mirror of
https://github.com/idanoo/GoScrobble.git
synced 2024-11-25 09:55:15 +00:00
1073 lines
24 KiB
JavaScript
1073 lines
24 KiB
JavaScript
|
/**
|
||
|
* JavaScript implementation of Ed25519.
|
||
|
*
|
||
|
* Copyright (c) 2017-2019 Digital Bazaar, Inc.
|
||
|
*
|
||
|
* This implementation is based on the most excellent TweetNaCl which is
|
||
|
* in the public domain. Many thanks to its contributors:
|
||
|
*
|
||
|
* https://github.com/dchest/tweetnacl-js
|
||
|
*/
|
||
|
var forge = require('./forge');
|
||
|
require('./jsbn');
|
||
|
require('./random');
|
||
|
require('./sha512');
|
||
|
require('./util');
|
||
|
var asn1Validator = require('./asn1-validator');
|
||
|
var publicKeyValidator = asn1Validator.publicKeyValidator;
|
||
|
var privateKeyValidator = asn1Validator.privateKeyValidator;
|
||
|
|
||
|
if(typeof BigInteger === 'undefined') {
|
||
|
var BigInteger = forge.jsbn.BigInteger;
|
||
|
}
|
||
|
|
||
|
var ByteBuffer = forge.util.ByteBuffer;
|
||
|
var NativeBuffer = typeof Buffer === 'undefined' ? Uint8Array : Buffer;
|
||
|
|
||
|
/*
|
||
|
* Ed25519 algorithms, see RFC 8032:
|
||
|
* https://tools.ietf.org/html/rfc8032
|
||
|
*/
|
||
|
forge.pki = forge.pki || {};
|
||
|
module.exports = forge.pki.ed25519 = forge.ed25519 = forge.ed25519 || {};
|
||
|
var ed25519 = forge.ed25519;
|
||
|
|
||
|
ed25519.constants = {};
|
||
|
ed25519.constants.PUBLIC_KEY_BYTE_LENGTH = 32;
|
||
|
ed25519.constants.PRIVATE_KEY_BYTE_LENGTH = 64;
|
||
|
ed25519.constants.SEED_BYTE_LENGTH = 32;
|
||
|
ed25519.constants.SIGN_BYTE_LENGTH = 64;
|
||
|
ed25519.constants.HASH_BYTE_LENGTH = 64;
|
||
|
|
||
|
ed25519.generateKeyPair = function(options) {
|
||
|
options = options || {};
|
||
|
var seed = options.seed;
|
||
|
if(seed === undefined) {
|
||
|
// generate seed
|
||
|
seed = forge.random.getBytesSync(ed25519.constants.SEED_BYTE_LENGTH);
|
||
|
} else if(typeof seed === 'string') {
|
||
|
if(seed.length !== ed25519.constants.SEED_BYTE_LENGTH) {
|
||
|
throw new TypeError(
|
||
|
'"seed" must be ' + ed25519.constants.SEED_BYTE_LENGTH +
|
||
|
' bytes in length.');
|
||
|
}
|
||
|
} else if(!(seed instanceof Uint8Array)) {
|
||
|
throw new TypeError(
|
||
|
'"seed" must be a node.js Buffer, Uint8Array, or a binary string.');
|
||
|
}
|
||
|
|
||
|
seed = messageToNativeBuffer({message: seed, encoding: 'binary'});
|
||
|
|
||
|
var pk = new NativeBuffer(ed25519.constants.PUBLIC_KEY_BYTE_LENGTH);
|
||
|
var sk = new NativeBuffer(ed25519.constants.PRIVATE_KEY_BYTE_LENGTH);
|
||
|
for(var i = 0; i < 32; ++i) {
|
||
|
sk[i] = seed[i];
|
||
|
}
|
||
|
crypto_sign_keypair(pk, sk);
|
||
|
return {publicKey: pk, privateKey: sk};
|
||
|
};
|
||
|
|
||
|
/**
|
||
|
* Converts a private key from a RFC8410 ASN.1 encoding.
|
||
|
*
|
||
|
* @param obj - The asn1 representation of a private key.
|
||
|
*
|
||
|
* @returns {Object} keyInfo - The key information.
|
||
|
* @returns {Buffer|Uint8Array} keyInfo.privateKeyBytes - 32 private key bytes.
|
||
|
*/
|
||
|
ed25519.privateKeyFromAsn1 = function(obj) {
|
||
|
var capture = {};
|
||
|
var errors = [];
|
||
|
var valid = forge.asn1.validate(obj, privateKeyValidator, capture, errors);
|
||
|
if(!valid) {
|
||
|
var error = new Error('Invalid Key.');
|
||
|
error.errors = errors;
|
||
|
throw error;
|
||
|
}
|
||
|
var oid = forge.asn1.derToOid(capture.privateKeyOid);
|
||
|
var ed25519Oid = forge.oids.EdDSA25519;
|
||
|
if(oid !== ed25519Oid) {
|
||
|
throw new Error('Invalid OID "' + oid + '"; OID must be "' +
|
||
|
ed25519Oid + '".');
|
||
|
}
|
||
|
var privateKey = capture.privateKey;
|
||
|
// manually extract the private key bytes from nested octet string, see FIXME:
|
||
|
// https://github.com/digitalbazaar/forge/blob/master/lib/asn1.js#L542
|
||
|
var privateKeyBytes = messageToNativeBuffer({
|
||
|
message: forge.asn1.fromDer(privateKey).value,
|
||
|
encoding: 'binary'
|
||
|
});
|
||
|
// TODO: RFC8410 specifies a format for encoding the public key bytes along
|
||
|
// with the private key bytes. `publicKeyBytes` can be returned in the
|
||
|
// future. https://tools.ietf.org/html/rfc8410#section-10.3
|
||
|
return {privateKeyBytes: privateKeyBytes};
|
||
|
};
|
||
|
|
||
|
/**
|
||
|
* Converts a public key from a RFC8410 ASN.1 encoding.
