From: Daiki Ueno <[email protected]>
Signed-off-by: Daiki Ueno <[email protected]>
---
Makefile.in | 4 +-
ecc-192.c | 1 +
ecc-224.c | 1 +
ecc-25519.c | 1 +
ecc-256.c | 1 +
ecc-384.c | 1 +
ecc-448.c | 1 +
ecc-521.c | 1 +
ecc-internal.h | 18 +++
ed25519-sha512-sign.c | 15 +++
ed448-shake256-pubkey.c | 60 ++++++++++
ed448-shake256-sign.c | 92 +++++++++++++++
ed448-shake256-verify.c | 66 +++++++++++
eddsa-compress.c | 11 +-
eddsa-decompress.c | 17 ++-
eddsa-expand.c | 20 +++-
eddsa-hash.c | 35 ++++++
eddsa-pubkey.c | 2 +-
eddsa-sign.c | 16 +--
eddsa-verify.c | 16 ++-
eddsa.h | 24 ++++
nettle.texinfo | 25 +++++
testsuite/.test-rules.make | 3 +
testsuite/Makefile.in | 2 +-
testsuite/ed448-test.c | 240 ++++++++++++++++++++++++++++++++++++++++
testsuite/eddsa-compress-test.c | 137 ++++++++++++-----------
testsuite/eddsa-sign-test.c | 66 ++++++++++-
testsuite/eddsa-verify-test.c | 49 +++++++-
28 files changed, 833 insertions(+), 92 deletions(-)
create mode 100644 ed448-shake256-pubkey.c
create mode 100644 ed448-shake256-sign.c
create mode 100644 ed448-shake256-verify.c
create mode 100644 testsuite/ed448-test.c
diff --git a/Makefile.in b/Makefile.in
index 80c66ce8..10185bb8 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -185,7 +185,9 @@ hogweed_SOURCES = sexp.c sexp-format.c \
eddsa-compress.c eddsa-decompress.c eddsa-expand.c \
eddsa-hash.c eddsa-pubkey.c eddsa-sign.c eddsa-verify.c \
ed25519-sha512-pubkey.c \
- ed25519-sha512-sign.c ed25519-sha512-verify.c
+ ed25519-sha512-sign.c ed25519-sha512-verify.c \
+ ed448-shake256-pubkey.c \
+ ed448-shake256-sign.c ed448-shake256-verify.c
OPT_SOURCES = fat-x86_64.c fat-arm.c mini-gmp.c
diff --git a/ecc-192.c b/ecc-192.c
index 1fbbcded..319d1418 100644
--- a/ecc-192.c
+++ b/ecc-192.c
@@ -172,6 +172,7 @@ const struct ecc_curve nettle_secp_192r1 =
ecc_b,
ecc_g,
NULL,
+ NULL,
ecc_unit,
ecc_table
};
diff --git a/ecc-224.c b/ecc-224.c
index b1ff0578..f679c01a 100644
--- a/ecc-224.c
+++ b/ecc-224.c
@@ -124,6 +124,7 @@ const struct ecc_curve nettle_secp_224r1 =
ecc_b,
ecc_g,
NULL,
+ NULL,
ecc_unit,
ecc_table
};
diff --git a/ecc-25519.c b/ecc-25519.c
index 16073ecf..ac5638a6 100644
--- a/ecc-25519.c
+++ b/ecc-25519.c
@@ -352,6 +352,7 @@ const struct ecc_curve _nettle_curve25519 =
ecc_d, /* Use the Edwards curve constant. */
ecc_g,
ecc_edwards,
+ &_nettle_ed25519_sha512,
ecc_unit,
ecc_table
};
diff --git a/ecc-256.c b/ecc-256.c
index d0870657..e9268e76 100644
--- a/ecc-256.c
+++ b/ecc-256.c
@@ -301,6 +301,7 @@ const struct ecc_curve nettle_secp_256r1 =
ecc_b,
ecc_g,
NULL,
+ NULL,
ecc_unit,
ecc_table
};
diff --git a/ecc-384.c b/ecc-384.c
index 006c4568..4aa7f96e 100644
--- a/ecc-384.c
+++ b/ecc-384.c
@@ -209,6 +209,7 @@ const struct ecc_curve nettle_secp_384r1 =
ecc_b,
ecc_g,
NULL,
+ NULL,
ecc_unit,
ecc_table
};
diff --git a/ecc-448.c b/ecc-448.c
index a70ff7cc..f98616d8 100644
--- a/ecc-448.c
+++ b/ecc-448.c
@@ -267,6 +267,7 @@ const struct ecc_curve _nettle_curve448 =
ecc_b,
ecc_g,
NULL,
+ &_nettle_ed448_shake256,
ecc_unit,
ecc_table
};
diff --git a/ecc-521.c b/ecc-521.c
index 9d32b54e..396f66e0 100644
--- a/ecc-521.c
+++ b/ecc-521.c
@@ -137,6 +137,7 @@ const struct ecc_curve nettle_secp_521r1 =
ecc_b,
ecc_g,
NULL,
+ NULL,
ecc_unit,
ecc_table
};
diff --git a/ecc-internal.h b/ecc-internal.h
index b58093ee..1ddec986 100644
--- a/ecc-internal.h
+++ b/ecc-internal.h
@@ -84,6 +84,9 @@
extern const struct ecc_curve _nettle_curve25519;
extern const struct ecc_curve _nettle_curve448;
+extern const struct ecc_eddsa _nettle_ed25519_sha512;
+extern const struct ecc_eddsa _nettle_ed448_shake256;
+
#define ECC_MAX_SIZE ((521 + GMP_NUMB_BITS - 1) / GMP_NUMB_BITS)
/* Window size for ecc_mul_a. Using 4 bits seems like a good choice,
@@ -200,6 +203,9 @@ struct ecc_curve
equivalent Edwards curve. */
const mp_limb_t *edwards_root;
+ /* EdDSA parameters; NULL if the curve is not usable in EdDSA. */
+ const struct ecc_eddsa *eddsa;
+
/* For redc, same as B mod p, otherwise 1. */
const mp_limb_t *unit;
@@ -216,6 +222,18 @@ struct ecc_curve
const mp_limb_t *pippenger_table;
};
+/* EdDSA parameters. */
+typedef void ecc_eddsa_dom_func (int phflag, size_t length, uint8_t *context,
+ const struct nettle_hash *hash,
+ void *ctx);
+
+struct ecc_eddsa
+{
+ unsigned short b;
+ unsigned short c;
+ ecc_eddsa_dom_func *dom;
+};
+
/* In-place reduction. */
ecc_mod_func ecc_mod;
ecc_mod_func ecc_pp1_redc;
diff --git a/ed25519-sha512-sign.c b/ed25519-sha512-sign.c
index af9de209..c26dc6b1 100644
--- a/ed25519-sha512-sign.c
+++ b/ed25519-sha512-sign.c
@@ -38,6 +38,21 @@
#include "ecc-internal.h"
#include "sha2.h"
+static void
+ed25519_sha512_dom (int phflag, size_t length, uint8_t *context,
+ const struct nettle_hash *hash,
+ void *ctx)
+{
+ /* No-op for PureEdDSA. */
+}
+
+const struct ecc_eddsa _nettle_ed25519_sha512 =
+{
+ 256,
+ 3,
+ ed25519_sha512_dom
+};
+
void
ed25519_sha512_sign (const uint8_t *pub,
const uint8_t *priv,
diff --git a/ed448-shake256-pubkey.c b/ed448-shake256-pubkey.c
new file mode 100644
index 00000000..7cfa54e9
--- /dev/null
+++ b/ed448-shake256-pubkey.c
@@ -0,0 +1,60 @@
+/* ed448-shake256-pubkey.c
+
+ Copyright (C) 2017 Daiki Ueno
+ Copyright (C) 2017 Red Hat, Inc.
+
+ This file is part of GNU Nettle.
+
+ GNU Nettle is free software: you can redistribute it and/or
+ modify it under the terms of either:
+
+ * the GNU Lesser General Public License as published by the Free
+ Software Foundation; either version 3 of the License, or (at your
+ option) any later version.
+
+ or
+
+ * the GNU General Public License as published by the Free
+ Software Foundation; either version 2 of the License, or (at your
+ option) any later version.
