379 lines
9.9 KiB
JavaScript
379 lines
9.9 KiB
JavaScript
const { sodium_memzero } = require('./')
|
|
const { randombytes_buf } = require('./randombytes')
|
|
const ec = require('./fe25519_25')
|
|
const {
|
|
crypto_hash_sha512, crypto_hash_sha512_update,
|
|
crypto_hash_sha512_state, crypto_hash_sha512_final
|
|
} = require('./crypto_hash.js')
|
|
const { crypto_verify_32 } = require('./crypto_verify')
|
|
|
|
var crypto_sign_ed25519_BYTES = 64
|
|
var crypto_sign_ed25519_SEEDBYTES = 32
|
|
var crypto_sign_ed25519_PUBLICKEYBYTES = 32
|
|
var crypto_sign_ed25519_SECRETKEYBYTES = 64
|
|
var crypto_sign_ed25519_MESSAGEBYTES_MAX = Number.MAX_SAFE_INTEGER
|
|
|
|
const crypto_sign_BYTES = crypto_sign_ed25519_BYTES
|
|
const crypto_sign_PUBLICKEYBYTES = crypto_sign_ed25519_PUBLICKEYBYTES
|
|
const crypto_sign_SECRETKEYBYTES = crypto_sign_ed25519_SECRETKEYBYTES
|
|
const crypto_sign_SEEDBYTES = crypto_sign_ed25519_SEEDBYTES
|
|
|
|
|
|
function crypto_sign_seed_keypair (pk, sk, seed) {
|
|
const A = ec.ge25519_p3()
|
|
|
|
crypto_hash_sha512(sk, seed, 32)
|
|
sk[0] &= 248
|
|
sk[31] &= 127
|
|
sk[31] |= 64
|
|
|
|
ec.ge25519_scalarmult_base(A, sk)
|
|
ec.ge25519_p3_tobytes(pk, A)
|
|
|
|
sk.set(seed, 32)
|
|
sk.set(pk, 32)
|
|
}
|
|
|
|
function crypto_sign_keypair (pk, sk) {
|
|
const seed = Buffer.alloc(32)
|
|
|
|
randombytes_buf(seed)
|
|
crypto_sign_seed_keypair(pk, sk, seed)
|
|
sodium_memzero(seed)
|
|
}
|
|
|
|
function crypto_sign_ed25519_pk_to_curve25519 (curve25519_pk, ed25519_pk)
|
|
{
|
|
const A = ec.ge25519_p3()
|
|
const x = ec.fe25519()
|
|
const one_minus_y = ec.fe25519()
|
|
|
|
if (ec.ge25519_has_small_order(ed25519_pk) != 0 ||
|
|
ec.ge25519_frombytes_negate_vartime(A, ed25519_pk) != 0 ||
|
|
ec.ge25519_is_on_main_subgroup(A) == 0) {
|
|
throw new Error('Invalid public key')
|
|
}
|
|
|
|
fe25519_1(one_minus_y)
|
|
fe25519_sub(one_minus_y, one_minus_y, A[1])
|
|
fe25519_1(x)
|
|
fe25519_add(x, x, A[1])
|
|
fe25519_invert(one_minus_y, one_minus_y)
|
|
fe25519_mul(x, x, one_minus_y)
|
|
fe25519_tobytes(curve25519_pk, x)
|
|
}
|
|
|
|
function crypto_sign_ed25519_sk_to_curve25519 (curve25519_sk, ed25519_sk)
|
|
{
|
|
const h = Buffer.alloc(crypto_hash_sha512_BYTES)
|
|
|
|
crypto_hash_sha512(h, ed25519_sk, 32)
|
|
h[0] &= 248
|
|
h[31] &= 127
|
|
h[31] |= 64
|
|
curve25519_sk.set(h.subarray(0, crypto_scalarmult_curve25519_BYTES))
|
|
|
|
sodium_memzero(h)
|
|
}
|
|
|
|
|
|
function _crypto_sign_ed25519_ref10_hinit (hs, prehashed) {
|
|
const DOM2PREFIX = Buffer.from('SigEd25519 no Ed25519 collisions ')
|
|
DOM2PREFIX[30] = 1
|
|
DOM2PREFIX[31] = 0
|
|
|
|
if (prehashed) {
|
|
crypto_hash_sha512_update(hs, DOM2PREFIX, DOM2PREFIX.byteLength)
|
|
}
|
|
}
|
|
|
|
function _crypto_sign_ed25519_clamp (k) {
|
|
k[0] &= 248
|
|
k[31] &= 127
|
|
k[31] |= 64
|
|
}
|
|
|
|
function _crypto_sign_ed25519_detached (sig, m, sk, prehashed) {
|
|
var state = crypto_hash_sha512_state()
|
|
var az = Buffer.alloc(64)
|
|
var nonce = Buffer.alloc(64)
|
|
var hram = Buffer.alloc(64)
|
|
var R = ec.ge3()
|
|
|
|
