// Copyright 2015-2016 Brian Smith. // // Permission to use, copy, modify, and/or distribute this software for any // purpose with or without fee is hereby granted, provided that the above // copyright notice and this permission notice appear in all copies. // // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY // SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. //! EdDSA Signatures. use super::{super::ops::*, eddsa_digest}; use crate::{error, sealed, signature}; use core::convert::TryInto; /// Parameters for EdDSA signing and verification. pub struct EdDSAParameters; impl core::fmt::Debug for EdDSAParameters { fn fmt(&self, f: &mut core::fmt::Formatter) -> Result<(), core::fmt::Error> { write!(f, "ring::signature::ED25519") } } /// Verification of [Ed25519] signatures. /// /// Ed25519 uses SHA-512 as the digest algorithm. /// /// [Ed25519]: https://ed25519.cr.yp.to/ pub static ED25519: EdDSAParameters = EdDSAParameters {}; impl signature::VerificationAlgorithm for EdDSAParameters { fn verify( &self, public_key: untrusted::Input, msg: untrusted::Input, signature: untrusted::Input, ) -> Result<(), error::Unspecified> { let public_key: &[u8; ELEM_LEN] = public_key.as_slice_less_safe().try_into()?; let (signature_r, signature_s) = signature.read_all(error::Unspecified, |input| { let signature_r: &[u8; ELEM_LEN] = input .read_bytes(ELEM_LEN)? .as_slice_less_safe() .try_into()?; let signature_s: &[u8; SCALAR_LEN] = input .read_bytes(SCALAR_LEN)? .as_slice_less_safe() .try_into()?; Ok((signature_r, signature_s)) })?; let signature_s = Scalar::from_bytes_checked(*signature_s)?; let mut a = ExtPoint::from_encoded_point_vartime(public_key)?; a.invert_vartime(); let h_digest = eddsa_digest(signature_r, public_key, msg.as_slice_less_safe()); let h = Scalar::from_sha512_digest_reduced(h_digest); let mut r = Point::new_at_infinity(); unsafe { GFp_x25519_ge_double_scalarmult_vartime(&mut r, &h, &a, &signature_s) }; let r_check = r.into_encoded_point(); if *signature_r != r_check { return Err(error::Unspecified); } Ok(()) } } impl sealed::Sealed for EdDSAParameters {} extern "C" { fn GFp_x25519_ge_double_scalarmult_vartime( r: &mut Point, a_coeff: &Scalar, a: &ExtPoint, b_coeff: &Scalar, ); }