+
+ or both in parallel, as here.
+
+ GNU Nettle is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received copies of the GNU General Public License and
+ the GNU Lesser General Public License along with this program. If
+ not, see http://www.gnu.org/licenses/.
+*/
+
+#if HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include "eddsa.h"
+
+#include "ecc-internal.h"
+#include "sha3.h"
+
+void
+ed448_shake256_public_key (uint8_t *pub, const uint8_t *priv)
+{
+ const struct ecc_curve *ecc = &_nettle_curve448;
+ struct shake256_ctx ctx;
+ uint8_t digest[ED448_SIGNATURE_SIZE];
+ mp_size_t itch = ecc->q.size + _eddsa_public_key_itch (ecc);
+ mp_limb_t *scratch = gmp_alloc_limbs (itch);
+
+#define k scratch
+#define scratch_out (scratch + ecc->q.size)
+
+ _eddsa_expand_key (ecc, &nettle_shake256, &ctx, priv, digest, k);
+ _eddsa_public_key (ecc, k, pub, scratch_out);
+
+ gmp_free_limbs (scratch, itch);
+#undef k
+#undef scratch_out
+}
diff --git a/ed448-shake256-sign.c b/ed448-shake256-sign.c
new file mode 100644
index 00000000..f52804f6
--- /dev/null
+++ b/ed448-shake256-sign.c
@@ -0,0 +1,92 @@
+/* ed448-shake256-sign.c
+
+ Copyright (C) 2017 Daiki Ueno
+ Copyright (C) 2017 Red Hat, Inc.
+
+ This file is part of GNU Nettle.
+
+ GNU Nettle is free software: you can redistribute it and/or
+ modify it under the terms of either:
+
+ * the GNU Lesser General Public License as published by the Free
+ Software Foundation; either version 3 of the License, or (at your
+ option) any later version.
+
+ or
+
+ * the GNU General Public License as published by the Free
+ Software Foundation; either version 2 of the License, or (at your
+ option) any later version.
+
+ or both in parallel, as here.
+
+ GNU Nettle is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received copies of the GNU General Public License and
+ the GNU Lesser General Public License along with this program. If
+ not, see http://www.gnu.org/licenses/.
+*/
+
+#if HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <assert.h>
+
+#include "eddsa.h"
+
+#include "ecc-internal.h"
+#include "sha3.h"
+
+static void
+ed448_shake256_dom (int phflag, size_t length, uint8_t *context,
+ const struct nettle_hash *hash,
+ void *ctx)
+{
+ uint8_t buffer[2];
+ buffer[0] = phflag ? 1 : 0;
+ assert (length < 256);
+ buffer[1] = length;
+ hash->update (ctx, 8, "SigEd448");
+ hash->update (ctx, 2, buffer);
+ hash->update (ctx, length, context);
+}
+
+const struct ecc_eddsa _nettle_ed448_shake256 =
+{
+ 456,
+ 2,
+ ed448_shake256_dom
+};
+
+void
+ed448_shake256_sign (const uint8_t *pub,
+ const uint8_t *priv,
+ size_t length, const uint8_t *msg,
+ uint8_t *signature)
+{
+ const struct ecc_curve *ecc = &_nettle_curve448;
+ mp_size_t itch = ecc->q.size + _eddsa_sign_itch (ecc);
+ mp_limb_t *scratch = gmp_alloc_limbs (itch);
+#define k2 scratch
+#define scratch_out (scratch + ecc->q.size)
+ struct shake256_ctx ctx;
+ uint8_t digest[ED448_SIGNATURE_SIZE];
+#define k1 (digest + ED448_KEY_SIZE)
+
+ _eddsa_expand_key (ecc, &nettle_shake256, &ctx, priv, digest, k2);
+
+ ed448_shake256_dom (0, 0, "", &nettle_shake256, &ctx);
+ shake256_update (&ctx, ED448_KEY_SIZE, k1);
+ _eddsa_sign (ecc, &nettle_shake256, pub,
+ &ctx,
+ k2, length, msg, signature, scratch_out);
+
+ gmp_free_limbs (scratch, itch);
+#undef k1
+#undef k2
+#undef scratch_out
+}
diff --git a/ed448-shake256-verify.c b/ed448-shake256-verify.c
new file mode 100644
index 00000000..4081abc3
--- /dev/null
+++ b/ed448-shake256-verify.c
@@ -0,0 +1,66 @@
+/* ed448-shake256-verify.c
+
+ Copyright (C) 2017 Daiki Ueno
+ Copyright (C) 2017 Red Hat, Inc.
+
+ This file is part of GNU Nettle.
+
+ GNU Nettle is free software: you can redistribute it and/or
+ modify it under the terms of either:
+
+ * the GNU Lesser General Public License as published by the Free
+ Software Foundation; either version 3 of the License, or (at your
+ option) any later version.
+
+ or
+
+ * the GNU General Public License as published by the Free
+ Software Foundation; either version 2 of the License, or (at your
+ option) any later version.
+
+ or both in parallel, as here.
+
+ GNU Nettle is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received copies of the GNU General Public License and
+ the GNU Lesser General Public License along with this program. If
+ not, see http://www.gnu.org/licenses/.
+*/
+
+#if HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <string.h>
+
+#include "eddsa.h"
+
+#include "ecc-internal.h"
+#include "sha3.h"
+
+int
+ed448_shake256_verify (const uint8_t *pub,
+ size_t length, const uint8_t *msg,
+ const uint8_t *signature)
+{
+ const struct ecc_curve *ecc = &_nettle_curve448;
+ mp_size_t itch = 3*ecc->p.size + _eddsa_verify_itch (ecc);
+ mp_limb_t *scratch = gmp_alloc_limbs (itch);
+ struct shake256_ctx ctx;
+ int res;
+#define A scratch
+#define scratch_out (scratch + 3*ecc->p.size)
+ res = (_eddsa_decompress (ecc,
+ A, pub, scratch_out)
+ && _eddsa_verify (ecc, &nettle_shake256,
+ pub, A, &ctx,
+ length, msg, signature,
+ scratch_out));
+ gmp_free_limbs (scratch, itch);
+ return res;
+#undef A
+#undef scratch_out
+}
diff --git a/eddsa-compress.c b/eddsa-compress.c
index 40959586..2b36d3aa 100644
--- a/eddsa-compress.c
+++ b/eddsa-compress.c
@@ -33,6 +33,8 @@
# include "config.h"
#endif
+#include <assert.h>
+
#include "eddsa.h"
#include "ecc-internal.h"
@@ -48,15 +50,20 @@ void
_eddsa_compress (const struct ecc_curve *ecc, uint8_t *r, mp_limb_t *p,
mp_limb_t *scratch)
{
+ size_t nbytes;
+
#define xp scratch
#define yp (scratch + ecc->p.size)
#define scratch_out (scratch + 2*ecc->p.size)
+ assert (ecc->eddsa);
+
+ nbytes = 1 + (ecc->eddsa->b - 1) / 8;
ecc->h_to_a (ecc, 0, xp, p, scratch_out);
/* Encoding is the y coordinate and an appended "sign" bit, which is
the low bit of x. Bit order is not specified explicitly, but for
little-endian encoding, it makes most sense to append the bit
after the most significant bit of y. */
- mpn_get_base256_le (r, 1 + ecc->p.bit_size / 8, yp, ecc->p.size);
- r[ecc->p.bit_size / 8] += (xp[0] & 1) << (ecc->p.bit_size & 7);
+ mpn_get_base256_le (r, nbytes, yp, ecc->p.size);
