2014-06-24 19:59:22 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include "crypto_sign.h"
|
|
|
|
#include "crypto_hash_sha512.h"
|
|
|
|
#include "ge.h"
|
|
|
|
#include "sc.h"
|
2014-07-24 18:24:54 +00:00
|
|
|
#include "zeroize.h"
|
2014-06-24 19:59:22 +00:00
|
|
|
|
|
|
|
/* NEW: Compare to pristine crypto_sign()
|
|
|
|
Uses explicit private key for nonce derivation and as scalar,
|
|
|
|
instead of deriving both from a master key.
|
|
|
|
*/
|
|
|
|
int crypto_sign_modified(
|
|
|
|
unsigned char *sm,unsigned long long *smlen,
|
|
|
|
const unsigned char *m,unsigned long long mlen,
|
2014-07-24 18:24:54 +00:00
|
|
|
const unsigned char *sk, const unsigned char* pk,
|
|
|
|
const unsigned char* random
|
2014-06-24 19:59:22 +00:00
|
|
|
)
|
|
|
|
{
|
|
|
|
unsigned char nonce[64];
|
|
|
|
unsigned char hram[64];
|
|
|
|
ge_p3 R;
|
2014-07-24 18:24:54 +00:00
|
|
|
int count=0;
|
2014-06-24 19:59:22 +00:00
|
|
|
|
|
|
|
*smlen = mlen + 64;
|
|
|
|
memmove(sm + 64,m,mlen);
|
|
|
|
memmove(sm + 32,sk,32); /* NEW: Use privkey directly for nonce derivation */
|
2014-07-24 18:24:54 +00:00
|
|
|
|
|
|
|
/* NEW : add prefix to separate hash uses - see .h */
|
|
|
|
sm[0] = 0xFE;
|
|
|
|
for (count = 1; count < 32; count++)
|
|
|
|
sm[count] = 0xFF;
|
|
|
|
|
|
|
|
crypto_hash_sha512(nonce,sm,mlen + 64);
|
2014-06-24 19:59:22 +00:00
|
|
|
memmove(sm + 32,pk,32);
|
|
|
|
|
2014-07-24 18:24:54 +00:00
|
|
|
/* NEW: XOR random into nonce */
|
|
|
|
for (count=0; count < 64; count++)
|
|
|
|
nonce[count] ^= random[count];
|
|
|
|
|
2014-06-24 19:59:22 +00:00
|
|
|
sc_reduce(nonce);
|
|
|
|
ge_scalarmult_base(&R,nonce);
|
|
|
|
ge_p3_tobytes(sm,&R);
|
|
|
|
|
|
|
|
crypto_hash_sha512(hram,sm,mlen + 64);
|
|
|
|
sc_reduce(hram);
|
|
|
|
sc_muladd(sm + 32,hram,sk,nonce); /* NEW: Use privkey directly */
|
|
|
|
|
2014-07-24 18:24:54 +00:00
|
|
|
/* NEW: Dummy call to hopefully erase any traces of privkey or
|
|
|
|
nonce left in the stack from prev call to this func. */
|
|
|
|
volatile unsigned char* p = sm+64;
|
|
|
|
sc_muladd(sm+64,hram,hram,hram);
|
|
|
|
|
|
|
|
zeroize(nonce, 64);
|
2014-06-24 19:59:22 +00:00
|
|
|
return 0;
|
|
|
|
}
|