_crypto_sign_ed25519_ref10_hinit(state, prehashed)
|
|
|
|
crypto_hash_sha512(az, sk, 32)
|
|
crypto_hash_sha512_update(state, az.subarray(32), 32)
|
|
crypto_hash_sha512_update(state, m)
|
|
crypto_hash_sha512_final(state, nonce)
|
|
|
|
sig.set(sk.subarray(32, 64), 32)
|
|
|
|
ec.sc25519_reduce(nonce)
|
|
ec.ge25519_scalarmult_base(R, nonce)
|
|
ec.ge25519_p3_tobytes(sig, R)
|
|
|
|
state = crypto_hash_sha512_state()
|
|
_crypto_sign_ed25519_ref10_hinit(state, prehashed)
|
|
crypto_hash_sha512_update(state, sig, 64)
|
|
crypto_hash_sha512_update(state, m)
|
|
crypto_hash_sha512_final(state, hram)
|
|
|
|
ec.sc25519_reduce(hram)
|
|
console.log('h s', hram.toString('hex'))
|
|
_crypto_sign_ed25519_clamp(az)
|
|
ec.sc25519_muladd(sig.subarray(32), hram, az, nonce)
|
|
|
|
sodium_memzero(az)
|
|
sodium_memzero(nonce)
|
|
|
|
return 0
|
|
}
|
|
|
|
function crypto_sign_ed25519_detached (sig, m, sk) {
|
|
return _crypto_sign_ed25519_detached(sig, m, sk, 0)
|
|
}
|
|
|
|
function crypto_sign_detached (sig, m, sk) {
|
|
return _crypto_sign_ed25519_detached(sig, m, sk, 0)
|
|
}
|
|
|
|
function crypto_sign_ed25519 (sm, m, sk) {
|
|
sm.set(m, crypto_sign_ed25519_BYTES)
|
|
|
|
/* LCOV_EXCL_START */
|
|
if (crypto_sign_ed25519_detached(sm, sm.subarray(crypto_sign_ed25519_BYTES), sk) !== 0) {
|
|
sm.fill(0, m.byteLength + crypto_sign_ed25519_BYTES)
|
|
return -1
|
|
}
|
|
/* LCOV_EXCL_STOP */
|
|
return m.byteLength + 64
|
|
}
|
|
|
|
function crypto_sign (sm, m, sk) {
|
|
return crypto_sign_ed25519(sm, m, sk)
|
|
}
|
|
|
|
function _crypto_sign_ed25519_verify_detached(sig, m, pk, prehashed) {
|
|
var hs = crypto_hash_sha512_state()
|
|
var h = Buffer.alloc(64)
|
|
var rcheck = Buffer.alloc(32)
|
|
var A = ec.ge3()
|
|
var R = ec.ge2()
|
|
|
|
// #ifdef ED25519_COMPAT
|
|
if (sig[63] & 224) {
|
|
return -1
|
|
}
|
|
// #else
|
|
// if ((sig[63] & 240) &&
|
|
// sc25519_is_canonical(sig + 32) == 0) {
|
|
// return -1;
|
|
// }
|
|
// if (ge25519_has_small_order(sig) != 0) {
|
|
// return -1;
|
|
// }
|
|
// if (ge25519_is_canonical(pk) == 0 ||
|
|
// ge25519_has_small_order(pk) != 0) {
|
|
// return -1;
|
|
// }
|
|
// #endif
|
|
if (ec.ge25519_frombytes_negate_vartime(A, pk) !== 0) {
|
|
return -1
|
|
}
|
|
ec.ge25519_tobytes(rcheck, A)
|
|
|
|
_crypto_sign_ed25519_ref10_hinit(hs, prehashed)
|
|
crypto_hash_sha512_update(hs, sig, 32)
|
|
crypto_hash_sha512_update(hs, pk, 32)
|
|
crypto_hash_sha512_update(hs, m)
|
|
crypto_hash_sha512_final(hs, h)
|
|
ec.sc25519_reduce(h)
|
|
console.log('h v', h.toString('hex'))
|
|
|
|
ec.ge25519_double_scalarmult_vartime(R, h, A, sig.subarray(32))
|
|
ec.ge25519_tobytes(rcheck, R)
|
|
|
|
return crypto_verify_32(rcheck, 0, sig, 0)// | sodium_memcmp(sig.subarray(0, 32), rcheck.subarray(0, 32))
|
|
}
|
|
|
|
function crypto_sign_ed25519_verify_detached (sig, m, pk) {
|
|
return _crypto_sign_ed25519_verify_detached(sig, m, pk, 0);
|
|
}
|
|
|
|
function crypto_sign_ed25519_open (m, sm, pk) {
|
|
if (sm.byteLength < 64 || sm.byteLength - 64 > crypto_sign_ed25519_MESSAGEBYTES_MAX) {
|
|
throw new Error('Bad signature.')