+ r[nbytes - 1] += (xp[0] & 1) << ((ecc->eddsa->b - 1) & 7);
}
diff --git a/eddsa-decompress.c b/eddsa-decompress.c
index 75550168..75a38c0f 100644
--- a/eddsa-decompress.c
+++ b/eddsa-decompress.c
@@ -33,6 +33,8 @@
# include "config.h"
#endif
+#include <assert.h>
+
#include "eddsa.h"
#include "ecc-internal.h"
@@ -50,6 +52,7 @@ _eddsa_decompress (const struct ecc_curve *ecc, mp_limb_t *p,
mp_limb_t *scratch)
{
mp_limb_t sign, cy;
+ size_t bits;
int res;
#define xp p
@@ -61,17 +64,25 @@ _eddsa_decompress (const struct ecc_curve *ecc, mp_limb_t
*p,
#define tp (scratch + 2*ecc->p.size)
#define scratch_out (scratch + 4*ecc->p.size)
- sign = cp[ecc->p.bit_size / 8] >> (ecc->p.bit_size & 7);
+ assert (ecc->eddsa);
+
+ bits = ecc->eddsa->b - 1;
+ sign = cp[bits / 8] >> (bits & 7);
if (sign > 1)
return 0;
- mpn_set_base256_le (yp, ecc->p.size, cp, 1 + ecc->p.bit_size / 8);
+ mpn_set_base256_le (yp, ecc->p.size, cp, 1 + bits / 8);
/* Clear out the sign bit (if it fits) */
yp[ecc->p.size - 1] &= ~(mp_limb_t) 0
>> (ecc->p.size * GMP_NUMB_BITS - ecc->p.bit_size);
ecc_modp_sqr (ecc, y2, yp);
ecc_modp_mul (ecc, vp, y2, ecc->b);
ecc_modp_sub (ecc, vp, vp, ecc->unit);
- ecc_modp_sub (ecc, up, ecc->unit, y2);
+ /* The sign is different between curve25519 and curve448. */
+ /* FIXME: Define a suitable method in ecc_eddsa? */
+ if (ecc->p.bit_size == 255)
+ ecc_modp_sub (ecc, up, ecc->unit, y2);
+ else
+ ecc_modp_sub (ecc, up, y2, ecc->unit);
res = ecc->p.sqrt (&ecc->p, tp, up, vp, scratch_out);
cy = mpn_sub_n (xp, tp, ecc->p.m, ecc->p.size);
diff --git a/eddsa-expand.c b/eddsa-expand.c
index dc2bfaf1..3e39c8f7 100644
--- a/eddsa-expand.c
+++ b/eddsa-expand.c
@@ -52,18 +52,26 @@ _eddsa_expand_key (const struct ecc_curve *ecc,
uint8_t *digest,
mp_limb_t *k2)
{
- size_t nbytes = 1 + ecc->p.bit_size / 8;
+ size_t nbytes;
+ mp_size_t size;
- assert (H->digest_size >= 2*nbytes);
+ assert (ecc->eddsa);
+
+ nbytes = 1 + (ecc->eddsa->b - 1) / 8;
+ size = (ecc->eddsa->b - 1 + GMP_NUMB_BITS - 1) / 8;
H->init (ctx);
H->update (ctx, nbytes, key);
H->digest (ctx, 2*nbytes, digest);
- mpn_set_base256_le (k2, ecc->p.size, digest, nbytes);
- /* Clear low 3 bits */
- k2[0] &= ~(mp_limb_t) 7;
- /* Set bit number bit_size - 1 (bit 254 for curve25519) */
+ mpn_set_base256_le (k2, size, digest, nbytes);
+ /* FIXME: reduce k2 to ecc->p.size */
+
+ /* Clear low c bits */
+ k2[0] &= ~(mp_limb_t) ((1 << ecc->eddsa->c) - 1);
+
+ /* Set bit number bit_size - 1 (bit 254 for curve25519, bit 447 for
+ curve448) */
k2[(ecc->p.bit_size - 1) / GMP_NUMB_BITS]
|= (mp_limb_t) 1 << ((ecc->p.bit_size - 1) % GMP_NUMB_BITS);
/* Clear any higher bits. */
diff --git a/eddsa-hash.c b/eddsa-hash.c
index 4fb79f1b..a8d50815 100644
--- a/eddsa-hash.c
+++ b/eddsa-hash.c
@@ -49,3 +49,38 @@ _eddsa_hash (const struct ecc_modulo *m,
mpn_set_base256_le (rp, 2*m->size, digest, 2*nbytes);
m->mod (m, rp);
}
+
+void
+_eddsa_sized_hash (const struct ecc_modulo *m,
+ mp_size_t bits,
+ mp_limb_t *rp,
+ const uint8_t *digest)
+{
+ size_t nbytes = 1 + (bits - 1) / 8;
+ mp_size_t rn = (bits - 1 + GMP_NUMB_BITS - 1) / GMP_NUMB_BITS;
+ mp_size_t i;
+
+ mpn_set_base256_le (rp, 2*rn, digest, 2*nbytes);
+
+ /* Special case for Ed448: reduce rp to 2*m->size limbs.
+ After decoding rp from a hash of size 2*rn:
+
+ rp = XX || r0 || r1
+
+ where r0 and r1 have m->size limbs. Reduce this to:
+
+ rp = r0' || r1
+
+ where r0' has m->size limbs. */
+ for (i = 0; i < 2*(rn - m->size); i++)
+ {
+ mp_limb_t hi;
+ hi = mpn_addmul_1 (rp + m->size + i, m->B, m->B_size,
+ rp[2*m->size + i]);
+ assert (hi <= 1);
+ hi = cnd_add_n (hi, rp + m->size + i, m->B, m->size);
+ /* Sufficient roughly if b < B^size / p */
+ assert (hi == 0);
+ }
+ m->mod (m, rp);
+}
diff --git a/eddsa-pubkey.c b/eddsa-pubkey.c
index d1546707..55ca3a83 100644
--- a/eddsa-pubkey.c
+++ b/eddsa-pubkey.c
@@ -40,7 +40,7 @@
mp_size_t
_eddsa_public_key_itch (const struct ecc_curve *ecc)
{
- return 3*ecc->p.size + ecc->mul_g_itch;
+ return 3*ecc->p.size + ECC_MAX(ecc->mul_g_itch, _eddsa_compress_itch (ecc));
}
void
diff --git a/eddsa-sign.c b/eddsa-sign.c
index e5dc0e9d..23cca06e 100644
--- a/eddsa-sign.c
+++ b/eddsa-sign.c
@@ -44,7 +44,7 @@
mp_size_t
_eddsa_sign_itch (const struct ecc_curve *ecc)
{
- return 5*ecc->p.size + ecc->mul_g_itch;
+ return 7*ecc->p.size + ECC_MAX(ecc->mul_g_itch, _eddsa_compress_itch (ecc));
}
void
@@ -67,22 +67,24 @@ _eddsa_sign (const struct ecc_curve *ecc,
#define hash ((uint8_t *) (scratch + 3*size))
#define scratch_out (scratch + 5*size)
- size = ecc->p.size;
- nbytes = 1 + ecc->p.bit_size / 8;
+ assert (ecc->eddsa);
- assert (H->digest_size >= 2 * nbytes);
+ size = (ecc->eddsa->b - 1 + GMP_NUMB_BITS - 1) / GMP_NUMB_BITS;
+ nbytes = 1 + (ecc->eddsa->b - 1) / 8;
H->update (ctx, length, msg);
H->digest (ctx, 2*nbytes, hash);
- _eddsa_hash (&ecc->q, rp, hash);
+ _eddsa_sized_hash (&ecc->q, ecc->eddsa->b, rp, hash);
+
ecc->mul_g (ecc, P, rp, scratch_out);
_eddsa_compress (ecc, signature, P, scratch_out);
+ ecc->eddsa->dom (0, 0, "", H, ctx);
H->update (ctx, nbytes, signature);
H->update (ctx, nbytes, pub);
H->update (ctx, length, msg);
H->digest (ctx, 2*nbytes, hash);
- _eddsa_hash (&ecc->q, hp, hash);
+ _eddsa_sized_hash (&ecc->q, ecc->eddsa->b, hp, hash);
ecc_modq_mul (ecc, sp, hp, k2);
ecc_modq_add (ecc, sp, sp, rp); /* FIXME: Can be plain add */
@@ -91,7 +93,7 @@ _eddsa_sign (const struct ecc_curve *ecc,
{
unsigned shift;
mp_limb_t cy;
- assert (ecc->p.bit_size == 255);
+ assert (ecc->p.bit_size == 255 || ecc->p.bit_size == 448);
shift = ecc->q.bit_size - 1 - GMP_NUMB_BITS * (ecc->p.size - 1);
cy = mpn_submul_1 (sp, ecc->q.m, ecc->p.size,
sp[ecc->p.size-1] >> shift);
diff --git a/eddsa-verify.c b/eddsa-verify.c
index 5541d975..3add4325 100644
--- a/eddsa-verify.c
+++ b/eddsa-verify.c
@@ -69,7 +69,7 @@ equal_h (const struct ecc_modulo *p,
mp_size_t
_eddsa_verify_itch (const struct ecc_curve *ecc)
{
- return 8*ecc->p.size + ecc->mul_itch;
+ return 8*ecc->p.size + ECC_MAX(ecc->mul_itch, _eddsa_decompress_itch (ecc));
}
int
@@ -83,6 +83,7 @@ _eddsa_verify (const struct ecc_curve *ecc,
