48 lines
1.1 KiB
C
Raw Normal View History

2014-06-24 12:59:22 -07:00
#include <string.h>
#include "crypto_sign.h"
#include "crypto_hash_sha512.h"
#include "ge.h"
#include "sc.h"
2014-07-24 11:24:54 -07:00
#include "zeroize.h"
2014-06-24 12:59:22 -07:00
/* NEW: Compare to pristine crypto_sign()
Uses explicit private key for nonce derivation and as scalar,
instead of deriving both from a master key.
*/
int crypto_sign_modified(
unsigned char *sm,
2014-06-24 12:59:22 -07:00
const unsigned char *m,unsigned long long mlen,
2014-07-24 11:24:54 -07:00
const unsigned char *sk, const unsigned char* pk,
const unsigned char* random
2014-06-24 12:59:22 -07:00
)
{
unsigned char nonce[64];
unsigned char hram[64];
ge_p3 R;
2014-07-24 11:24:54 -07:00
int count=0;
2014-06-24 12:59:22 -07:00
memmove(sm + 64,m,mlen);
memmove(sm + 32,sk,32); /* NEW: Use privkey directly for nonce derivation */
2014-07-24 11:24:54 -07:00
/* NEW : add prefix to separate hash uses - see .h */
sm[0] = 0xFE;
for (count = 1; count < 32; count++)
sm[count] = 0xFF;
/* NEW: add suffix of random data */
memmove(sm + mlen + 64, random, 64);
2014-06-24 12:59:22 -07:00
crypto_hash_sha512(nonce,sm,mlen + 128);
memmove(sm + 32,pk,32);
2014-07-24 11:24:54 -07:00
2014-06-24 12:59:22 -07:00
sc_reduce(nonce);
ge_scalarmult_base(&R,nonce);
ge_p3_tobytes(sm,&R);
crypto_hash_sha512(hram,sm,mlen + 64);
sc_reduce(hram);
sc_muladd(sm + 32,hram,sk,nonce); /* NEW: Use privkey directly */
return 0;
}