|
||
|
*
|
||
|
* @param obj - The asn1 representation of a public key.
|
||
|
*
|
||
|
* @return {Buffer|Uint8Array} - 32 public key bytes.
|
||
|
*/
|
||
|
ed25519.publicKeyFromAsn1 = function(obj) {
|
||
|
// get SubjectPublicKeyInfo
|
||
|
var capture = {};
|
||
|
var errors = [];
|
||
|
var valid = forge.asn1.validate(obj, publicKeyValidator, capture, errors);
|
||
|
if(!valid) {
|
||
|
var error = new Error('Invalid Key.');
|
||
|
error.errors = errors;
|
||
|
throw error;
|
||
|
}
|
||
|
var oid = forge.asn1.derToOid(capture.publicKeyOid);
|
||
|
var ed25519Oid = forge.oids.EdDSA25519;
|
||
|
if(oid !== ed25519Oid) {
|
||
|
throw new Error('Invalid OID "' + oid + '"; OID must be "' +
|
||
|
ed25519Oid + '".');
|
||
|
}
|
||
|
var publicKeyBytes = capture.ed25519PublicKey;
|
||
|
if(publicKeyBytes.length !== ed25519.constants.PUBLIC_KEY_BYTE_LENGTH) {
|
||
|
throw new Error('Key length is invalid.');
|
||
|
}
|
||
|
return messageToNativeBuffer({
|
||
|
message: publicKeyBytes,
|
||
|
encoding: 'binary'
|
||
|
});
|
||
|
};
|
||
|
|
||
|
ed25519.publicKeyFromPrivateKey = function(options) {
|
||
|
options = options || {};
|
||
|
var privateKey = messageToNativeBuffer({
|
||
|
message: options.privateKey, encoding: 'binary'
|
||
|
});
|
||
|
if(privateKey.length !== ed25519.constants.PRIVATE_KEY_BYTE_LENGTH) {
|
||
|
throw new TypeError(
|
||
|
'"options.privateKey" must have a byte length of ' +
|
||
|
ed25519.constants.PRIVATE_KEY_BYTE_LENGTH);
|
||
|
}
|
||
|
|
||
|
var pk = new NativeBuffer(ed25519.constants.PUBLIC_KEY_BYTE_LENGTH);
|
||
|
for(var i = 0; i < pk.length; ++i) {
|
||
|
pk[i] = privateKey[32 + i];
|
||
|
}
|
||
|
return pk;
|
||
|
};
|
||
|
|
||
|
ed25519.sign = function(options) {
|
||
|
options = options || {};
|
||
|
var msg = messageToNativeBuffer(options);
|
||
|
var privateKey = messageToNativeBuffer({
|
||
|
message: options.privateKey,
|
||
|
encoding: 'binary'
|
||
|
});
|
||
|
if(privateKey.length === ed25519.constants.SEED_BYTE_LENGTH) {
|
||
|
var keyPair = ed25519.generateKeyPair({seed: privateKey});
|
||
|
privateKey = keyPair.privateKey;
|
||
|
} else if(privateKey.length !== ed25519.constants.PRIVATE_KEY_BYTE_LENGTH) {
|
||
|
throw new TypeError(
|
||
|
'"options.privateKey" must have a byte length of ' +
|
||
|
ed25519.constants.SEED_BYTE_LENGTH + ' or ' +
|
||
|
ed25519.constants.PRIVATE_KEY_BYTE_LENGTH);
|
||
|
}
|
||
|
|
||
|
var signedMsg = new NativeBuffer(
|
||
|
ed25519.constants.SIGN_BYTE_LENGTH + msg.length);
|
||
|
crypto_sign(signedMsg, msg, msg.length, privateKey);
|
||
|
|
||
|
var sig = new NativeBuffer(ed25519.constants.SIGN_BYTE_LENGTH);
|
||
|
for(var i = 0; i < sig.length; ++i) {
|
||
|
sig[i] = signedMsg[i];
|
||
|
}
|
||
|
return sig;
|
||
|
};
|
||
|
|
||
|
ed25519.verify = function(options) {
|
||
|
options = options || {};
|
||
|
var msg = messageToNativeBuffer(options);
|
||
|
if(options.signature === undefined) {
|
||
|
throw new TypeError(
|
||
|
'"options.signature" must be a node.js Buffer, a Uint8Array, a forge ' +
|
||
|
'ByteBuffer, or a binary string.');
|
||
|
}
|
||
|
var sig = messageToNativeBuffer({
|
||
|
message: options.signature,
|
||
|
encoding: 'binary'
|
||
|
});
|
||
|
if(sig.length !== ed25519.constants.SIGN_BYTE_LENGTH) {
|
||
|
throw new TypeError(
|
||
|
'"options.signature" must have a byte length of ' +
|
||
|
ed25519.constants.SIGN_BYTE_LENGTH);
|
||
|
}
|
||
|
var publicKey = messageToNativeBuffer({
|
||
|
message: options.publicKey,
|
||
|
encoding: 'binary'
|
||
|
});
|
||
|
if(publicKey.length !== ed25519.constants.PUBLIC_KEY_BYTE_LENGTH) {
|
||
|
throw new TypeError(
|
||
|
'"options.publicKey" must have a byte length of ' +
|
||
|
ed25519.constants.PUBLIC_KEY_BYTE_LENGTH);
|
||
|
}
|
||
|
|
||
|
var sm = new NativeBuffer(ed25519.constants.SIGN_BYTE_LENGTH + msg.length);
|
||
|
var m = new NativeBuffer(ed25519.constants.SIGN_BYTE_LENGTH + msg.length);
|
||
|
var i;
|
||
|