|
|
}
|
|
|
|
if (crypto_sign_ed25519_verify_detached(sm, sm.subarray(64), pk) !== 0) {
|
|
if (m.byteLength) m.fill(0)
|
|
throw new Error('Bad signature.')
|
|
}
|
|
|
|
if (m.byteLength) {
|
|
m.set(sm.subarray(64))
|
|
}
|
|
|
|
return true
|
|
}
|
|
|
|
function crypto_sign_ed25519_sk_to_pk (pk, sk) {
|
|
pk.set(sk.subarray(crypto_sign_ed25519_SEEDBYTES))
|
|
}
|
|
|
|
function crypto_sign_open (m, sm, pk) {
|
|
return crypto_sign_ed25519_open(m, sm, pk)
|
|
}
|
|
|
|
function crypto_sign_verify_detached (m, sm, pk) {
|
|
return crypto_sign_ed25519_verify_detached(m, sm, pk)
|
|
}
|
|
|
|
function _crypto_sign_ristretto25519_detached (sig, m, sk, prehashed) {
|
|
var state = crypto_hash_sha512_state()
|
|
var az = Buffer.alloc(64)
|
|
var nonce = Buffer.alloc(64)
|
|
var hram = Buffer.alloc(64)
|
|
var R = ec.ge3()
|
|
|
|
_crypto_sign_ed25519_ref10_hinit(state, prehashed)
|
|
|
|
crypto_hash_sha512(az, sk, 32)
|
|
crypto_hash_sha512_update(state, az.subarray(32), 32)
|
|
crypto_hash_sha512_update(state, m)
|
|
crypto_hash_sha512_final(state, nonce)
|
|
|
|
sig.set(sk.subarray(32, 64), 32)
|
|
|
|
ec.sc25519_reduce(nonce)
|
|
ec.ge25519_scalarmult_base(R, nonce)
|
|
ec.ristretto255_p3_tobytes(sig, R)
|
|
|
|
state = crypto_hash_sha512_state()
|
|
_crypto_sign_ed25519_ref10_hinit(state, prehashed)
|
|
crypto_hash_sha512_update(state, sig, 64)
|
|
crypto_hash_sha512_update(state, m)
|
|
crypto_hash_sha512_final(state, hram)
|
|
|
|
ec.sc25519_reduce(hram)
|
|
az[31] &= 127
|
|
// az[0] &= 248
|
|
// az[0] |= 1
|
|
// console.log(az[31] & 128)
|
|
// console.log(nonce[31] & 128)
|
|
// console.log(hram[31] & 128)
|
|
ec.sc25519_muladd(sig.subarray(32), hram, az, nonce)
|
|
|
|
sodium_memzero(az)
|
|
sodium_memzero(nonce)
|
|
|
|
return 0
|
|
|
|
var rcheck = Buffer.alloc(32)
|
|
var A = ec.ge3()
|
|
var _A = ec.ge3()
|
|
var h = Buffer.alloc(64)
|
|
var hs = crypto_hash_sha512_state()
|
|
var pk = sk.subarray(32).slice()
|
|
// pk[31] &= 127
|
|
ec.ristretto255_frombytes(A, pk, true)
|
|
ec.ge25519_scalarmult_base(_A, az)
|
|
ec.ge25519_p3_add(_A, _A, A)
|
|
ec.ge25519_p3_tobytes(rcheck, _A)
|
|
// console.log(rcheck.toString('hex'))
|
|
|
|
_crypto_sign_ed25519_ref10_hinit(hs, prehashed)
|
|
crypto_hash_sha512_update(hs, sig, 32)
|
|
crypto_hash_sha512_update(hs, pk, 32)
|
|
crypto_hash_sha512_update(hs, m)
|
|
crypto_hash_sha512_final(hs, h)
|
|
ec.sc25519_reduce(h)
|
|
|
|
ec.ge25519_double_scalarmult_vartime(R, h, A, sig.subarray(32))