const uint8_t *signature,
mp_limb_t *scratch)
{
+ mp_size_t size;
size_t nbytes;
#define R scratch
#define sp (scratch + 2*ecc->p.size)
@@ -92,28 +93,33 @@ _eddsa_verify (const struct ecc_curve *ecc,
#define S R
#define hash ((uint8_t *) P)
- nbytes = 1 + ecc->p.bit_size / 8;
+ assert (ecc->eddsa);
+
+ size = (ecc->eddsa->b - 1 + GMP_NUMB_BITS - 1) / GMP_NUMB_BITS;
+ nbytes = 1 + (ecc->eddsa->b - 1) / 8;
/* Could maybe save some storage by delaying the R and S operations,
but it makes sense to check them for validity up front. */
if (!_eddsa_decompress (ecc, R, signature, R+2*ecc->p.size))
return 0;
- mpn_set_base256_le (sp, ecc->q.size, signature + nbytes, nbytes);
+ mpn_set_base256_le (sp, size, signature + nbytes, nbytes);
+
/* Check that s < q */
if (mpn_cmp (sp, ecc->q.m, ecc->q.size) >= 0)
return 0;
H->init (ctx);
+ ecc->eddsa->dom (0, 0, "", H, ctx);
H->update (ctx, nbytes, signature);
H->update (ctx, nbytes, pub);
H->update (ctx, length, msg);
H->digest (ctx, 2*nbytes, hash);
- _eddsa_hash (&ecc->q, hp, hash);
+ _eddsa_sized_hash (&ecc->q, ecc->eddsa->b, hp, hash);
/* Compute h A + R - s G, which should be the neutral point */
ecc->mul (ecc, P, hp, A, scratch_out);
- ecc_add_eh (ecc, P, P, R, scratch_out);
+ ecc->add_hh (ecc, P, P, R, scratch_out);
/* Move out of the way. */
mpn_copyi (hp, sp, ecc->q.size);
ecc->mul_g (ecc, S, hp, scratch_out);
diff --git a/eddsa.h b/eddsa.h
index 49f1a025..542532dc 100644
--- a/eddsa.h
+++ b/eddsa.h
@@ -45,12 +45,16 @@ extern "C" {
#define ed25519_sha512_public_key nettle_ed25519_sha512_public_key
#define ed25519_sha512_sign nettle_ed25519_sha512_sign
#define ed25519_sha512_verify nettle_ed25519_sha512_verify
+#define ed448_shake256_public_key nettle_ed448_shake256_public_key
+#define ed448_shake256_sign nettle_ed448_shake256_sign
+#define ed448_shake256_verify nettle_ed448_shake256_verify
#define _eddsa_compress _nettle_eddsa_compress
#define _eddsa_compress_itch _nettle_eddsa_compress_itch
#define _eddsa_decompress _nettle_eddsa_decompress
#define _eddsa_decompress_itch _nettle_eddsa_decompress_itch
#define _eddsa_hash _nettle_eddsa_hash
+#define _eddsa_sized_hash _nettle_eddsa_sized_hash
#define _eddsa_expand_key _nettle_eddsa_expand_key
#define _eddsa_sign _nettle_eddsa_sign
#define _eddsa_sign_itch _nettle_eddsa_sign_itch
@@ -61,6 +65,8 @@ extern "C" {
#define ED25519_KEY_SIZE 32
#define ED25519_SIGNATURE_SIZE 64
+#define ED448_KEY_SIZE 57
+#define ED448_SIGNATURE_SIZE 114
void
ed25519_sha512_public_key (uint8_t *pub, const uint8_t *priv);
@@ -76,6 +82,20 @@ ed25519_sha512_verify (const uint8_t *pub,
size_t length, const uint8_t *msg,
const uint8_t *signature);
+void
+ed448_shake256_public_key (uint8_t *pub, const uint8_t *priv);
+
+void
+ed448_shake256_sign (const uint8_t *pub,
+ const uint8_t *priv,
+ size_t length, const uint8_t *msg,
+ uint8_t *signature);
+
+int
+ed448_shake256_verify (const uint8_t *pub,
+ size_t length, const uint8_t *msg,
+ const uint8_t *signature);
+
/* Low-level internal functions */
struct ecc_curve;
@@ -98,6 +118,10 @@ void
_eddsa_hash (const struct ecc_modulo *m,
mp_limb_t *rp, const uint8_t *digest);
+void
+_eddsa_sized_hash (const struct ecc_modulo *m,
+ mp_size_t bits, mp_limb_t *rp, const uint8_t *digest);
+
mp_size_t
_eddsa_sign_itch (const struct ecc_curve *ecc);
diff --git a/nettle.texinfo b/nettle.texinfo
index 20adc0e6..e32d348a 100644
--- a/nettle.texinfo
+++ b/nettle.texinfo
@@ -4585,6 +4585,31 @@ Verifies a message using the provided public key.
Returns 1 if the
signature is valid, otherwise 0.
@end deftypefun
+Nettle also provides Ed448, an EdDSA signature scheme based on an
+Edwards curve equivalent to curve448.
+
+@defvr Constant ED448_KEY_SIZE
+The size of a private or public Ed448 key, 57 octets.
+@end defvr
+
+@defvr Constant ED448_SIGNATURE_SIZE
+The size of an Ed448 signature, 114 octets.
+@end defvr
+
+@deftypefun void ed448_shake256_public_key (uint8_t *@var{pub}, const uint8_t
*@var{priv})
+Computes the public key corresponding to the given private key. Both
+input and output are of size @code{ED448_KEY_SIZE}.
+@end deftypefun
+
+@deftypefun void ed448_shake256_sign (const uint8_t *@var{pub}, const uint8_t
*@var{priv}, size_t @var{length}, const uint8_t *@var{msg}, uint8_t
*@var{signature})
+Signs a message using the provided key pair.
+@end deftypefun
+
+@deftypefun int ed448_shake256_verify (const uint8_t *@var{pub}, size_t
@var{length}, const uint8_t *@var{msg}, const uint8_t *@var{signature})
+Verifies a message using the provided public key. Returns 1 if the
+signature is valid, otherwise 0.
+@end deftypefun
+
@node Randomness, ASCII encoding, Public-key algorithms, Reference
@comment node-name, next, previous, up
@section Randomness
diff --git a/testsuite/.test-rules.make b/testsuite/.test-rules.make
index 5b48dadc..d96c4712 100644
--- a/testsuite/.test-rules.make
+++ b/testsuite/.test-rules.make
@@ -265,6 +265,9 @@ eddsa-verify-test$(EXEEXT): eddsa-verify-test.$(OBJEXT)
ed25519-test$(EXEEXT): ed25519-test.$(OBJEXT)
$(LINK) ed25519-test.$(OBJEXT) $(TEST_OBJS) -o ed25519-test$(EXEEXT)
+ed448-test$(EXEEXT): ed448-test.$(OBJEXT)
+ $(LINK) ed448-test.$(OBJEXT) $(TEST_OBJS) -o ed448-test$(EXEEXT)
+
sha1-huge-test$(EXEEXT): sha1-huge-test.$(OBJEXT)
$(LINK) sha1-huge-test.$(OBJEXT) $(TEST_OBJS) -o sha1-huge-test$(EXEEXT)
diff --git a/testsuite/Makefile.in b/testsuite/Makefile.in
index cbcc3fd3..e0d141e0 100644
--- a/testsuite/Makefile.in
+++ b/testsuite/Makefile.in
@@ -48,7 +48,7 @@ TS_HOGWEED_SOURCES = sexp-test.c sexp-format-test.c \
ecdsa-sign-test.c ecdsa-verify-test.c \
ecdsa-keygen-test.c ecdh-test.c \
eddsa-compress-test.c eddsa-sign-test.c \
- eddsa-verify-test.c ed25519-test.c
+ eddsa-verify-test.c ed25519-test.c ed448-test.c
TS_SOURCES = $(TS_NETTLE_SOURCES) $(TS_HOGWEED_SOURCES)
CXX_SOURCES = cxx-test.cxx
diff --git a/testsuite/ed448-test.c b/testsuite/ed448-test.c
new file mode 100644
index 00000000..56dc6277
--- /dev/null
+++ b/testsuite/ed448-test.c
@@ -0,0 +1,240 @@
+/* ed448-test.c
+
+ Copyright (C) 2017 Daiki Ueno
+ Copyright (C) 2017 Red Hat, Inc.