for(i = 0; i < ed25519.constants.SIGN_BYTE_LENGTH; ++i) {
|
||
|
sm[i] = sig[i];
|
||
|
}
|
||
|
for(i = 0; i < msg.length; ++i) {
|
||
|
sm[i + ed25519.constants.SIGN_BYTE_LENGTH] = msg[i];
|
||
|
}
|
||
|
return (crypto_sign_open(m, sm, sm.length, publicKey) >= 0);
|
||
|
};
|
||
|
|
||
|
function messageToNativeBuffer(options) {
|
||
|
var message = options.message;
|
||
|
if(message instanceof Uint8Array || message instanceof NativeBuffer) {
|
||
|
return message;
|
||
|
}
|
||
|
|
||
|
var encoding = options.encoding;
|
||
|
if(message === undefined) {
|
||
|
if(options.md) {
|
||
|
// TODO: more rigorous validation that `md` is a MessageDigest
|
||
|
message = options.md.digest().getBytes();
|
||
|
encoding = 'binary';
|
||
|
} else {
|
||
|
throw new TypeError('"options.message" or "options.md" not specified.');
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if(typeof message === 'string' && !encoding) {
|
||
|
throw new TypeError('"options.encoding" must be "binary" or "utf8".');
|
||
|
}
|
||
|
|
||
|
if(typeof message === 'string') {
|
||
|
if(typeof Buffer !== 'undefined') {
|
||
|
return Buffer.from(message, encoding);
|
||
|
}
|
||
|
message = new ByteBuffer(message, encoding);
|
||
|
} else if(!(message instanceof ByteBuffer)) {
|
||
|
throw new TypeError(
|
||
|
'"options.message" must be a node.js Buffer, a Uint8Array, a forge ' +
|
||
|
'ByteBuffer, or a string with "options.encoding" specifying its ' +
|
||
|
'encoding.');
|
||
|
}
|
||
|
|
||
|
// convert to native buffer
|
||
|
var buffer = new NativeBuffer(message.length());
|
||
|
for(var i = 0; i < buffer.length; ++i) {
|
||
|
buffer[i] = message.at(i);
|
||
|
}
|
||
|
return buffer;
|
||
|
}
|
||
|
|
||
|
var gf0 = gf();
|
||
|
var gf1 = gf([1]);
|
||
|
var D = gf([
|
||
|
0x78a3, 0x1359, 0x4dca, 0x75eb, 0xd8ab, 0x4141, 0x0a4d, 0x0070,
|
||
|
0xe898, 0x7779, 0x4079, 0x8cc7, 0xfe73, 0x2b6f, 0x6cee, 0x5203]);
|
||
|
var D2 = gf([
|
||
|
0xf159, 0x26b2, 0x9b94, 0xebd6, 0xb156, 0x8283, 0x149a, 0x00e0,
|
||
|
0xd130, 0xeef3, 0x80f2, 0x198e, 0xfce7, 0x56df, 0xd9dc, 0x2406]);
|
||
|
var X = gf([
|
||
|
0xd51a, 0x8f25, 0x2d60, 0xc956, 0xa7b2, 0x9525, 0xc760, 0x692c,
|
||
|
0xdc5c, 0xfdd6, 0xe231, 0xc0a4, 0x53fe, 0xcd6e, 0x36d3, 0x2169]);
|
||
|
var Y = gf([
|
||
|
0x6658, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666,
|
||
|
0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666, 0x6666]);
|
||
|
var L = new Float64Array([
|
||
|
0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58,
|
||
|
0xd6, 0x9c, 0xf7, 0xa2, 0xde, 0xf9, 0xde, 0x14,
|
||
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x10]);
|
||
|
var I = gf([
|
||
|
0xa0b0, 0x4a0e, 0x1b27, 0xc4ee, 0xe478, 0xad2f, 0x1806, 0x2f43,
|
||
|
0xd7a7, 0x3dfb, 0x0099, 0x2b4d, 0xdf0b, 0x4fc1, 0x2480, 0x2b83]);
|
||
|
|
||
|
// TODO: update forge buffer implementation to use `Buffer` or `Uint8Array`,
|
||
|
// whichever is available, to improve performance
|
||
|
function sha512(msg, msgLen) {
|
||
|
// Note: `out` and `msg` are NativeBuffer
|
||
|
var md = forge.md.sha512.create();
|
||
|
var buffer = new ByteBuffer(msg);
|
||
|
md.update(buffer.getBytes(msgLen), 'binary');
|
||
|
var hash = md.digest().getBytes();
|
||
|
if(typeof Buffer !== 'undefined') {
|
||
|
return Buffer.from(hash, 'binary');
|
||
|
}
|
||
|
var out = new NativeBuffer(ed25519.constants.HASH_BYTE_LENGTH);
|
||
|
for(var i = 0; i < 64; ++i) {
|
||
|
out[i] = hash.charCodeAt(i);
|
||
|
}
|
||
|
return out;
|
||
|
}
|
||
|
|
||
|
function crypto_sign_keypair(pk, sk) {
|
||
|
var p = [gf(), gf(), gf(), gf()];
|
||
|
var i;
|
||
|
|
||
|
var d = sha512(sk, 32);
|
||
|
d[0] &= 248;
|
||
|
d[31] &= 127;
|
||
|
d[31] |= 64;
|
||
|
|
||
|
scalarbase(p, d);
|
||
|
pack(pk, p);
|
||
|
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
sk[i + 32] = pk[i];
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
// Note: difference from C - smlen returned, not passed as argument.
