair, i&1));
|
||||
tt_int_op(0,==,ed25519_keypair_from_curve25519_keypair(
|
||||
&ed25519_keypair, &bit, &curve25519_keypair));
|
||||
tt_int_op(0,==,ed25519_public_key_from_curve25519_public_key(
|
||||
&ed25519_pubkey, &curve25519_keypair.pubkey, bit));
|
||||
tt_mem_op(ed25519_pubkey.pubkey, ==, ed25519_keypair.pubkey.pubkey, 32);
|
||||
|
||||
tt_int_op(0,==,ed25519_sign(&sig, msg, sizeof(msg), &ed25519_keypair));
|
||||
tt_int_op(0,==,ed25519_checksig(&sig, msg, sizeof(msg),
|
||||
&ed25519_pubkey));
|
||||
|
||||
tt_int_op(-1,==,ed25519_checksig(&sig, msg, sizeof(msg)-1,
|
||||
&ed25519_pubkey));
|
||||
sig.sig[0] ^= 15;
|
||||
tt_int_op(-1,==,ed25519_checksig(&sig, msg, sizeof(msg),
|
||||
&ed25519_pubkey));
|
||||
}
|
||||
|
||||
done:
|
||||
;
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_blinding(void *arg)
|
||||
{
|
||||
const uint8_t msg[] =
|
||||
"Eyes I dare not meet in dreams / In death's dream kingdom";
|
||||
|
||||
const int N = 30;
|
||||
int i;
|
||||
(void)arg;
|
||||
|
||||
for (i = 0; i < N; ++i) {
|
||||
uint8_t blinding[32];
|
||||
ed25519_keypair_t ed25519_keypair;
|
||||
ed25519_keypair_t ed25519_keypair_blinded;
|
||||
ed25519_public_key_t ed25519_pubkey_blinded;
|
||||
|
||||
ed25519_signature_t sig;
|
||||
|
||||
crypto_rand((char*) blinding, sizeof(blinding));
|
||||
|
||||
tt_int_op(0,==,ed25519_keypair_generate(&ed25519_keypair, 0));
|
||||
tt_int_op(0,==,ed25519_keypair_blind(&ed25519_keypair_blinded,
|
||||
&ed25519_keypair, blinding));
|
||||
|
||||
tt_int_op(0,==,ed25519_public_blind(&ed25519_pubkey_blinded,
|
||||
&ed25519_keypair.pubkey, blinding));
|
||||
|
||||
tt_mem_op(ed25519_pubkey_blinded.pubkey, ==,
|
||||
ed25519_keypair_blinded.pubkey.pubkey, 32);
|
||||
|
||||
tt_int_op(0,==,ed25519_sign(&sig, msg, sizeof(msg),
|
||||
&ed25519_keypair_blinded));
|
||||
|
||||
tt_int_op(0,==,ed25519_checksig(&sig, msg, sizeof(msg),
|
||||
&ed25519_pubkey_blinded));
|
||||
|
||||
tt_int_op(-1,==,ed25519_checksig(&sig, msg, sizeof(msg)-1,
|
||||
&ed25519_pubkey_blinded));
|
||||
sig.sig[0] ^= 15;
|
||||
tt_int_op(-1,==,ed25519_checksig(&sig, msg, sizeof(msg),
|
||||
&ed25519_pubkey_blinded));
|
||||
}
|
||||
|
||||
done:
|
||||
;
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_ed25519_testvectors(void *arg)
|
||||
{
|
||||
unsigned i;
|
||||
char *mem_op_hex_tmp = NULL;
|
||||
(void)arg;
|
||||
|
||||
for (i = 0; i < ARRAY_LENGTH(ED25519_SECRET_KEYS); ++i) {
|
||||
uint8_t sk[32];
|
||||
ed25519_secret_key_t esk;
|
||||
ed25519_public_key_t pk, blind_pk, pkfromcurve;
|
||||
ed25519_keypair_t keypair, blind_keypair;
|
||||
curve25519_keypair_t curvekp;
|
||||
uint8_t blinding_param[32];
|
||||
ed25519_signature_t sig;
|
||||
int sign;
|
||||
|
||||
#define DECODE(p,s) base16_decode((char*)(p),sizeof(p),(s),strlen(s))