+
+ This file is part of GNU Nettle.
+
+ GNU Nettle is free software: you can redistribute it and/or
+ modify it under the terms of either:
+
+ * the GNU Lesser General Public License as published by the Free
+ Software Foundation; either version 3 of the License, or (at your
+ option) any later version.
+
+ or
+
+ * the GNU General Public License as published by the Free
+ Software Foundation; either version 2 of the License, or (at your
+ option) any later version.
+
+ or both in parallel, as here.
+
+ GNU Nettle is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received copies of the GNU General Public License and
+ the GNU Lesser General Public License along with this program. If
+ not, see http://www.gnu.org/licenses/.
+*/
+
+#include "testutils.h"
+
+#include <errno.h>
+
+#include "eddsa.h"
+
+#include "base16.h"
+
+static void
+decode_hex (size_t length, uint8_t *dst, const char *src)
+{
+ struct base16_decode_ctx ctx;
+ size_t out_size;
+ base16_decode_init (&ctx);
+ ASSERT (base16_decode_update (&ctx, &out_size, dst, 2*length, src));
+ ASSERT (out_size == length);
+ ASSERT (base16_decode_final (&ctx));
+}
+
+/* Processes a single line in the format of
+ http://ed25519.cr.yp.to/python/sign.input:
+
+ sk pk : pk : m : s m :
+
+ where sk (secret key) and pk (public key) are 57 bytes each, m is
+ variable size, and s is 114 bytes. All values hex encoded.
+*/
+static void
+test_one (const char *line)
+{
+ const char *p;
+ const char *mp;
+ uint8_t sk[ED448_KEY_SIZE];
+ uint8_t pk[ED448_KEY_SIZE];
+ uint8_t t[ED448_KEY_SIZE];
+ uint8_t s[ED448_SIGNATURE_SIZE];
+ uint8_t *msg;
+ size_t msg_size;
+ uint8_t s2[ED448_SIGNATURE_SIZE];
+
+ decode_hex (ED448_KEY_SIZE, sk, line);
+
+ p = strchr (line, ':');
+ ASSERT (p == line + 228);
+ p++;
+ decode_hex (ED448_KEY_SIZE, pk, p);
+ p = strchr (p, ':');
+ ASSERT (p == line + 343);
+ mp = ++p;
+ p = strchr (p, ':');
+ ASSERT (p);
+ ASSERT ((p - mp) % 2 == 0);
+ msg_size = (p - mp) / 2;
+
+ decode_hex (ED448_SIGNATURE_SIZE, s, p+1);
+
+ msg = xalloc (msg_size + 1);
+ msg[msg_size] = 'x';
+
+ decode_hex (msg_size, msg, mp);
+
+ ed448_shake256_public_key (t, sk);
+ ASSERT (MEMEQ(ED448_KEY_SIZE, t, pk));
+
+ ed448_shake256_sign (pk, sk, msg_size, msg, s2);
+ ASSERT (MEMEQ (ED448_SIGNATURE_SIZE, s, s2));
+
+ ASSERT (ed448_shake256_verify (pk, msg_size, msg, s));
+
+ s2[ED448_SIGNATURE_SIZE/3] ^= 0x40;
+ ASSERT (!ed448_shake256_verify (pk, msg_size, msg, s2));
+
+ memcpy (s2, s, ED448_SIGNATURE_SIZE);
+ s2[2*ED448_SIGNATURE_SIZE/3] ^= 0x40;
+ ASSERT (!ed448_shake256_verify (pk, msg_size, msg, s2));
+
+ ASSERT (!ed448_shake256_verify (pk, msg_size + 1, msg, s));
+
+ if (msg_size > 0)
+ {
+ msg[msg_size-1] ^= 0x20;
+ ASSERT (!ed448_shake256_verify (pk, msg_size, msg, s));
+ }
+ free (msg);
+}
+
+#ifndef HAVE_GETLINE
+static ssize_t
+getline(char **lineptr, size_t *n, FILE *f)
+{
+ size_t i;
+ int c;
+ if (!*lineptr)
+ {
+ *n = 500;
+ *lineptr = xalloc (*n);
+ }
+
+ i = 0;
+ do
+ {
+ c = getc(f);
+ if (c < 0)
+ {
+ if (i > 0)
+ break;
+ return -1;
+ }
+
+ (*lineptr) [i++] = c;
+ if (i == *n)
+ {
+ *n *= 2;
+ *lineptr = realloc (*lineptr, *n);
+ if (!*lineptr)
+ die ("Virtual memory exhausted.\n");
+ }
+ } while (c != '\n');
+
+ (*lineptr) [i] = 0;
+ return i;
+}
+#endif
+
+void
+test_main(void)
+{
+ const char *input = getenv ("ED448_SIGN_INPUT");
+ if (input)
+ {
+ size_t buf_size;
+ char *buf;
+ FILE *f = fopen (input, "r");
+ if (!f)
+ die ("Opening input file '%s' failed: %s\n",
+ input, strerror (errno));
+
+ for (buf = NULL; getline (&buf, &buf_size, f) >= 0; )
+ test_one (buf);
+
+ free (buf);
+ fclose (f);
+ }
+ else
+ {
+ /* Test vectors from RFC 8032. */
+ /* Blank */
+ test_one
("6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f63c9960ef6e348a3528c8a3fcc2f044e39a3fc5b94492f8f032e7549a20098f95b"
+
"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180:"
+
"5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180:"
+ ":"
+
"533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600"
+ ":");
+ /* 1 octet */
+ test_one
("c4eab05d357007c632f3dbb48489924d552b08fe0c353a0d4a1f00acda2c463afbea67c5e8d2877c5e3bc397a659949ef8021e954e0a12274e"
+
"43ba28f430cdff456ae531545f7ecd0ac834a55d9358c0372bfa0c6c6798c0866aea01eb00742802b8438ea4cb82169c235160627b4c3a9480:"
+
"43ba28f430cdff456ae531545f7ecd0ac834a55d9358c0372bfa0c6c6798c0866aea01eb00742802b8438ea4cb82169c235160627b4c3a9480:"
+ "03:"
+
"26b8f91727bd62897af15e41eb43c377efb9c610d48f2335cb0bd0087810f4352541b143c4b981b7e18f62de8ccdf633fc1bf037ab7cd779805e0dbcc0aae1cbcee1afb2e027df36bc04dcecbf154336c19f0af7e0a6472905e799f1953d2a0ff3348ab21aa4adafd1d234441cf807c03a00"
+ "03:");
+ /* 11 octets */
+ test_one
("cd23d24f714274e744343237b93290f511f6425f98e64459ff203e8985083ffdf60500553abc0e05cd02184bdb89c4ccd67e187951267eb328"
+
"dcea9e78f35a1bf3499a831b10b86c90aac01cd84b67a0109b55a36e9328b1e365fce161d71ce7131a543ea4cb5f7e9f1d8b00696447001400:"
+
"dcea9e78f35a1bf3499a831b10b86c90aac01cd84b67a0109b55a36e9328b1e365fce161d71ce7131a543ea4cb5f7e9f1d8b00696447001400:"
+ "0c3e544074ec63b0265e0c:"
+
"1f0a8888ce25e8d458a21130879b840a9089d999aaba039eaf3e3afa090a09d389dba82c4ff2ae8ac5cdfb7c55e94d5d961a29fe0109941e00b8dbdeea6d3b051068df7254c0cdc129cbe62db2dc957dbb47b51fd3f213fb8698f064774250a5028961c9bf8ffd973fe5d5c206492b140e00"