|
||
|
function crypto_sign(sm, m, n, sk) {
|
||
|
var i, j, x = new Float64Array(64);
|
||
|
var p = [gf(), gf(), gf(), gf()];
|
||
|
|
||
|
var d = sha512(sk, 32);
|
||
|
d[0] &= 248;
|
||
|
d[31] &= 127;
|
||
|
d[31] |= 64;
|
||
|
|
||
|
var smlen = n + 64;
|
||
|
for(i = 0; i < n; ++i) {
|
||
|
sm[64 + i] = m[i];
|
||
|
}
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
sm[32 + i] = d[32 + i];
|
||
|
}
|
||
|
|
||
|
var r = sha512(sm.subarray(32), n + 32);
|
||
|
reduce(r);
|
||
|
scalarbase(p, r);
|
||
|
pack(sm, p);
|
||
|
|
||
|
for(i = 32; i < 64; ++i) {
|
||
|
sm[i] = sk[i];
|
||
|
}
|
||
|
var h = sha512(sm, n + 64);
|
||
|
reduce(h);
|
||
|
|
||
|
for(i = 32; i < 64; ++i) {
|
||
|
x[i] = 0;
|
||
|
}
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
x[i] = r[i];
|
||
|
}
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
for(j = 0; j < 32; j++) {
|
||
|
x[i + j] += h[i] * d[j];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
modL(sm.subarray(32), x);
|
||
|
return smlen;
|
||
|
}
|
||
|
|
||
|
function crypto_sign_open(m, sm, n, pk) {
|
||
|
var i, mlen;
|
||
|
var t = new NativeBuffer(32);
|
||
|
var p = [gf(), gf(), gf(), gf()],
|
||
|
q = [gf(), gf(), gf(), gf()];
|
||
|
|
||
|
mlen = -1;
|
||
|
if(n < 64) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if(unpackneg(q, pk)) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
for(i = 0; i < n; ++i) {
|
||
|
m[i] = sm[i];
|
||
|
}
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
m[i + 32] = pk[i];
|
||
|
}
|
||
|
var h = sha512(m, n);
|
||
|
reduce(h);
|
||
|
scalarmult(p, q, h);
|
||
|
|
||
|
scalarbase(q, sm.subarray(32));
|
||
|
add(p, q);
|
||
|
pack(t, p);
|
||
|
|
||
|
n -= 64;
|
||
|
if(crypto_verify_32(sm, 0, t, 0)) {
|
||
|
for(i = 0; i < n; ++i) {
|
||
|
m[i] = 0;
|
||
|
}
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
for(i = 0; i < n; ++i) {
|
||
|
m[i] = sm[i + 64];
|
||
|
}
|
||
|
mlen = n;
|
||
|
return mlen;
|
||
|
}
|
||
|
|
||
|
function modL(r, x) {
|
||
|
var carry, i, j, k;
|
||
|
for(i = 63; i >= 32; --i) {
|
||
|
carry = 0;
|
||
|
for(j = i - 32, k = i - 12; j < k; ++j) {
|
||
|
x[j] += carry - 16 * x[i] * L[j - (i - 32)];
|
||
|
carry = (x[j] + 128) >> 8;
|
||
|
x[j] -= carry * 256;
|
||
|
}
|
||
|
x[j] += carry;
|
||
|
x[i] = 0;
|
||
|
}
|
||
|
carry = 0;
|
||
|
for(j = 0; j < 32; ++j) {
|
||
|
x[j] += carry - (x[31] >> 4) * L[j];
|
||
|
carry = x[j] >> 8;
|
||
|
x[j] &= 255;
|
||
|
}
|
||
|
for(j = 0; j < 32; ++j) {
|
||
|
x[j] -= carry * L[j];
|
||
|
}
|
||
|
for(i = 0; i < 32; ++i) {
|
||
|
x[i + 1] += x[i] >> 8;
|
||
|
r[i] = x[i] & 255;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function reduce(r) {
|
||
|
var x = new Float64Array(64);
|
||
|
for(var i = 0; i < 64; ++i) {
|
||
|
x[i] = r[i];
|
||
|
r[i] = 0;
|
||
|
}
|
||
|
modL(r, x);
|
||
|
}
|
||
|
|
||
|
function add(p, q) {
|
||
|
var a = gf(), b = gf(), c = gf(),
|
||
|
d = gf(), e = gf(), f = gf(),
|
||
|
g = gf(), h = gf(), t = gf();
|
||
|
|
||
|
Z(a, p[1], p[0]);
|
||
|
Z(t, q[1], q[0]);
|
||
|
M(a, a, t);
|
||
|
A(b, p[0], p[1]);
|
||
|
A(t, q[0], q[1]);
|
||
|
M(b, b, t);
|
||
|
M(c, p[3], q[3]);
|
||
|
M(c, c, D2);
|
||
|
M(d, p[2], q[2]);
|
||
|
A(d, d, d);
|
||
|
Z(e, b, a);
|
||
|
Z(f, d, c);
|
||
|
A(g, d, c);
|
||
|
A(h, b, a);
|
||
|
|
||
|
M(p[0], e, f);
|
||
|
M(p[1], h, g);
|
||
|
M(p[2], g, f);
|
||
|
M(p[3], e, h);
|
||
|
}
|
||
|
|
||
|
function cswap(p, q, b) {
|
||
|
for(var i = 0; i < 4; ++i) {
|
||
|
sel25519(p[i], q[i], b);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function pack(r, p) {
|
||
|
var tx = gf(), ty = gf(), zi = gf();
|
||
|
inv25519(zi, p[2]);
|
||
|
M(tx, p[0], zi);
|
||
|
M(ty, p[1], zi);