|
|
ec.ristretto255_p3_tobytes(rcheck, R)
|
|
|
|
}
|
|
|
|
function _crypto_sign_ristretto25519_verify_detached(sig, m, pk, prehashed) {
|
|
var hs = crypto_hash_sha512_state()
|
|
var h = Buffer.alloc(64)
|
|
var rcheck = Buffer.alloc(32)
|
|
var A = ec.ge3()
|
|
var R = ec.ge3()
|
|
|
|
// #ifdef ED25519_COMPAT
|
|
if (sig[63] & 224) {
|
|
console.log('here')
|
|
return -1
|
|
}
|
|
// #else
|
|
// if ((sig[63] & 240) &&
|
|
// sc25519_is_canonical(sig + 32) == 0) {
|
|
// return -1;
|
|
// }
|
|
// if (ge25519_has_small_order(sig) != 0) {
|
|
// return -1;
|
|
// }
|
|
// if (ge25519_is_canonical(pk) == 0 ||
|
|
// ge25519_has_small_order(pk) != 0) {
|
|
// return -1;
|
|
// }
|
|
// #endif
|
|
if (ec.ristretto255_frombytes(A, pk, true) !== 0) {
|
|
console.log('there')
|
|
return -1
|
|
}
|
|
|
|
_crypto_sign_ed25519_ref10_hinit(hs, prehashed)
|
|
crypto_hash_sha512_update(hs, sig, 32)
|
|
crypto_hash_sha512_update(hs, pk, 32)
|
|
crypto_hash_sha512_update(hs, m)
|
|
crypto_hash_sha512_final(hs, h)
|
|
ec.sc25519_reduce(h)
|
|
|
|
ec.ge25519_double_scalarmult_vartime(R, h, A, sig.subarray(32))
|
|
ec.ristretto255_p3_tobytes(rcheck, R)
|
|
|
|
return crypto_verify_32(rcheck, 0, sig, 0)// | sodium_memcmp(sig.subarray(0, 32), rcheck.subarray(0, 32))
|
|
}
|
|
|
|
function crypto_sign_ristretto25519_detached (sig, m, sk) {
|
|
return _crypto_sign_ristretto25519_detached(sig, m, sk)
|
|
}
|
|
|
|
function crypto_sign_ristretto25519_verify_detached (sig, m, pk) {
|
|
return _crypto_sign_ristretto25519_verify_detached(sig, m, pk, 0)
|
|
}
|
|
|
|
function crypto_sign_ristretto25519 (sm, m, sk) {
|
|
var siglen
|
|
|
|
sm.set(m.subarray(0, mlen), crypto_sign_ristretto25519_BYTES)
|
|
|
|
/* LCOV_EXCL_START */
|
|
if (crypto_sign_ristretto25519_detached(sm, sm.subarray(crypto_sign_ristretto25519_BYTES), mlen, sk) !== 0) {
|
|
sm.fill(0, mlen + crypto_sign_ristretto25519_BYTES)
|
|
return -1
|
|
}
|
|
/* LCOV_EXCL_STOP */
|
|
return m.byteLength + 64
|
|
}
|
|
|
|
module.exports = {
|
|
crypto_sign_keypair,
|
|
crypto_sign_seed_keypair,
|
|
crypto_sign_ed25519_sk_to_pk,
|
|
crypto_sign,
|
|
crypto_sign_open,
|
|
crypto_sign_ed25519_detached,
|
|
crypto_sign_detached,
|
|
crypto_sign_ristretto25519_detached,
|
|
crypto_sign_ristretto25519_verify_detached,
|
|
crypto_sign_verify_detached,
|
|
crypto_sign_BYTES,
|
|
crypto_sign_PUBLICKEYBYTES,
|
|
crypto_sign_SECRETKEYBYTES,
|
|
crypto_sign_SEEDBYTES
|
|
}
|