diff options
author | gregor herrmann <gregoa@debian.org> | 2023-11-01 21:24:22 +0100 |
---|---|---|
committer | gregor herrmann <gregoa@debian.org> | 2023-11-01 21:24:22 +0100 |
commit | 2d0f50ad4f8bad20bcbbdd9b3e0b6ec50588a19e (patch) | |
tree | 63c67a75ad1517c857170ceb46833c2bdee49977 /src/ltc/pk/ed25519/ed25519_verify.c | |
parent | 5ac0a817d688c51b3ee0109aac17d73dcbbc8645 (diff) | |
parent | d0028b7800375d4b99b3b7fa0b080463b5f20516 (diff) |
Update upstream source from tag 'upstream/0.080'
Update to upstream version '0.080'
with Debian dir 292de44fa919f7a5d6252cc2a47f56ca9a8efe3d
Diffstat (limited to 'src/ltc/pk/ed25519/ed25519_verify.c')
-rw-r--r-- | src/ltc/pk/ed25519/ed25519_verify.c | 101 |
1 files changed, 87 insertions, 14 deletions
diff --git a/src/ltc/pk/ed25519/ed25519_verify.c b/src/ltc/pk/ed25519/ed25519_verify.c index d2c30c2c..e7dcc307 100644 --- a/src/ltc/pk/ed25519/ed25519_verify.c +++ b/src/ltc/pk/ed25519/ed25519_verify.c @@ -9,18 +9,11 @@ #ifdef LTC_CURVE25519 -/** - Verify an Ed25519 signature. - @param private_key The private Ed25519 key in the pair - @param public_key The public Ed25519 key in the pair - @param out [out] The destination of the shared data - @param outlen [in/out] The max size and resulting size of the shared data. - @param stat [out] The result of the signature verification, 1==valid, 0==invalid - @return CRYPT_OK if successful -*/ -int ed25519_verify(const unsigned char *msg, unsigned long msglen, - const unsigned char *sig, unsigned long siglen, - int *stat, const curve25519_key *public_key) +static int s_ed25519_verify(const unsigned char *msg, unsigned long msglen, + const unsigned char *sig, unsigned long siglen, + const unsigned char *ctx, unsigned long ctxlen, + int *stat, + const curve25519_key *public_key) { unsigned char* m; unsigned long long mlen; @@ -34,7 +27,7 @@ int ed25519_verify(const unsigned char *msg, unsigned long msglen, *stat = 0; if (siglen != 64uL) return CRYPT_INVALID_ARG; - if (public_key->algo != PKA_ED25519) return CRYPT_PK_INVALID_TYPE; + if (public_key->algo != LTC_OID_ED25519) return CRYPT_PK_INVALID_TYPE; mlen = msglen + siglen; if ((mlen < msglen) || (mlen < siglen)) return CRYPT_OVERFLOW; @@ -48,14 +41,94 @@ int ed25519_verify(const unsigned char *msg, unsigned long msglen, err = tweetnacl_crypto_sign_open(stat, m, &mlen, m, mlen, + ctx, ctxlen, public_key->pub); #ifdef LTC_CLEAN_STACK - zeromem(m, mlen); + zeromem(m, msglen + siglen); #endif XFREE(m); return err; } +/** + Verify an Ed25519ctx signature. + @param msg [in] The data to be verified + @param msglen [in] The size of the data to be verified + @param sig [in] The signature to be verified + @param siglen [in] The size of the signature to be verified + @param ctx [in] The context + @param ctxlen [in] The size of the context + @param stat [out] The result of the signature verification, 1==valid, 0==invalid + @param public_key [in] The public Ed25519 key in the pair + @return CRYPT_OK if successful +*/ +int ed25519ctx_verify(const unsigned char *msg, unsigned long msglen, + const unsigned char *sig, unsigned long siglen, + const unsigned char *ctx, unsigned long ctxlen, + int *stat, + const curve25519_key *public_key) +{ + unsigned char ctx_prefix[292]; + unsigned long ctx_prefix_size = sizeof(ctx_prefix); + + LTC_ARGCHK(ctx != NULL); + + if (ec25519_crypto_ctx(ctx_prefix, &ctx_prefix_size, 0, ctx, ctxlen) != CRYPT_OK) + return CRYPT_INVALID_ARG; + + return s_ed25519_verify(msg, msglen, sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); +} + +/** + Verify an Ed25519ph signature. + @param msg [in] The data to be verified + @param msglen [in] The size of the data to be verified + @param sig [in] The signature to be verified + @param siglen [in] The size of the signature to be verified + @param ctx [in] The context + @param ctxlen [in] The size of the context + @param stat [out] The result of the signature verification, 1==valid, 0==invalid + @param public_key [in] The public Ed25519 key in the pair + @return CRYPT_OK if successful +*/ +int ed25519ph_verify(const unsigned char *msg, unsigned long msglen, + const unsigned char *sig, unsigned long siglen, + const unsigned char *ctx, unsigned long ctxlen, + int *stat, + const curve25519_key *public_key) +{ + int err; + unsigned char msg_hash[64]; + unsigned char ctx_prefix[292]; + unsigned long ctx_prefix_size = sizeof(ctx_prefix); + + if ((err = ec25519_crypto_ctx(ctx_prefix, &ctx_prefix_size, 1, ctx, ctxlen)) != CRYPT_OK) + return err; + + if ((err = tweetnacl_crypto_ph(msg_hash, msg, msglen)) != CRYPT_OK) + return err; + + return s_ed25519_verify(msg_hash, sizeof(msg_hash), sig, siglen, ctx_prefix, ctx_prefix_size, stat, public_key); +} + +/** + Verify an Ed25519 signature. + @param msg [in] The data to be verified + @param msglen [in] The size of the data to be verified + @param sig [in] The signature to be verified + @param siglen [in] The size of the signature to be verified + @param stat [out] The result of the signature verification, 1==valid, 0==invalid + @param public_key [in] The public Ed25519 key in the pair + @return CRYPT_OK if successful +*/ +int ed25519_verify(const unsigned char *msg, unsigned long msglen, + const unsigned char *sig, unsigned long siglen, + int *stat, + const curve25519_key *public_key) +{ + return s_ed25519_verify(msg, msglen, sig, siglen, NULL, 0, stat, public_key); +} + #endif |