|
||
|
pack25519(r, ty);
|
||
|
r[31] ^= par25519(tx) << 7;
|
||
|
}
|
||
|
|
||
|
function pack25519(o, n) {
|
||
|
var i, j, b;
|
||
|
var m = gf(), t = gf();
|
||
|
for(i = 0; i < 16; ++i) {
|
||
|
t[i] = n[i];
|
||
|
}
|
||
|
car25519(t);
|
||
|
car25519(t);
|
||
|
car25519(t);
|
||
|
for(j = 0; j < 2; ++j) {
|
||
|
m[0] = t[0] - 0xffed;
|
||
|
for(i = 1; i < 15; ++i) {
|
||
|
m[i] = t[i] - 0xffff - ((m[i - 1] >> 16) & 1);
|
||
|
m[i-1] &= 0xffff;
|
||
|
}
|
||
|
m[15] = t[15] - 0x7fff - ((m[14] >> 16) & 1);
|
||
|
b = (m[15] >> 16) & 1;
|
||
|
m[14] &= 0xffff;
|
||
|
sel25519(t, m, 1 - b);
|
||
|
}
|
||
|
for (i = 0; i < 16; i++) {
|
||
|
o[2 * i] = t[i] & 0xff;
|
||
|
o[2 * i + 1] = t[i] >> 8;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function unpackneg(r, p) {
|
||
|
var t = gf(), chk = gf(), num = gf(),
|
||
|
den = gf(), den2 = gf(), den4 = gf(),
|
||
|
den6 = gf();
|
||
|
|
||
|
set25519(r[2], gf1);
|
||
|
unpack25519(r[1], p);
|
||
|
S(num, r[1]);
|
||
|
M(den, num, D);
|
||
|
Z(num, num, r[2]);
|
||
|
A(den, r[2], den);
|
||
|
|
||
|
S(den2, den);
|
||
|
S(den4, den2);
|
||
|
M(den6, den4, den2);
|
||
|
M(t, den6, num);
|
||
|
M(t, t, den);
|
||
|
|
||
|
pow2523(t, t);
|
||
|
M(t, t, num);
|
||
|
M(t, t, den);
|
||
|
M(t, t, den);
|
||
|
M(r[0], t, den);
|
||
|
|
||
|
S(chk, r[0]);
|
||
|
M(chk, chk, den);
|
||
|
if(neq25519(chk, num)) {
|
||
|
M(r[0], r[0], I);
|
||
|
}
|
||
|
|
||
|
S(chk, r[0]);
|
||
|
M(chk, chk, den);
|
||
|
if(neq25519(chk, num)) {
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
if(par25519(r[0]) === (p[31] >> 7)) {
|
||
|
Z(r[0], gf0, r[0]);
|
||
|
}
|
||
|
|
||
|
M(r[3], r[0], r[1]);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
function unpack25519(o, n) {
|
||
|
var i;
|
||
|
for(i = 0; i < 16; ++i) {
|
||
|
o[i] = n[2 * i] + (n[2 * i + 1] << 8);
|
||
|
}
|
||
|
o[15] &= 0x7fff;
|
||
|
}
|
||
|
|
||
|
function pow2523(o, i) {
|
||
|
var c = gf();
|
||
|
var a;
|
||
|
for(a = 0; a < 16; ++a) {
|
||
|
c[a] = i[a];
|
||
|
}
|
||
|
for(a = 250; a >= 0; --a) {
|
||
|
S(c, c);
|
||
|
if(a !== 1) {
|
||
|
M(c, c, i);
|
||
|
}
|
||
|
}
|
||
|
for(a = 0; a < 16; ++a) {
|
||
|
o[a] = c[a];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function neq25519(a, b) {
|
||
|
var c = new NativeBuffer(32);
|
||
|
var d = new NativeBuffer(32);
|
||
|
pack25519(c, a);
|
||
|
pack25519(d, b);
|
||
|
return crypto_verify_32(c, 0, d, 0);
|
||
|
}
|
||
|
|
||
|
function crypto_verify_32(x, xi, y, yi) {
|
||
|
return vn(x, xi, y, yi, 32);
|
||
|
}
|
||
|
|
||
|
function vn(x, xi, y, yi, n) {
|
||
|
var i, d = 0;
|
||
|
for(i = 0; i < n; ++i) {
|
||
|
d |= x[xi + i] ^ y[yi + i];
|
||
|
}
|
||
|
return (1 & ((d - 1) >>> 8)) - 1;
|
||
|
}
|
||
|
|
||
|
function par25519(a) {
|
||
|
var d = new NativeBuffer(32);
|
||
|
pack25519(d, a);
|
||
|
return d[0] & 1;
|
||
|
}
|
||
|
|
||
|
function scalarmult(p, q, s) {
|
||
|
var b, i;
|
||
|
set25519(p[0], gf0);
|
||
|
set25519(p[1], gf1);
|
||
|
set25519(p[2], gf1);
|
||
|
set25519(p[3], gf0);
|
||
|
for(i = 255; i >= 0; --i) {
|
||
|
b = (s[(i / 8)|0] >> (i & 7)) & 1;
|
||
|
cswap(p, q, b);
|
||
|
add(q, p);
|
||
|
add(p, p);
|
||
|
cswap(p, q, b);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function scalarbase(p, s) {
|
||
|
var q = [gf(), gf(), gf(), gf()];
|
||
|
set25519(q[0], X);
|
||
|
set25519(q[1], Y);
|
||
|
set25519(q[2], gf1);
|
||
|
M(q[3], X, Y);
|
||
|
scalarmult(p, q, s);
|
||
|
}
|
||
|
|
||
|
function set25519(r, a) {
|
||
|
var i;
|
||
|
for(i = 0; i < 16; i++) {
|
||
|
r[i] = a[i] | 0;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function inv25519(o, i) {
|
||
|
var c = gf();
|
||
|
var a;
|
||
|