+ "0c3e544074ec63b0265e0c:");
+ /* 12 octets */
+ test_one
("258cdd4ada32ed9c9ff54e63756ae582fb8fab2ac721f2c8e676a72768513d939f63dddb55609133f29adf86ec9929dccb52c1c5fd2ff7e21b"
+
"3ba16da0c6f2cc1f30187740756f5e798d6bc5fc015d7c63cc9510ee3fd44adc24d8e968b6e46e6f94d19b945361726bd75e149ef09817f580:"
+
"3ba16da0c6f2cc1f30187740756f5e798d6bc5fc015d7c63cc9510ee3fd44adc24d8e968b6e46e6f94d19b945361726bd75e149ef09817f580:"
+ "64a65f3cdedcdd66811e2915:"
+
"7eeeab7c4e50fb799b418ee5e3197ff6bf15d43a14c34389b59dd1a7b1b85b4ae90438aca634bea45e3a2695f1270f07fdcdf7c62b8efeaf00b45c2c96ba457eb1a8bf075a3db28e5c24f6b923ed4ad747c3c9e03c7079efb87cb110d3a99861e72003cbae6d6b8b827e4e6c143064ff3c00"
+ "64a65f3cdedcdd66811e2915:");
+ /* 13 octets */
+ test_one
("7ef4e84544236752fbb56b8f31a23a10e42814f5f55ca037cdcc11c64c9a3b2949c1bb60700314611732a6c2fea98eebc0266a11a93970100e"
+
"b3da079b0aa493a5772029f0467baebee5a8112d9d3a22532361da294f7bb3815c5dc59e176b4d9f381ca0938e13c6c07b174be65dfa578e80:"
+
"b3da079b0aa493a5772029f0467baebee5a8112d9d3a22532361da294f7bb3815c5dc59e176b4d9f381ca0938e13c6c07b174be65dfa578e80:"
+ "64a65f3cdedcdd66811e2915e7:"
+
"6a12066f55331b6c22acd5d5bfc5d71228fbda80ae8dec26bdd306743c5027cb4890810c162c027468675ecf645a83176c0d7323a2ccde2d80efe5a1268e8aca1d6fbc194d3f77c44986eb4ab4177919ad8bec33eb47bbb5fc6e28196fd1caf56b4e7e0ba5519234d047155ac727a1053100"
+ "64a65f3cdedcdd66811e2915e7:");
+ /* 64 octets */
+ test_one
("d65df341ad13e008567688baedda8e9dcdc17dc024974ea5b4227b6530e339bff21f99e68ca6968f3cca6dfe0fb9f4fab4fa135d5542ea3f01"
+
"df9705f58edbab802c7f8363cfe5560ab1c6132c20a9f1dd163483a26f8ac53a39d6808bf4a1dfbd261b099bb03b3fb50906cb28bd8a081f00:"
+
"df9705f58edbab802c7f8363cfe5560ab1c6132c20a9f1dd163483a26f8ac53a39d6808bf4a1dfbd261b099bb03b3fb50906cb28bd8a081f00:"
+
"bd0f6a3747cd561bdddf4640a332461a4a30a12a434cd0bf40d766d9c6d458e5512204a30c17d1f50b5079631f64eb3112182da3005835461113718d1a5ef944:"
+
"554bc2480860b49eab8532d2a533b7d578ef473eeb58c98bb2d0e1ce488a98b18dfde9b9b90775e67f47d4a1c3482058efc9f40d2ca033a0801b63d45b3b722ef552bad3b4ccb667da350192b61c508cf7b6b5adadc2c8d9a446ef003fb05cba5f30e88e36ec2703b349ca229c2670833900"
+
"bd0f6a3747cd561bdddf4640a332461a4a30a12a434cd0bf40d766d9c6d458e5512204a30c17d1f50b5079631f64eb3112182da3005835461113718d1a5ef944:");
+ /* 256 octets */
+ test_one
("2ec5fe3c17045abdb136a5e6a913e32ab75ae68b53d2fc149b77e504132d37569b7e766ba74a19bd6162343a21c8590aa9cebca9014c636df5"
+
"79756f014dcfe2079f5dd9e718be4171e2ef2486a08f25186f6bff43a9936b9bfe12402b08ae65798a3d81e22e9ec80e7690862ef3d4ed3a00:"
+
"79756f014dcfe2079f5dd9e718be4171e2ef2486a08f25186f6bff43a9936b9bfe12402b08ae65798a3d81e22e9ec80e7690862ef3d4ed3a00:"
+
"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:"
+
"c650ddbb0601c19ca11439e1640dd931f43c518ea5bea70d3dcde5f4191fe53f00cf966546b72bcc7d58be2b9badef28743954e3a44a23f880e8d4f1cfce2d7a61452d26da05896f0a50da66a239a8a188b6d825b3305ad77b73fbac0836ecc60987fd08527c1a8e80d5823e65cafe2a3d00"
+
"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:");
+ /* 1023 octets */
+ test_one
("872d093780f5d3730df7c212664b37b8a0f24f56810daa8382cd4fa3f77634ec44dc54f1c2ed9bea86fafb7632d8be199ea165f5ad55dd9ce8"
+
"a81b2e8a70a5ac94ffdbcc9badfc3feb0801f258578bb114ad44ece1ec0e799da08effb81c5d685c0c56f64eecaef8cdf11cc38737838cf400:"
+
"a81b2e8a70a5ac94ffdbcc9badfc3feb0801f258578bb114ad44ece1ec0e799da08effb81c5d685c0c56f64eecaef8cdf11cc38737838cf400:"
+
"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"
+
"06d1526c1af3ca6d9cf5a2c98f47e1c46db9a33234cfd4d81f2c98538a09ebe76998d0d8fd25997c7d255c6d66ece6fa56f11144950f027795e653008f4bd7ca2dee85d8e90f3dc315130ce2a00375a318c7c3d97be2c8ce5b6db41a6254ff264fa6155baee3b0773c0f497c573f19bb4f4240281f0b1f4f7be857a4e59d416c06b4c50fa09e1810ddc6b1467baeac5a3668d11b6ecaa901440016f389f80acc4db977025e7f5924388c7e340a732e554440e76570f8dd71b7d640b3450d1fd5f0410a18f9a3494f707c717b79b4bf75c98400b096b21653b5d217cf3565c9597456f70703497a078763829bc01bb1cbc8fa04eadc9a6e3f6699587a9e75c94e5bab0036e0b2e711392cff0047d0d6b05bd2a588bc109718954259f1d86678a579a3120f19cfb2963f177aeb70f2d4844826262e51b80271272068ef5b3856fa8535aa2a88b2d41f2a0e2fda7624c2850272ac4a2f561f8f2f7a318bfd5c"
+
"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:"
+
"e301345a41a39a4d72fff8df69c98075a0cc082b802fc9b2b6bc503f926b65bddf7f4c8f1cb49f6396afc8a70abe6d8aef0db478d4c6b2970076c6a0484fe76d76b3a97625d79f1ce240e7c576750d295528286f719b413de9ada3e8eb78ed573603ce30d8bb761785dc30dbc320869e1a00"
+
"6ddf802e1aae4986935f7f981ba3f0351d6273c0a0c22c9c0e8339168e675412a3debfaf435ed651558007db4384b650fcc07e3b586a27a4f7a00ac8a6fec2cd86ae4bf1570c41e6a40c931db27b2faa15a8cedd52cff7362c4e6e23daec0fbc3a79b6806e316efcc7b68119bf46bc76a26067a53f296dafdbdc11c77f7777e972660cf4b6a9b369a6665f02e0cc9b6edfad136b4fabe723d2813db3136cfde9b6d044322fee2947952e031b73ab5c603349b307bdc27bc6cb8b8bbd7bd323219b8033a581b59eadebb09b3c4f3d2277d4f0343624acc817804728b25ab797172b4c5c21a22f9c7839d64300232eb66e53f31c723fa37fe387c7d3e50bdf9813a30e5bb12cf4cd930c40cfb4e1fc622592a49588794494d56d24ea4b40c89fc0596cc9ebb961c8cb10adde976a5d602b1c3f85b9b9a001ed3c6a4d3b1437f52096cd1956d042a597d561a596ecd3d1735a8d570ea0ec27225a2c4aaff263"
