mirror of
https://github.com/oxen-io/lokinet.git
synced 2024-11-02 03:40:12 +00:00
93 lines
2.0 KiB
C
93 lines
2.0 KiB
C
|
|
||
|
#include <string.h>
|
||
|
|
||
|
#include <sodium/crypto_hash_sha512.h>
|
||
|
#include <sodium/crypto_scalarmult_curve25519.h>
|
||
|
#include <sodium/crypto_sign_ed25519.h>
|
||
|
#include "sign_ed25519_ref10.h"
|
||
|
#include <sodium/private/ed25519_ref10.h>
|
||
|
#include <sodium/randombytes.h>
|
||
|
#include <sodium/utils.h>
|
||
|
|
||
|
int
|
||
|
crypto_sign_ed25519_seed_keypair(unsigned char *pk, unsigned char *sk,
|
||
|
const unsigned char *seed)
|
||
|
{
|
||
|
ge25519_p3 A;
|
||
|
|
||
|
#ifdef ED25519_NONDETERMINISTIC
|
||
|
memmove(sk, seed, 32);
|
||
|
#else
|
||
|
crypto_hash_sha512(sk, seed, 32);
|
||
|
#endif
|
||
|
sk[0] &= 248;
|
||
|
sk[31] &= 127;
|
||
|
sk[31] |= 64;
|
||
|
|
||
|
ge25519_scalarmult_base(&A, sk);
|
||
|
ge25519_p3_tobytes(pk, &A);
|
||
|
|
||
|
memmove(sk, seed, 32);
|
||
|
memmove(sk + 32, pk, 32);
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
crypto_sign_ed25519_keypair(unsigned char *pk, unsigned char *sk)
|
||
|
{
|
||
|
unsigned char seed[32];
|
||
|
int ret;
|
||
|
|
||
|
randombytes_buf(seed, sizeof seed);
|
||
|
ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed);
|
||
|
sodium_memzero(seed, sizeof seed);
|
||
|
|
||
|
return ret;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
crypto_sign_ed25519_pk_to_curve25519(unsigned char *curve25519_pk,
|
||
|
const unsigned char *ed25519_pk)
|
||
|
{
|
||
|
ge25519_p3 A;
|
||
|
fe25519 x;
|
||
|
fe25519 one_minus_y;
|
||
|
|
||
|
if(ge25519_has_small_order(ed25519_pk) != 0
|
||
|
|| ge25519_frombytes_negate_vartime(&A, ed25519_pk) != 0
|
||
|
|| ge25519_is_on_main_subgroup(&A) == 0)
|
||
|
{
|
||
|
return -1;
|
||
|
}
|
||
|
fe25519_1(one_minus_y);
|
||
|
fe25519_sub(one_minus_y, one_minus_y, A.Y);
|
||
|
fe25519_invert(one_minus_y, one_minus_y);
|
||
|
fe25519_1(x);
|
||
|
fe25519_add(x, x, A.Y);
|
||
|
fe25519_mul(x, x, one_minus_y);
|
||
|
fe25519_tobytes(curve25519_pk, x);
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
crypto_sign_ed25519_sk_to_curve25519(unsigned char *curve25519_sk,
|
||
|
const unsigned char *ed25519_sk)
|
||
|
{
|
||
|
unsigned char h[crypto_hash_sha512_BYTES];
|
||
|
|
||
|
#ifdef ED25519_NONDETERMINISTIC
|
||
|
memcpy(h, ed25519_sk, 32);
|
||
|
#else
|
||
|
crypto_hash_sha512(h, ed25519_sk, 32);
|
||
|
#endif
|
||
|
h[0] &= 248;
|
||
|
h[31] &= 127;
|
||
|
h[31] |= 64;
|
||
|
memcpy(curve25519_sk, h, crypto_scalarmult_curve25519_BYTES);
|
||
|
sodium_memzero(h, sizeof h);
|
||
|
|
||
|
return 0;
|
||
|
}
|