for(a = 0; a < 16; ++a) {
|
||
|
c[a] = i[a];
|
||
|
}
|
||
|
for(a = 253; a >= 0; --a) {
|
||
|
S(c, c);
|
||
|
if(a !== 2 && a !== 4) {
|
||
|
M(c, c, i);
|
||
|
}
|
||
|
}
|
||
|
for(a = 0; a < 16; ++a) {
|
||
|
o[a] = c[a];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function car25519(o) {
|
||
|
var i, v, c = 1;
|
||
|
for(i = 0; i < 16; ++i) {
|
||
|
v = o[i] + c + 65535;
|
||
|
c = Math.floor(v / 65536);
|
||
|
o[i] = v - c * 65536;
|
||
|
}
|
||
|
o[0] += c - 1 + 37 * (c - 1);
|
||
|
}
|
||
|
|
||
|
function sel25519(p, q, b) {
|
||
|
var t, c = ~(b - 1);
|
||
|
for(var i = 0; i < 16; ++i) {
|
||
|
t = c & (p[i] ^ q[i]);
|
||
|
p[i] ^= t;
|
||
|
q[i] ^= t;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function gf(init) {
|
||
|
var i, r = new Float64Array(16);
|
||
|
if(init) {
|
||
|
for(i = 0; i < init.length; ++i) {
|
||
|
r[i] = init[i];
|
||
|
}
|
||
|
}
|
||
|
return r;
|
||
|
}
|
||
|
|
||
|
function A(o, a, b) {
|
||
|
for(var i = 0; i < 16; ++i) {
|
||
|
o[i] = a[i] + b[i];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function Z(o, a, b) {
|
||
|
for(var i = 0; i < 16; ++i) {
|
||
|
o[i] = a[i] - b[i];
|
||
|
}
|
||
|
}
|
||
|
|
||
|
function S(o, a) {
|
||
|
M(o, a, a);
|
||
|
}
|
||
|
|
||
|
function M(o, a, b) {
|
||
|
var v, c,
|
||
|
t0 = 0, t1 = 0, t2 = 0, t3 = 0, t4 = 0, t5 = 0, t6 = 0, t7 = 0,
|
||
|
t8 = 0, t9 = 0, t10 = 0, t11 = 0, t12 = 0, t13 = 0, t14 = 0, t15 = 0,
|
||
|
t16 = 0, t17 = 0, t18 = 0, t19 = 0, t20 = 0, t21 = 0, t22 = 0, t23 = 0,
|
||
|
t24 = 0, t25 = 0, t26 = 0, t27 = 0, t28 = 0, t29 = 0, t30 = 0,
|
||
|
b0 = b[0],
|
||
|
b1 = b[1],
|
||
|
b2 = b[2],
|
||
|
b3 = b[3],
|
||
|
b4 = b[4],
|
||
|
b5 = b[5],
|
||
|
b6 = b[6],
|
||
|
b7 = b[7],
|
||
|
b8 = b[8],
|
||
|
b9 = b[9],
|
||
|
b10 = b[10],
|
||
|
b11 = b[11],
|
||
|
b12 = b[12],
|
||
|
b13 = b[13],
|
||
|
b14 = b[14],
|
||
|
b15 = b[15];
|
||
|
|
||
|
v = a[0];
|
||
|
t0 += v * b0;
|
||
|
t1 += v * b1;
|
||
|
t2 += v * b2;
|
||
|
t3 += v * b3;
|
||
|
t4 += v * b4;
|
||
|
t5 += v * b5;
|
||
|
t6 += v * b6;
|
||
|
t7 += v * b7;
|
||
|
t8 += v * b8;
|
||
|
t9 += v * b9;
|
||
|
t10 += v * b10;
|
||
|
t11 += v * b11;
|
||
|
t12 += v * b12;
|
||
|
t13 += v * b13;
|
||
|
t14 += v * b14;
|
||
|
t15 += v * b15;
|
||
|
v = a[1];
|
||
|
t1 += v * b0;
|
||
|
t2 += v * b1;
|
||
|
t3 += v * b2;
|
||
|
t4 += v * b3;
|
||
|
t5 += v * b4;
|
||
|
t6 += v * b5;
|
||
|
t7 += v * b6;
|
||
|
t8 += v * b7;
|
||
|
t9 += v * b8;
|
||
|
t10 += v * b9;
|
||
|
t11 += v * b10;
|
||
|
t12 += v * b11;
|
||
|
t13 += v * b12;
|
||
|
t14 += v * b13;
|
||
|
t15 += v * b14;
|
||
|
t16 += v * b15;
|
||
|
v = a[2];
|
||
|
t2 += v * b0;
|
||
|
t3 += v * b1;
|
||
|
t4 += v * b2;
|
||
|
t5 += v * b3;
|
||
|
t6 += v * b4;
|
||
|
t7 += v * b5;
|
||
|
t8 += v * b6;
|
||
|
t9 += v * b7;
|
||
|
t10 += v * b8;
|
||
|
t11 += v * b9;
|
||
|
t12 += v * b10;
|
||
|
t13 += v * b11;
|
||
|
t14 += v * b12;
|
||
|
t15 += v * b13;
|
||
|
t16 += v * b14;
|
||
|
t17 += v * b15;
|
||
|
v = a[3];
|
||
|
t3 += v * b0;
|
||
|
t4 += v * b1;
|
||
|
t5 += v * b2;
|
||
|
t6 += v * b3;
|
||
|
t7 += v * b4;
|
||
|
t8 += v * b5;
|
||
|
t9 += v * b6;
|
||
|
t10 += v * b7;
|
||
|
t11 += v * b8;
|
||
|
t12 += v * b9;
|
||
|
t13 += v * b10;
|
||
|
t14 += v * b11;
|
||
|
t15 += v * b12;
|
||
|
t16 += v * b13;
|
||
|
t17 += v * b14;
|
||
|
t18 += v * b15;
|
||
|
v = a[4];
|
||
|
t4 += v * b0;
|
||
|
t5 += v * b1;
|
||
|
t6 += v * b2;
|
||
|
t7 += v * b3;
|
||
|
t8 += v * b4;
|
||
|
t9 += v * b5;
|
||
|
t10 += v * b6;
|
||
|
t11 += v * b7;
|
||
|
t12 += v * b8;
|
||
|
t13 += v * b9;
|
||
|
t14 += v * b10;
|
||
|
t15 += v * b11;
|
||
|
t16 += v * b12;
|
||
|
t17 += v * b13;
|
||
|
t18 += v * b14;
