summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAdam Ierymenko <adam.ierymenko@gmail.com>2013-09-13 19:18:01 -0400
committerAdam Ierymenko <adam.ierymenko@gmail.com>2013-09-13 19:18:01 -0400
commit09c8b4bbb37250df95ee898bcd6a0e090049d225 (patch)
tree50be7c31ef565eb2c8accfe4c2a60a8fc66b285f
parentb2bb7b41fc3b1c5f33afbbe685064ee4442efe85 (diff)
downloadinfinitytier-09c8b4bbb37250df95ee898bcd6a0e090049d225.tar.gz
infinitytier-09c8b4bbb37250df95ee898bcd6a0e090049d225.zip
More new crypto: Ed25519 signatures.
-rw-r--r--node/C25519.cpp48
-rw-r--r--node/C25519.hpp69
-rw-r--r--selftest.cpp38
3 files changed, 148 insertions, 7 deletions
diff --git a/node/C25519.cpp b/node/C25519.cpp
index 64a130cf..69a0a2f2 100644
--- a/node/C25519.cpp
+++ b/node/C25519.cpp
@@ -434,6 +434,7 @@ static void fe25519_pack(unsigned char r[32], const fe25519 *x)
r[i] = y.v[i];
}
+#if 0
static int fe25519_iszero(const fe25519 *x)
{
int i;
@@ -445,6 +446,7 @@ static int fe25519_iszero(const fe25519 *x)
r &= equal(t.v[i],0);
return r;
}
+#endif
static int fe25519_iseq_vartime(const fe25519 *x, const fe25519 *y)
{
@@ -764,11 +766,13 @@ static void sc25519_from32bytes(sc25519 *r, const unsigned char x[32])
barrett_reduce(r, t);
}
+#if 0
static void shortsc25519_from16bytes(shortsc25519 *r, const unsigned char x[16])
{
int i;
for(i=0;i<16;i++) r->v[i] = x[i];
}
+#endif
static void sc25519_from64bytes(sc25519 *r, const unsigned char x[64])
{
@@ -778,6 +782,7 @@ static void sc25519_from64bytes(sc25519 *r, const unsigned char x[64])
barrett_reduce(r, t);
}
+#if 0
static void sc25519_from_shortsc(sc25519 *r, const shortsc25519 *x)
{
int i;
@@ -786,6 +791,7 @@ static void sc25519_from_shortsc(sc25519 *r, const shortsc25519 *x)
for(i=0;i<16;i++)
r->v[16+i] = 0;
}
+#endif
static void sc25519_to32bytes(unsigned char r[32], const sc25519 *x)
{
@@ -793,6 +799,7 @@ static void sc25519_to32bytes(unsigned char r[32], const sc25519 *x)
for(i=0;i<32;i++) r[i] = x->v[i];
}
+#if 0
static int sc25519_iszero_vartime(const sc25519 *x)
{
int i;
@@ -800,7 +807,9 @@ static int sc25519_iszero_vartime(const sc25519 *x)
if(x->v[i] != 0) return 0;
return 1;
}
+#endif
+#if 0
static int sc25519_isshort_vartime(const sc25519 *x)
{
int i;
@@ -808,7 +817,9 @@ static int sc25519_isshort_vartime(const sc25519 *x)
if(x->v[i] != 0) return 0;
return 1;
}
+#endif
+#if 0
static int sc25519_lt_vartime(const sc25519 *x, const sc25519 *y)
{
int i;
@@ -819,6 +830,7 @@ static int sc25519_lt_vartime(const sc25519 *x, const sc25519 *y)
}
return 0;
}
+#endif
static void sc25519_add(sc25519 *r, const sc25519 *x, const sc25519 *y)
{
@@ -833,6 +845,7 @@ static void sc25519_add(sc25519 *r, const sc25519 *x, const sc25519 *y)
reduce_add_sub(r);
}
+#if 0
static void sc25519_sub_nored(sc25519 *r, const sc25519 *x, const sc25519 *y)
{
crypto_uint32 b = 0;
@@ -845,6 +858,7 @@ static void sc25519_sub_nored(sc25519 *r, const sc25519 *x, const sc25519 *y)
b = (t >> 8) & 1;
}
}
+#endif
static void sc25519_mul(sc25519 *r, const sc25519 *x, const sc25519 *y)
{
@@ -867,12 +881,14 @@ static void sc25519_mul(sc25519 *r, const sc25519 *x, const sc25519 *y)
barrett_reduce(r, t);
}
+#if 0
static void sc25519_mul_shortsc(sc25519 *r, const sc25519 *x, const shortsc25519 *y)
{
sc25519 t;
sc25519_from_shortsc(&t, y);
sc25519_mul(r, x, &t);
}
+#endif
static void sc25519_window3(signed char r[85], const sc25519 *s)
{
@@ -911,6 +927,7 @@ static void sc25519_window3(signed char r[85], const sc25519 *s)
r[84] += carry;
}
+#if 0
static void sc25519_window5(signed char r[51], const sc25519 *s)
{
char carry;
@@ -947,6 +964,7 @@ static void sc25519_window5(signed char r[51], const sc25519 *s)
}
r[50] += carry;
}
+#endif
static void sc25519_2interleave2(unsigned char r[127], const sc25519 *s1, const sc25519 *s2)
{
@@ -2048,6 +2066,7 @@ static void ge25519_pack(unsigned char r[32], const ge25519_p3 *p)
r[31] ^= fe25519_getparity(&tx) << 7;
}
+#if 0
static int ge25519_isneutral_vartime(const ge25519_p3 *p)
{
int ret = 1;
@@ -2055,12 +2074,14 @@ static int ge25519_isneutral_vartime(const ge25519_p3 *p)
if(!fe25519_iseq_vartime(&p->y, &p->z)) ret = 0;
return ret;
}
+#endif
/* computes [s1]p1 + [s2]p2 */
static void ge25519_double_scalarmult_vartime(ge25519_p3 *r, const ge25519_p3 *p1, const sc25519 *s1, const ge25519_p3 *p2, const sc25519 *s2)
{
ge25519_p1p1 tp1p1;
ge25519_p3 pre[16];
+ char *pre5 = (char *)(&(pre[5])); // eliminate type punning warning
unsigned char b[127];
int i;
@@ -2075,7 +2096,7 @@ static void ge25519_double_scalarmult_vartime(ge25519_p3 *r, const ge25519_p3 *p
add_p1p1(&tp1p1,&pre[3], &pre[4]); p1p1_to_p3( &pre[7], &tp1p1); /* 01 11 */
dbl_p1p1(&tp1p1,(ge25519_p2 *)p2); p1p1_to_p3( &pre[8], &tp1p1); /* 10 00 */
add_p1p1(&tp1p1,&pre[1], &pre[8]); p1p1_to_p3( &pre[9], &tp1p1); /* 10 01 */
- dbl_p1p1(&tp1p1,(ge25519_p2 *)&pre[5]); p1p1_to_p3(&pre[10], &tp1p1); /* 10 10 */
+ dbl_p1p1(&tp1p1,(ge25519_p2 *)pre5); p1p1_to_p3(&pre[10], &tp1p1); /* 10 10 */
add_p1p1(&tp1p1,&pre[3], &pre[8]); p1p1_to_p3(&pre[11], &tp1p1); /* 10 11 */
add_p1p1(&tp1p1,&pre[4], &pre[8]); p1p1_to_p3(&pre[12], &tp1p1); /* 11 00 */
add_p1p1(&tp1p1,&pre[1],&pre[12]); p1p1_to_p3(&pre[13], &tp1p1); /* 11 01 */
@@ -2312,7 +2333,7 @@ void C25519::sign(const C25519::Pair &mine,const void *msg,unsigned int len,void
unsigned char extsk[64];
unsigned char hmg[crypto_hash_sha512_BYTES];
unsigned char hram[crypto_hash_sha512_BYTES];
- unsigned char *sig = (unsigned char *)signature; // 96 bytes