+
"06d1526c1af3ca6d9cf5a2c98f47e1c46db9a33234cfd4d81f2c98538a09ebe76998d0d8fd25997c7d255c6d66ece6fa56f11144950f027795e653008f4bd7ca2dee85d8e90f3dc315130ce2a00375a318c7c3d97be2c8ce5b6db41a6254ff264fa6155baee3b0773c0f497c573f19bb4f4240281f0b1f4f7be857a4e59d416c06b4c50fa09e1810ddc6b1467baeac5a3668d11b6ecaa901440016f389f80acc4db977025e7f5924388c7e340a732e554440e76570f8dd71b7d640b3450d1fd5f0410a18f9a3494f707c717b79b4bf75c98400b096b21653b5d217cf3565c9597456f70703497a078763829bc01bb1cbc8fa04eadc9a6e3f6699587a9e75c94e5bab0036e0b2e711392cff0047d0d6b05bd2a588bc109718954259f1d86678a579a3120f19cfb2963f177aeb70f2d4844826262e51b80271272068ef5b3856fa8535aa2a88b2d41f2a0e2fda7624c2850272ac4a2f561f8f2f7a318bfd5c"
+
"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:");
+ }
+}
diff --git a/testsuite/eddsa-compress-test.c b/testsuite/eddsa-compress-test.c
index 9ceb6fe9..834be212 100644
--- a/testsuite/eddsa-compress-test.c
+++ b/testsuite/eddsa-compress-test.c
@@ -37,76 +37,87 @@
void test_main (void)
{
- const struct ecc_curve *ecc = &_nettle_curve25519;
gmp_randstate_t rands;
- mp_size_t size, itch;
- mpz_t zp, t;
- mp_limb_t *s;
- mp_limb_t *p;
- mp_limb_t *pa1;
- mp_limb_t *pa2;
- mp_limb_t *scratch;
- size_t clen;
- uint8_t *c;
- unsigned j;
+ unsigned i, j;
gmp_randinit_default (rands);
- size = ecc_size (ecc);
- clen = 1 + ecc->p.bit_size / 8;
-
- mpz_roinit_n (zp, ecc->p.m, size);
-
- mpz_init (t);
- s = xalloc_limbs (size);
- p = xalloc_limbs (ecc_size_j (ecc));
- pa1 = xalloc_limbs (ecc_size_a (ecc));
- pa2 = xalloc_limbs (ecc_size_a (ecc));
- c = xalloc (clen);
-
- itch = _eddsa_decompress_itch (ecc);
- if (itch < ecc->mul_g_itch)
- itch = ecc->mul_g_itch;
-
- scratch = xalloc_limbs (itch);
-
- for (j = 0; j < COUNT; j++)
+ for (i = 0; ecc_curves[i]; i++)
{
- mpz_t x1, y1, x2, y2;
-
- mpz_urandomb (t, rands, ecc->q.bit_size);
- mpz_limbs_copy (s, t, ecc->q.size);
- ecc->mul_g (ecc, p, s, scratch);
- _eddsa_compress (ecc, c, p, scratch);
- ecc->h_to_a (ecc, 0, pa1, p, scratch);
- _eddsa_decompress (ecc, pa2, c, scratch);
- mpz_roinit_n (x1, pa1, size);
- mpz_roinit_n (y1, pa1 + size, size);
- mpz_roinit_n (x2, pa2, size);
- mpz_roinit_n (y2, pa2 + size, size);
- if (!(mpz_congruent_p (x1, x2, zp)
- && mpz_congruent_p (y1, y2, zp)))
+ const struct ecc_curve *ecc = ecc_curves[i];
+ mp_size_t size, itch;
+ mpz_t zp, t;
+ mp_limb_t *s;
+ mp_limb_t *p;
+ mp_limb_t *pa1;
+ mp_limb_t *pa2;
+ mp_limb_t *scratch;
+ size_t clen;
+ uint8_t *c;
+
+ if (!(ecc->p.bit_size == 255 || ecc->p.bit_size == 448))
+ continue;
+
+ if (!ecc->eddsa)
+ abort ();
+
+ size = ecc_size (ecc);
+ clen = 1 + (ecc->eddsa->b - 1) / 8;
+
+ mpz_roinit_n (zp, ecc->p.m, size);
+
+ mpz_init (t);
+ s = xalloc_limbs (size);
+ p = xalloc_limbs (ecc_size_j (ecc));
+ pa1 = xalloc_limbs (ecc_size_a (ecc));
+ pa2 = xalloc_limbs (ecc_size_a (ecc));
+ c = xalloc (clen);
+
+ itch = _eddsa_decompress_itch (ecc);
+ if (itch < ecc->mul_g_itch)
+ itch = ecc->mul_g_itch;
+
+ scratch = xalloc_limbs (itch);
+
+ for (j = 0; j < COUNT; j++)
{
- fprintf (stderr, "eddsa compression failed:\nc = ");
- print_hex (clen, c);
- fprintf (stderr, "\np1 = 0x");
- mpz_out_str (stderr, 16, x1);
- fprintf (stderr, ",\n 0x");
- mpz_out_str (stderr, 16, y1);
- fprintf (stderr, "\np2 = 0x");
- mpz_out_str (stderr, 16, x2);
- fprintf (stderr, ",\n 0x");
- mpz_out_str (stderr, 16, y2);
- fprintf (stderr, "\n");
- abort ();
+ mpz_t x1, y1, x2, y2;
+
+ mpz_urandomb (t, rands, ecc->q.bit_size);
+ mpz_limbs_copy (s, t, ecc->q.size);
+ ecc->mul_g (ecc, p, s, scratch);
+ _eddsa_compress (ecc, c, p, scratch);
+ ecc->h_to_a (ecc, 0, pa1, p, scratch);
+ _eddsa_decompress (ecc, pa2, c, scratch);
+ mpz_roinit_n (x1, pa1, size);
+ mpz_roinit_n (y1, pa1 + size, size);
+ mpz_roinit_n (x2, pa2, size);
+ mpz_roinit_n (y2, pa2 + size, size);
+ if (!(mpz_congruent_p (x1, x2, zp)
+ && mpz_congruent_p (y1, y2, zp)))
+ {
+ fprintf (stderr, "eddsa compression failed:\nc = ");
+ print_hex (clen, c);
+ fprintf (stderr, "\np1 = 0x");
+ mpz_out_str (stderr, 16, x1);
+ fprintf (stderr, ",\n 0x");
+ mpz_out_str (stderr, 16, y1);
+ fprintf (stderr, "\np2 = 0x");
+ mpz_out_str (stderr, 16, x2);
+ fprintf (stderr, ",\n 0x");
+ mpz_out_str (stderr, 16, y2);
+ fprintf (stderr, "\n");
+ abort ();
+ }
}
+ mpz_clear (t);
+ free (s);
+ free (p);
+ free (c);
+ free (pa1);
+ free (pa2);
+ free (scratch);
}
- mpz_clear (t);
- free (s);
- free (p);
- free (c);
- free (pa1);
- free (pa2);
- free (scratch);
+
gmp_randclear (rands);
}
diff --git a/testsuite/eddsa-sign-test.c b/testsuite/eddsa-sign-test.c
index c496e6eb..b4471d16 100644
--- a/testsuite/eddsa-sign-test.c
+++ b/testsuite/eddsa-sign-test.c
@@ -42,13 +42,14 @@ test_eddsa_sign (const struct ecc_curve *ecc,
const struct tstring *ref)
{
mp_limb_t *scratch = xalloc_limbs (_eddsa_sign_itch (ecc));
- size_t nbytes = 1 + ecc->p.bit_size / 8;
+ mp_size_t size = (ecc->eddsa->b - 1 + GMP_NUMB_BITS - 1) / 8;
+ size_t nbytes = 1 + (ecc->eddsa->b - 1) / 8;
uint8_t *signature = xalloc (2*nbytes);
void *ctx = xalloc (H->context_size);
uint8_t *public_out = xalloc (nbytes);
uint8_t *digest = xalloc (2*nbytes);