|
||
|
t19 += v * b15;
|
||
|
v = a[5];
|
||
|
t5 += v * b0;
|
||
|
t6 += v * b1;
|
||
|
t7 += v * b2;
|
||
|
t8 += v * b3;
|
||
|
t9 += v * b4;
|
||
|
t10 += v * b5;
|
||
|
t11 += v * b6;
|
||
|
t12 += v * b7;
|
||
|
t13 += v * b8;
|
||
|
t14 += v * b9;
|
||
|
t15 += v * b10;
|
||
|
t16 += v * b11;
|
||
|
t17 += v * b12;
|
||
|
t18 += v * b13;
|
||
|
t19 += v * b14;
|
||
|
t20 += v * b15;
|
||
|
v = a[6];
|
||
|
t6 += v * b0;
|
||
|
t7 += v * b1;
|
||
|
t8 += v * b2;
|
||
|
t9 += v * b3;
|
||
|
t10 += v * b4;
|
||
|
t11 += v * b5;
|
||
|
t12 += v * b6;
|
||
|
t13 += v * b7;
|
||
|
t14 += v * b8;
|
||
|
t15 += v * b9;
|
||
|
t16 += v * b10;
|
||
|
t17 += v * b11;
|
||
|
t18 += v * b12;
|
||
|
t19 += v * b13;
|
||
|
t20 += v * b14;
|
||
|
t21 += v * b15;
|
||
|
v = a[7];
|
||
|
t7 += v * b0;
|
||
|
t8 += v * b1;
|
||
|
t9 += v * b2;
|
||
|
t10 += v * b3;
|
||
|
t11 += v * b4;
|
||
|
t12 += v * b5;
|
||
|
t13 += v * b6;
|
||
|
t14 += v * b7;
|
||
|
t15 += v * b8;
|
||
|
t16 += v * b9;
|
||
|
t17 += v * b10;
|
||
|
t18 += v * b11;
|
||
|
t19 += v * b12;
|
||
|
t20 += v * b13;
|
||
|
t21 += v * b14;
|
||
|
t22 += v * b15;
|
||
|
v = a[8];
|
||
|
t8 += v * b0;
|
||
|
t9 += v * b1;
|
||
|
t10 += v * b2;
|
||
|
t11 += v * b3;
|
||
|
t12 += v * b4;
|
||
|
t13 += v * b5;
|
||
|
t14 += v * b6;
|
||
|
t15 += v * b7;
|
||
|
t16 += v * b8;
|
||
|
t17 += v * b9;
|
||
|
t18 += v * b10;
|
||
|
t19 += v * b11;
|
||
|
t20 += v * b12;
|
||
|
t21 += v * b13;
|
||
|
t22 += v * b14;
|
||
|
t23 += v * b15;
|
||
|
v = a[9];
|
||
|
t9 += v * b0;
|
||
|
t10 += v * b1;
|
||
|
t11 += v * b2;
|
||
|
t12 += v * b3;
|
||
|
t13 += v * b4;
|
||
|
t14 += v * b5;
|
||
|
t15 += v * b6;
|
||
|
t16 += v * b7;
|
||
|
t17 += v * b8;
|
||
|
t18 += v * b9;
|
||
|
t19 += v * b10;
|
||
|
t20 += v * b11;
|
||
|
t21 += v * b12;
|
||
|
t22 += v * b13;
|
||
|
t23 += v * b14;
|
||
|
t24 += v * b15;
|
||
|
v = a[10];
|
||
|
t10 += v * b0;
|
||
|
t11 += v * b1;
|
||
|
t12 += v * b2;
|
||
|
t13 += v * b3;
|
||
|
t14 += v * b4;
|
||
|
t15 += v * b5;
|
||
|
t16 += v * b6;
|
||
|
t17 += v * b7;
|
||
|
t18 += v * b8;
|
||
|
t19 += v * b9;
|
||
|
t20 += v * b10;
|
||
|
t21 += v * b11;
|
||
|
t22 += v * b12;
|
||
|
t23 += v * b13;
|
||
|
t24 += v * b14;
|
||
|
t25 += v * b15;
|
||
|
v = a[11];
|
||
|
t11 += v * b0;
|
||
|
t12 += v * b1;
|
||
|
t13 += v * b2;
|
||
|
t14 += v * b3;
|
||
|
t15 += v * b4;
|
||
|
t16 += v * b5;
|
||
|
t17 += v * b6;
|
||
|
t18 += v * b7;
|
||
|
t19 += v * b8;
|
||
|
t20 += v * b9;
|
||
|
t21 += v * b10;
|
||
|
t22 += v * b11;
|
||
|
t23 += v * b12;
|
||
|
t24 += v * b13;
|
||
|
t25 += v * b14;
|
||
|
t26 += v * b15;
|
||
|
v = a[12];
|
||
|
t12 += v * b0;
|
||
|
t13 += v * b1;
|
||
|
t14 += v * b2;
|
||
|
t15 += v * b3;
|
||
|
t16 += v * b4;
|
||
|
t17 += v * b5;
|
||
|
t18 += v * b6;
|
||
|
t19 += v * b7;
|
||
|
t20 += v * b8;
|
||
|
t21 += v * b9;
|
||
|
t22 += v * b10;
|
||
|
t23 += v * b11;
|
||
|
t24 += v * b12;
|
||
|
t25 += v * b13;
|
||
|
t26 += v * b14;
|
||
|
t27 += v * b15;
|
||
|
v = a[13];
|
||
|
t13 += v * b0;
|
||
|
t14 += v * b1;
|
||
|
t15 += v * b2;
|
||
|
t16 += v * b3;
|
||
|
t17 += v * b4;
|
||
|
t18 += v * b5;
|
||
|
t19 += v * b6;
|
||
|
t20 += v * b7;
|
||
|
t21 += v * b8;
|
||
|
t22 += v * b9;
|
||
|
t23 += v * b10;
|
||
|
t24 += v * b11;
|
||
|
t25 += v * b12;
|
||
|
t26 += v * b13;
|
||
|
t27 += v * b14;
|
||
|
t28 += v * b15;
|
||
|
v = a[14];
|
||
|
t14 += v * b0;
|
||
|
t15 += v * b1;
|
||
|
t16 += v * b2;
|
||
|
t17 += v * b3;
|
||
|
t18 += v * b4;
|
||
|
t19 += v * b5;
|
||
|
t20 += v * b6;
|
||
|
t21 += v * b7;
|
||
|
t22 += v * b8;
|
||
|
t23 += v * b9;
|
||
|
t24 += v * b10;
|
||
|
t25 += v * b11;
|
||
|
t26 += v * b12;