+ unsigned char *sig = (unsigned char *)signature;
unsigned char digest[64]; // we sign the first 32 bytes of SHA-512(msg)
SHA512::hash(digest,msg,len);
@@ -2355,9 +2376,32 @@ void C25519::sign(const C25519::Pair &mine,const void *msg,unsigned int len,void
bool C25519::verify(const C25519::Public &their,const void *msg,unsigned int len,const void *signature)
throw()
{
+ unsigned char t2[32];
+ ge25519 get1, get2;
+ sc25519 schram, scs;
+ unsigned char hram[crypto_hash_sha512_BYTES];
+ unsigned char m[96];
unsigned char digest[64]; // we sign the first 32 bytes of SHA-512(msg)
+ const unsigned char *sig = (const unsigned char *)signature;
+ // First check the message's integrity
SHA512::hash(digest,msg,len);
+ if (!Utils::secureEq(sig + 64,digest,32))
+ return false;
+
+ if (ge25519_unpackneg_vartime(&get1,their.data + 32))
+ return false;
+
+ get_hram(hram,sig,their.data + 32,m,96);
+
+ sc25519_from64bytes(&schram, hram);
+
+ sc25519_from32bytes(&scs, sig+32);
+
+ ge25519_double_scalarmult_vartime(&get2, &get1, &schram, &ge25519_base, &scs);
+ ge25519_pack(t2, &get2);
+
+ return Utils::secureEq(sig,t2,32);
}
} // namespace ZeroTier
diff --git a/node/C25519.hpp b/node/C25519.hpp
index 1260b9e1..cf6bd60e 100644
--- a/node/C25519.hpp
+++ b/node/C25519.hpp
@@ -33,9 +33,7 @@
namespace ZeroTier {
#define ZT_C25519_PUBLIC_KEY_LEN 64
-
#define ZT_C25519_PRIVATE_KEY_LEN 64
-
#define ZT_C25519_SIGNATURE_LEN 96
/**
@@ -47,12 +45,17 @@ public:
/**
* Public key (both crypto and signing)
*/
- typedef Array<unsigned char,64> Public; // crypto key, signing key (both 32 bytes)
+ typedef Array<unsigned char,ZT_C25519_PUBLIC_KEY_LEN> Public; // crypto key, signing key (both 32 bytes)
/**
* Private key (both crypto and signing)
*/
- typedef Array<unsigned char,64> Private; // crypto key, signing key (both 32 bytes)
+ typedef Array<unsigned char,ZT_C25519_PRIVATE_KEY_LEN> Private; // crypto key, signing key (both 32 bytes)
+
+ /**
+ * Message signature
+ */
+ typedef Array<unsigned char,ZT_C25519_SIGNATURE_LEN> Signature;
/**
* Public/private key pair
@@ -82,11 +85,69 @@ public:
static void agree(const Pair &mine,const Public &their,void *keybuf,unsigned int keylen)
throw();
+ /**
+ * Sign a message with a sender's key pair
+ *
+ * This takes the SHA-521 of msg[] and then signs the first 32 bytes of this
+ * digest, returning it and the 64-byte ed25519 signature in signature[].
+ * This results in a signature that verifies both the signer's authenticity
+ * and the integrity of the message.
+ *
+ * This is based on the original ed25519 code from NaCl and the SUPERCOP
+ * cipher benchmark suite, but with the modification that it always
+ * produces a signature of fixed 96-byte length based on the hash of an
+ * arbitrary-length message.
