aboutsummaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorFrank Denis <124872+jedisct1@users.noreply.github.com>2022-05-02 20:28:34 -0700
committerGitHub <noreply@github.com>2022-05-03 05:28:34 +0200
commit098bee0e5657bb6dcd92b2b2fa8056ffce893ffc (patch)
tree3ff994f4705f5c0fb13f369ce8c1827a5b7b8fa4 /lib
parentf648a1b0439aaf22be26b29d290e53493f4db16b (diff)
downloadzig-098bee0e5657bb6dcd92b2b2fa8056ffce893ffc.tar.gz
zig-098bee0e5657bb6dcd92b2b2fa8056ffce893ffc.zip
edwards25519 fixes (#11568)
* edwards25519: fix X coordinate of the base point Reported by @OfekShochat -- Thanks! * edwards25519: reduce public scalar when the top bit is set, not cleared This is an optimization for the unexpected case of a scalar larger than the field size. Fixes #11563 * edwards25519: add a test implicit reduction of invalid scalars
Diffstat (limited to 'lib')
-rw-r--r--lib/std/crypto/25519/edwards25519.zig18
1 files changed, 16 insertions, 2 deletions
diff --git a/lib/std/crypto/25519/edwards25519.zig b/lib/std/crypto/25519/edwards25519.zig
index fcfc6ee258..b106304a3a 100644
--- a/lib/std/crypto/25519/edwards25519.zig
+++ b/lib/std/crypto/25519/edwards25519.zig
@@ -62,7 +62,7 @@ pub const Edwards25519 = struct {
/// The edwards25519 base point.
pub const basePoint = Edwards25519{
- .x = Fe{ .limbs = .{ 3990542415680775, 3398198340507945, 4322667446711068, 2814063955482877, 2839572215813860 } },
+ .x = Fe{ .limbs = .{ 1738742601995546, 1146398526822698, 2070867633025821, 562264141797630, 587772402128613 } },
.y = Fe{ .limbs = .{ 1801439850948184, 1351079888211148, 450359962737049, 900719925474099, 1801439850948198 } },
.z = Fe.one,
.t = Fe{ .limbs = .{ 1841354044333475, 16398895984059, 755974180946558, 900171276175154, 1821297809914039 } },
@@ -147,7 +147,7 @@ pub const Edwards25519 = struct {
}
fn slide(s: [32]u8) [2 * 32]i8 {
- const reduced = if ((s[s.len - 1] & 0x80) != 0) s else scalar.reduce(s);
+ const reduced = if ((s[s.len - 1] & 0x80) == 0) s else scalar.reduce(s);
var e: [2 * 32]i8 = undefined;
for (reduced) |x, i| {
e[i * 2 + 0] = @as(i8, @truncate(u4, x));
@@ -549,3 +549,17 @@ test "edwards25519 hash-to-curve operation" {
p = Edwards25519.fromString(false, "QUUX-V01-CS02-with-edwards25519_XMD:SHA-512_ELL2_NU_", "abc");
try htest.assertEqual("42fa27c8f5a1ae0aa38bb59d5938e5145622ba5dedd11d11736fa2f9502d7367", p.toBytes()[0..]);
}
+
+test "edwards25519 implicit reduction of invalid scalars" {
+ const s = [_]u8{0} ** 31 ++ [_]u8{255};
+ const p1 = try Edwards25519.basePoint.mulPublic(s);
+ const p2 = try Edwards25519.basePoint.mul(s);
+ const p3 = try p1.mulPublic(s);
+ const p4 = try p1.mul(s);
+
+ try std.testing.expectEqualSlices(u8, p1.toBytes()[0..], p2.toBytes()[0..]);
+ try std.testing.expectEqualSlices(u8, p3.toBytes()[0..], p4.toBytes()[0..]);
+
+ try htest.assertEqual("339f189ecc5fbebe9895345c72dc07bda6e615f8a40e768441b6f529cd6c671a", p1.toBytes()[0..]);
+ try htest.assertEqual("a501e4c595a3686d8bee7058c7e6af7fd237f945c47546910e37e0e79b1bafb0", p3.toBytes()[0..]);
+}