|
||
|
t27 += v * b13;
|
||
|
t28 += v * b14;
|
||
|
t29 += v * b15;
|
||
|
v = a[15];
|
||
|
t15 += v * b0;
|
||
|
t16 += v * b1;
|
||
|
t17 += v * b2;
|
||
|
t18 += v * b3;
|
||
|
t19 += v * b4;
|
||
|
t20 += v * b5;
|
||
|
t21 += v * b6;
|
||
|
t22 += v * b7;
|
||
|
t23 += v * b8;
|
||
|
t24 += v * b9;
|
||
|
t25 += v * b10;
|
||
|
t26 += v * b11;
|
||
|
t27 += v * b12;
|
||
|
t28 += v * b13;
|
||
|
t29 += v * b14;
|
||
|
t30 += v * b15;
|
||
|
|
||
|
t0 += 38 * t16;
|
||
|
t1 += 38 * t17;
|
||
|
t2 += 38 * t18;
|
||
|
t3 += 38 * t19;
|
||
|
t4 += 38 * t20;
|
||
|
t5 += 38 * t21;
|
||
|
t6 += 38 * t22;
|
||
|
t7 += 38 * t23;
|
||
|
t8 += 38 * t24;
|
||
|
t9 += 38 * t25;
|
||
|
t10 += 38 * t26;
|
||
|
t11 += 38 * t27;
|
||
|
t12 += 38 * t28;
|
||
|
t13 += 38 * t29;
|
||
|
t14 += 38 * t30;
|
||
|
// t15 left as is
|
||
|
|
||
|
// first car
|
||
|
c = 1;
|
||
|
v = t0 + c + 65535; c = Math.floor(v / 65536); t0 = v - c * 65536;
|
||
|
v = t1 + c + 65535; c = Math.floor(v / 65536); t1 = v - c * 65536;
|
||
|
v = t2 + c + 65535; c = Math.floor(v / 65536); t2 = v - c * 65536;
|
||
|
v = t3 + c + 65535; c = Math.floor(v / 65536); t3 = v - c * 65536;
|
||
|
v = t4 + c + 65535; c = Math.floor(v / 65536); t4 = v - c * 65536;
|
||
|
v = t5 + c + 65535; c = Math.floor(v / 65536); t5 = v - c * 65536;
|
||
|
v = t6 + c + 65535; c = Math.floor(v / 65536); t6 = v - c * 65536;
|
||
|
v = t7 + c + 65535; c = Math.floor(v / 65536); t7 = v - c * 65536;
|
||
|
v = t8 + c + 65535; c = Math.floor(v / 65536); t8 = v - c * 65536;
|
||
|
v = t9 + c + 65535; c = Math.floor(v / 65536); t9 = v - c * 65536;
|
||
|
v = t10 + c + 65535; c = Math.floor(v / 65536); t10 = v - c * 65536;
|
||
|
v = t11 + c + 65535; c = Math.floor(v / 65536); t11 = v - c * 65536;
|
||
|
v = t12 + c + 65535; c = Math.floor(v / 65536); t12 = v - c * 65536;
|
||
|
v = t13 + c + 65535; c = Math.floor(v / 65536); t13 = v - c * 65536;
|
||
|
v = t14 + c + 65535; c = Math.floor(v / 65536); t14 = v - c * 65536;
|
||
|
v = t15 + c + 65535; c = Math.floor(v / 65536); t15 = v - c * 65536;
|
||
|
t0 += c-1 + 37 * (c-1);
|
||
|
|
||
|
// second car
|
||
|
c = 1;
|
||
|
v = t0 + c + 65535; c = Math.floor(v / 65536); t0 = v - c * 65536;
|
||
|
v = t1 + c + 65535; c = Math.floor(v / 65536); t1 = v - c * 65536;
|
||
|
v = t2 + c + 65535; c = Math.floor(v / 65536); t2 = v - c * 65536;
|
||
|
v = t3 + c + 65535; c = Math.floor(v / 65536); t3 = v - c * 65536;
|
||
|
v = t4 + c + 65535; c = Math.floor(v / 65536); t4 = v - c * 65536;
|
||
|
v = t5 + c + 65535; c = Math.floor(v / 65536); t5 = v - c * 65536;
|
||
|
v = t6 + c + 65535; c = Math.floor(v / 65536); t6 = v - c * 65536;
|
||
|
v = t7 + c + 65535; c = Math.floor(v / 65536); t7 = v - c * 65536;
|
||
|
v = t8 + c + 65535; c = Math.floor(v / 65536); t8 = v - c * 65536;
|
||
|
v = t9 + c + 65535; c = Math.floor(v / 65536); t9 = v - c * 65536;
|
||
|
v = t10 + c + 65535; c = Math.floor(v / 65536); t10 = v - c * 65536;
|
||
|
v = t11 + c + 65535; c = Math.floor(v / 65536); t11 = v - c * 65536;
|
||
|
v = t12 + c + 65535; c = Math.floor(v / 65536); t12 = v - c * 65536;
|
||
|
v = t13 + c + 65535; c = Math.floor(v / 65536); t13 = v - c * 65536;
|
||
|
v = t14 + c + 65535; c = Math.floor(v / 65536); t14 = v - c * 65536;
|
||
|
v = t15 + c + 65535; c = Math.floor(v / 65536); t15 = v - c * 65536;
|
||
|
t0 += c-1 + 37 * (c-1);
|
||
|
|
||
|
o[ 0] = t0;
|
||
|
o[ 1] = t1;
|
||
|
o[ 2] = t2;
|
||
|
o[ 3] = t3;
|
||
|
o[ 4] = t4;
|
||
|
o[ 5] = t5;
|
||
|
o[ 6] = t6;
|
||
|
o[ 7] = t7;
|
||
|
o[ 8] = t8;
|
||
|
o[ 9] = t9;
|
||
|
o[10] = t10;
|
||
|
o[11] = t11;
|
||
|
o[12] = t12;
|
||
|
o[13] = t13;
|
||
|
o[14] = t14;
|
||
|
o[15] = t15;
|
||
|
}
|