|
||||
#define EQ(a,h) test_memeq_hex((const char*)(a), (h))
|
||||
|
||||
tt_int_op(0, ==, DECODE(sk, ED25519_SECRET_KEYS[i]));
|
||||
tt_int_op(0, ==, DECODE(blinding_param, ED25519_BLINDING_PARAMS[i]));
|
||||
|
||||
tt_int_op(0, ==, ed25519_secret_key_from_seed(&esk, sk));
|
||||
EQ(esk.seckey, ED25519_EXPANDED_SECRET_KEYS[i]);
|
||||
|
||||
tt_int_op(0, ==, ed25519_public_key_generate(&pk, &esk));
|
||||
EQ(pk.pubkey, ED25519_PUBLIC_KEYS[i]);
|
||||
|
||||
memcpy(&curvekp.seckey.secret_key, esk.seckey, 32);
|
||||
curve25519_public_key_generate(&curvekp.pubkey, &curvekp.seckey);
|
||||
|
||||
tt_int_op(0, ==,
|
||||
ed25519_keypair_from_curve25519_keypair(&keypair, &sign, &curvekp));
|
||||
tt_int_op(0, ==, ed25519_public_key_from_curve25519_public_key(
|
||||
&pkfromcurve, &curvekp.pubkey, sign));
|
||||
tt_mem_op(keypair.pubkey.pubkey, ==, pkfromcurve.pubkey, 32);
|
||||
EQ(curvekp.pubkey.public_key, ED25519_CURVE25519_PUBLIC_KEYS[i]);
|
||||
|
||||
/* Self-signing */
|
||||
memcpy(&keypair.seckey, &esk, sizeof(esk));
|
||||
memcpy(&keypair.pubkey, &pk, sizeof(pk));
|
||||
|
||||
tt_int_op(0, ==, ed25519_sign(&sig, pk.pubkey, 32, &keypair));
|
||||
|
||||
EQ(sig.sig, ED25519_SELF_SIGNATURES[i]);
|
||||
|
||||
/* Blinding */
|
||||
tt_int_op(0, ==,
|
||||
ed25519_keypair_blind(&blind_keypair, &keypair, blinding_param));
|
||||
tt_int_op(0, ==,
|
||||
ed25519_public_blind(&blind_pk, &pk, blinding_param));
|
||||
|
||||
EQ(blind_keypair.seckey.seckey, ED25519_BLINDED_SECRET_KEYS[i]);
|
||||
EQ(blind_pk.pubkey, ED25519_BLINDED_PUBLIC_KEYS[i]);
|
||||
|
||||
tt_mem_op(blind_pk.pubkey, ==, blind_keypair.pubkey.pubkey, 32);
|
||||
|
||||
#undef DECODE
|
||||
#undef EQ
|
||||
}
|
||||
done:
|
||||
tor_free(mem_op_hex_tmp);
|
||||
}
|
||||
|
||||
static void
|
||||
test_crypto_siphash(void *arg)
|
||||
{
|
||||
@ -1671,6 +2029,12 @@ struct testcase_t crypto_tests[] = {
|
||||
{ "curve25519_wrappers", test_crypto_curve25519_wrappers, 0, NULL, NULL },
|
||||
{ "curve25519_encode", test_crypto_curve25519_encode, 0, NULL, NULL },
|
||||
{ "curve25519_persist", test_crypto_curve25519_persist, 0, NULL, NULL },
|
||||
{ "ed25519_simple", test_crypto_ed25519_simple, 0, NULL, NULL },
|
||||
{ "ed25519_test_vectors", test_crypto_ed25519_test_vectors, 0, NULL, NULL },
|
||||
{ "ed25519_encode", test_crypto_ed25519_encode, 0, NULL, NULL },
|
||||
{ "ed25519_convert", test_crypto_ed25519_convert, 0, NULL, NULL },
|
||||
{ "ed25519_blinding", test_crypto_ed25519_blinding, 0, NULL, NULL },
|
||||
{ "ed25519_testvectors", test_crypto_ed25519_testvectors, 0, NULL, NULL },
|
||||
#endif
|
||||
{ "siphash", test_crypto_siphash, 0, NULL, NULL },
|
||||
END_OF_TESTCASES
|
||||
|
Loading…
Reference in New Issue
Block a user