const uint8_t *k1 = digest + nbytes;
- mp_limb_t *k2 = xalloc_limbs (ecc->p.size);
+ mp_limb_t *k2 = xalloc_limbs (size);
ASSERT (public->length == nbytes);
ASSERT (private->length == nbytes);
@@ -68,6 +69,8 @@ test_eddsa_sign (const struct ecc_curve *ecc,
fprintf (stderr, "\n");
abort ();
}
+
+ ecc->eddsa->dom (0, 0, "", H, ctx);
H->update (ctx, nbytes, k1);
_eddsa_sign (ecc, H, public->data, ctx, k2,
@@ -140,4 +143,63 @@ void test_main (void)
"99df1340cce54626 183144ef46887163"
"4b0a5c0033534108 e1c67c0dc99d3014"
"f01084e98c95e101 4b309b1dbb2e6704"));
+
+ /* Based on a few of the test vectors from RFC 8032 */
+ test_eddsa_sign (&_nettle_curve448, &nettle_shake256,
+ SHEX("5fd7449b59b461fd 2ce787ec616ad46a"
+ "1da1342485a70e1f 8a0ea75d80e96778"
+ "edf124769b46c706 1bd6783df1e50f6c"
+ "d1fa1abeafe82561 80"),
+ SHEX("6c82a562cb808d10 d632be89c8513ebf"
+ "6c929f34ddfa8c9f 63c9960ef6e348a3"
+ "528c8a3fcc2f044e 39a3fc5b94492f8f"
+ "032e7549a20098f9 5b"),
+ SHEX(""),
+ SHEX("533a37f6bbe45725 1f023c0d88f976ae"
+ "2dfb504a843e34d2 074fd823d41a591f"
+ "2b233f034f628281 f2fd7a22ddd47d78"
+ "28c59bd0a21bfd39 80ff0d2028d4b18a"
+ "9df63e006c5d1c2d 345b925d8dc00b41"
+ "04852db99ac5c7cd da8530a113a0f4db"
+ "b61149f05a736326 8c71d95808ff2e65"
+ "2600"));
+ test_eddsa_sign (&_nettle_curve448, &nettle_shake256,
+ SHEX("43ba28f430cdff45 6ae531545f7ecd0a"
+ "c834a55d9358c037 2bfa0c6c6798c086"
+ "6aea01eb00742802 b8438ea4cb82169c"
+ "235160627b4c3a94 80"),
+ SHEX("c4eab05d357007c6 32f3dbb48489924d"
+ "552b08fe0c353a0d 4a1f00acda2c463a"
+ "fbea67c5e8d2877c 5e3bc397a659949e"
+ "f8021e954e0a1227 4e"),
+ SHEX("03"),
+ SHEX("26b8f91727bd6289 7af15e41eb43c377"
+ "efb9c610d48f2335 cb0bd0087810f435"
+ "2541b143c4b981b7 e18f62de8ccdf633"
+ "fc1bf037ab7cd779 805e0dbcc0aae1cb"
+ "cee1afb2e027df36 bc04dcecbf154336"
+ "c19f0af7e0a64729 05e799f1953d2a0f"
+ "f3348ab21aa4adaf d1d234441cf807c0"
+ "3a00"));
+ test_eddsa_sign (&_nettle_curve448, &nettle_shake256,
+ SHEX("df9705f58edbab80 2c7f8363cfe5560a"
+ "b1c6132c20a9f1dd 163483a26f8ac53a"
+ "39d6808bf4a1dfbd 261b099bb03b3fb5"
+ "0906cb28bd8a081f 00"),
+ SHEX("d65df341ad13e008 567688baedda8e9d"
+ "cdc17dc024974ea5 b4227b6530e339bf"
+ "f21f99e68ca6968f 3cca6dfe0fb9f4fa"
+ "b4fa135d5542ea3f 01"),
+ SHEX("bd0f6a3747cd561b dddf4640a332461a"
+ "4a30a12a434cd0bf 40d766d9c6d458e5"
+ "512204a30c17d1f5 0b5079631f64eb31"
+ "12182da300583546 1113718d1a5ef944"),
+ SHEX("554bc2480860b49e ab8532d2a533b7d5"
+ "78ef473eeb58c98b b2d0e1ce488a98b1"
+ "8dfde9b9b90775e6 7f47d4a1c3482058"
+ "efc9f40d2ca033a0 801b63d45b3b722e"
+ "f552bad3b4ccb667 da350192b61c508c"
+ "f7b6b5adadc2c8d9 a446ef003fb05cba"
+ "5f30e88e36ec2703 b349ca229c267083"
+ "3900"));
}
diff --git a/testsuite/eddsa-verify-test.c b/testsuite/eddsa-verify-test.c
index dd6712ab..bab91509 100644
--- a/testsuite/eddsa-verify-test.c
+++ b/testsuite/eddsa-verify-test.c
@@ -42,7 +42,7 @@ test_eddsa (const struct ecc_curve *ecc,
{
mp_limb_t *A = xalloc_limbs (ecc_size_a (ecc));
mp_limb_t *scratch = xalloc_limbs (_eddsa_verify_itch (ecc));
- size_t nbytes = 1 + ecc->p.bit_size / 8;
+ size_t nbytes = 1 + (ecc->eddsa->b - 1) / 8;
uint8_t *cmsg = xalloc (msg->length);
uint8_t *csignature = xalloc (2*nbytes);
void *ctx = xalloc (H->context_size);
@@ -157,4 +157,51 @@ test_main (void)
"99df1340cce54626 183144ef46887163"
"4b0a5c0033534108 e1c67c0dc99d3014"
"f01084e98c95e101 4b309b1dbb2e6704"));
+
+ /* Based on a few of the test vectors from RFC 8032 */
+ test_eddsa (&_nettle_curve448, &nettle_shake256,
+ H("5fd7449b59b461fd 2ce787ec616ad46a"
+ "1da1342485a70e1f 8a0ea75d80e96778"
+ "edf124769b46c706 1bd6783df1e50f6c"
+ "d1fa1abeafe82561 80"),
+ SHEX(""),
+ H("533a37f6bbe45725 1f023c0d88f976ae"
+ "2dfb504a843e34d2 074fd823d41a591f"
+ "2b233f034f628281 f2fd7a22ddd47d78"
+ "28c59bd0a21bfd39 80ff0d2028d4b18a"
+ "9df63e006c5d1c2d 345b925d8dc00b41"
+ "04852db99ac5c7cd da8530a113a0f4db"
+ "b61149f05a736326 8c71d95808ff2e65"
+ "2600"));
+ test_eddsa (&_nettle_curve448, &nettle_shake256,
+ H("43ba28f430cdff45 6ae531545f7ecd0a"
+ "c834a55d9358c037 2bfa0c6c6798c086"
+ "6aea01eb00742802 b8438ea4cb82169c"
+ "235160627b4c3a94 80"),
+ SHEX("03"),
+ H("26b8f91727bd6289 7af15e41eb43c377"
+ "efb9c610d48f2335 cb0bd0087810f435"
+ "2541b143c4b981b7 e18f62de8ccdf633"
+ "fc1bf037ab7cd779 805e0dbcc0aae1cb"
+ "cee1afb2e027df36 bc04dcecbf154336"
+ "c19f0af7e0a64729 05e799f1953d2a0f"
+ "f3348ab21aa4adaf d1d234441cf807c0"
+ "3a00"));
+ test_eddsa (&_nettle_curve448, &nettle_shake256,
+ H("df9705f58edbab80 2c7f8363cfe5560a"
+ "b1c6132c20a9f1dd 163483a26f8ac53a"
+ "39d6808bf4a1dfbd 261b099bb03b3fb5"
+ "0906cb28bd8a081f 00"),
+ SHEX("bd0f6a3747cd561b dddf4640a332461a"
+ "4a30a12a434cd0bf 40d766d9c6d458e5"
+ "512204a30c17d1f5 0b5079631f64eb31"
+ "12182da300583546 1113718d1a5ef944"),
+ H("554bc2480860b49e ab8532d2a533b7d5"
+ "78ef473eeb58c98b b2d0e1ce488a98b1"
+ "8dfde9b9b90775e6 7f47d4a1c3482058"
+ "efc9f40d2ca033a0 801b63d45b3b722e"
+ "f552bad3b4ccb667 da350192b61c508c"
+ "f7b6b5adadc2c8d9 a446ef003fb05cba"
+ "5f30e88e36ec2703 b349ca229c267083"
+ "3900"));
}
--
2.13.3
_______________________________________________
nettle-bugs mailing list
[email protected]
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs