summaryrefslogtreecommitdiff
path: root/libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c
diff options
context:
space:
mode:
authorGeorge Hazan <ghazan@miranda.im>2019-03-26 13:06:41 +0300
committerGeorge Hazan <ghazan@miranda.im>2019-03-26 13:06:41 +0300
commitaec8f049d43d79c6c8c26a7d9ddfd9460d267275 (patch)
tree5e75220de26fda9b7b0527d550204c78a86ad90c /libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c
parentf2764176c58829d24fee7a830a3c9ac2b57d1906 (diff)
libaxolotl doesn't exist anymore, it's renamed to libsignal
Diffstat (limited to 'libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c')
-rw-r--r--libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c53
1 files changed, 0 insertions, 53 deletions
diff --git a/libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c b/libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c
deleted file mode 100644
index b2fb8c20d3..0000000000
--- a/libs/libaxolotl/src/curve25519/ed25519/additions/sign_modified.c
+++ /dev/null
@@ -1,53 +0,0 @@
-#include <string.h>
-#include "crypto_sign.h"
-#include "crypto_hash_sha512.h"
-#include "ge.h"
-#include "sc.h"
-#include "zeroize.h"
-#include "crypto_additions.h"
-
-/* NEW: Compare to pristine crypto_sign()
- Uses explicit private key for nonce derivation and as scalar,
- instead of deriving both from a master key.
-*/
-int crypto_sign_modified(
- unsigned char *sm,
- const unsigned char *m,unsigned long long mlen,
- const unsigned char *sk, const unsigned char* pk,
- const unsigned char* random
-)
-{
- unsigned char nonce[64];
- unsigned char hram[64];
- ge_p3 R;
- int count=0;
-
- memmove(sm + 64,m,mlen);
- memmove(sm + 32,sk,32); /* NEW: Use privkey directly for nonce derivation */
-
- /* NEW : add prefix to separate hash uses - see .h */
- sm[0] = 0xFE;
- for (count = 1; count < 32; count++)
- sm[count] = 0xFF;
-
- /* NEW: add suffix of random data */
- memmove(sm + mlen + 64, random, 64);
-
- crypto_hash_sha512(nonce,sm,mlen + 128);
- memmove(sm + 32,pk,32);
-
- sc_reduce(nonce);
-
- ge_scalarmult_base(&R,nonce);
- ge_p3_tobytes(sm,&R);
-
- crypto_hash_sha512(hram,sm,mlen + 64);
- sc_reduce(hram);
- sc_muladd(sm + 32,hram,sk,nonce); /* NEW: Use privkey directly */
-
- /* Erase any traces of private scalar or
- nonce left in the stack from sc_muladd */
- zeroize_stack();
- zeroize(nonce, 64);
- return 0;
-}