+ *
+ * @param Key pair to sign with
+ * @param msg Message to sign
+ * @param len Length of message in bytes
+ * @param signature Buffer to fill with signature -- MUST be 96 bytes in length
+ */
static void sign(const Pair &mine,const void *msg,unsigned int len,void *signature)
throw();
+ /**
+ * Sign a message with a sender's key pair
+ *
+ * @param Key pair to sign with
+ * @param msg Message to sign
+ * @param len Length of message in bytes
+ * @return Signature
+ */
+ static Signature sign(const Pair &mine,const void *msg,unsigned int len)
+ throw()
+ {
+ Signature sig;
+ sign(mine,msg,len,sig.data);
+ return sig;
+ }
+
+ /**
+ * Verify a message's signature
+ *
+ * @param their Public key to verify against
+ * @param msg Message to verify signature integrity against
+ * @param len Length of message in bytes
+ * @param signature 96-byte signature
+ * @return True if signature is valid and the message is authentic and unmodified
+ */
static bool verify(const Public &their,const void *msg,unsigned int len,const void *signature)
throw();
+
+ /**
+ * Verify a message's signature
+ *
+ * @param their Public key to verify against
+ * @param msg Message to verify signature integrity against
+ * @param len Length of message in bytes
+ * @param signature 96-byte signature
+ * @return True if signature is valid and the message is authentic and unmodified
+ */
+ static inline bool verify(const Public &their,const void *msg,unsigned int len,const Signature &signature)
+ throw()
+ {
+ return verify(their,msg,len,signature.data);
+ }
};
} // namespace ZeroTier
diff --git a/selftest.cpp b/selftest.cpp
index c9e41034..56352ff6 100644
--- a/selftest.cpp
+++ b/selftest.cpp
@@ -112,7 +112,7 @@ static int testCrypto()
C25519::agree(p2,p1.pub,buf2,64);
C25519::agree(p3,p1.pub,buf3,64);
if (memcmp(buf1,buf2,64)) {
- std::cout << "FAIL" << std::endl;
+ std::cout << "FAIL (1)" << std::endl;
return -1;
}
if (!memcmp(buf2,buf3,64)) {
@@ -122,6 +122,42 @@ static int testCrypto()
}
std::cout << "PASS" << std::endl;
+ std::cout << "[crypto] Testing Ed25519 ECC signatures... "; std::cout.flush();
+ C25519::Pair didntSign = C25519::generate();
+ for(unsigned int i=0;i<10;++i) {
+ C25519::Pair p1 = C25519::generate();
+ for(unsigned int k=0;k<sizeof(buf1);++k)
+ buf1[k] = (unsigned char)rand();
+ C25519::Signature sig = C25519::sign(p1,buf1,sizeof(buf1));
+ if (!C25519::verify(p1.pub,buf1,sizeof(buf1),sig)) {
+ std::cout << "FAIL (1)" << std::endl;
+ return -1;
+ }
+ ++buf1[17];
+ if (C25519::verify(p1.pub,buf1,sizeof(buf1),sig)) {
+ std::cout << "FAIL (2)" << std::endl;
+ return -1;
+ }
+ --buf1[17];
+ if (!C25519::verify(p1.pub,buf1,sizeof(buf1),sig)) {
+ std::cout << "FAIL (3)" << std::endl;
+ return -1;
+ }
+ if (C25519::verify(didntSign.pub,buf1,sizeof(buf1),sig)) {
+ std::cout << "FAIL (2)" << std::endl;
+ return -1;
+ }
+ for(unsigned int k=0;k<64;++k) {
+ C25519::Signature sig2(sig);
+ sig2.data[rand() % sig2.size()] ^= (unsigned char)(1 << (rand() & 7));
+ if (C25519::verify(p1.pub,buf1,sizeof(buf1),sig2)) {
+ std::cout << "FAIL (5)" << std::endl;
+ return -1;
+ }
+ }
+ }
+ std::cout << "PASS" << std::endl;
+
std::cout << "[crypto] Testing Salsa20... "; std::cout.flush();
for(unsigned int i=0;i<4;++i) {
for(unsigned int k=0;k<sizeof(buf1);++k)