| @@ -51,7 +51,7 @@ void decaf_255_private_to_public ( | |||
| memcpy(pub, priv->pub, sizeof(decaf_255_public_key_t)); | |||
| } | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_shared_secret ( | |||
| uint8_t *shared, | |||
| size_t shared_bytes, | |||
| @@ -92,15 +92,16 @@ decaf_255_shared_secret ( | |||
| } | |||
| shake256_update(sponge, ss_ser, sizeof(ss_ser)); | |||
| decaf_bool_t ret = decaf_255_direct_scalarmul(ss_ser, your_pubkey, my_privkey->secret_scalar, DECAF_FALSE, DECAF_TRUE); | |||
| decaf_error_t ret = decaf_255_direct_scalarmul(ss_ser, your_pubkey, my_privkey->secret_scalar, DECAF_FALSE, DECAF_TRUE); | |||
| decaf_bool_t good = decaf_successful(ret); | |||
| /* If invalid, then replace ... */ | |||
| for (i=0; i<sizeof(ss_ser); i++) { | |||
| ss_ser[i] &= ret; | |||
| ss_ser[i] &= good; | |||
| if (i < sizeof(my_privkey->sym)) { | |||
| ss_ser[i] |= my_privkey->sym[i] & ~ret; | |||
| ss_ser[i] |= my_privkey->sym[i] & ~good; | |||
| } else if (i - sizeof(my_privkey->sym) < strlen(nope)) { | |||
| ss_ser[i] |= nope[i-sizeof(my_privkey->sym)] & ~ret; | |||
| ss_ser[i] |= nope[i-sizeof(my_privkey->sym)] & ~good; | |||
| } | |||
| } | |||
| @@ -159,7 +160,7 @@ decaf_255_sign_shake ( | |||
| decaf_bzero(encoded,sizeof(encoded)); | |||
| } | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_verify_shake ( | |||
| const decaf_255_signature_t sig, | |||
| const decaf_255_public_key_t pub, | |||
| @@ -181,9 +182,9 @@ decaf_255_verify_shake ( | |||
| decaf_255_scalar_decode_long(challenge, overkill, sizeof(overkill)); | |||
| /* Decode points. */ | |||
| ret = decaf_255_point_decode(point, sig, DECAF_TRUE); | |||
| ret &= decaf_255_point_decode(pubpoint, pub, DECAF_FALSE); | |||
| ret &= decaf_255_scalar_decode(response, &sig[DECAF_255_SER_BYTES]); | |||
| ret = decaf_successful(decaf_255_point_decode(point, sig, DECAF_TRUE)); | |||
| ret &= decaf_successful(decaf_255_point_decode(pubpoint, pub, DECAF_FALSE)); | |||
| ret &= decaf_successful(decaf_255_scalar_decode(response, &sig[DECAF_255_SER_BYTES])); | |||
| decaf_255_base_double_scalarmul_non_secret ( | |||
| pubpoint, response, pubpoint, challenge | |||
| @@ -191,7 +192,7 @@ decaf_255_verify_shake ( | |||
| ret &= decaf_255_point_eq(pubpoint, point); | |||
| return ret; | |||
| return decaf_succeed_if(ret); | |||
| } | |||
| void | |||
| @@ -208,7 +209,7 @@ decaf_255_sign ( | |||
| shake256_destroy(ctx); | |||
| } | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_verify ( | |||
| const decaf_255_signature_t sig, | |||
| const decaf_255_public_key_t pub, | |||
| @@ -218,7 +219,7 @@ decaf_255_verify ( | |||
| shake256_ctx_t ctx; | |||
| shake256_init(ctx); | |||
| shake256_update(ctx, message, message_len); | |||
| decaf_bool_t ret = decaf_255_verify_shake(sig, pub, ctx); | |||
| decaf_error_t ret = decaf_255_verify_shake(sig, pub, ctx); | |||
| shake256_destroy(ctx); | |||
| return ret; | |||
| } | |||
| @@ -261,7 +261,7 @@ static INLINE void sc_montsqr (scalar_t out, const scalar_t a) { | |||
| sc_montmul(out,a,a); | |||
| } | |||
| decaf_bool_t API_NS(scalar_invert) ( | |||
| decaf_error_t API_NS(scalar_invert) ( | |||
| scalar_t out, | |||
| const scalar_t a | |||
| ) { | |||
| @@ -318,7 +318,7 @@ decaf_bool_t API_NS(scalar_invert) ( | |||
| /* Demontgomerize */ | |||
| sc_montmul(out,out,API_NS(scalar_one)); | |||
| decaf_bzero(precmp, sizeof(precmp)); | |||
| return ~API_NS(scalar_eq)(out,API_NS(scalar_zero)); | |||
| return decaf_succeed_if(~API_NS(scalar_eq)(out,API_NS(scalar_zero))); | |||
| } | |||
| void API_NS(scalar_sub) ( | |||
| @@ -510,13 +510,14 @@ static decaf_bool_t gf_deser(gf s, const unsigned char ser[SER_BYTES]) { | |||
| return gf_deserialize((gf_s *)s, ser); | |||
| } | |||
| decaf_bool_t API_NS(point_decode) ( | |||
| decaf_error_t API_NS(point_decode) ( | |||
| point_t p, | |||
| const unsigned char ser[SER_BYTES], | |||
| decaf_bool_t allow_identity | |||
| ) { | |||
| gf s, a, b, c, d, e, f; | |||
| decaf_bool_t succ = gf_deser(s, ser), zero = gf_eq(s, ZERO); | |||
| allow_identity = ~word_is_zero(allow_identity); | |||
| succ &= allow_identity | ~zero; | |||
| succ &= ~hibit(s); | |||
| gf_sqr ( a, s ); | |||
| @@ -566,7 +567,7 @@ decaf_bool_t API_NS(point_decode) ( | |||
| assert(API_NS(point_valid)(p) | ~succ); | |||
| return succ; | |||
| return decaf_succeed_if(succ); | |||
| } | |||
| #if IMAGINE_TWIST | |||
| @@ -700,7 +701,7 @@ scalar_decode_short ( | |||
| } | |||
| } | |||
| decaf_bool_t API_NS(scalar_decode)( | |||
| decaf_error_t API_NS(scalar_decode)( | |||
| scalar_t s, | |||
| const unsigned char ser[SER_BYTES] | |||
| ) { | |||
| @@ -710,10 +711,11 @@ decaf_bool_t API_NS(scalar_decode)( | |||
| for (i=0; i<SCALAR_LIMBS; i++) { | |||
| accum = (accum + s->limb[i] - sc_p->limb[i]) >> WBITS; | |||
| } | |||
| /* Here accum == 0 or -1 */ | |||
| API_NS(scalar_mul)(s,s,API_NS(scalar_one)); /* ham-handed reduce */ | |||
| return accum; | |||
| return decaf_succeed_if(accum); | |||
| } | |||
| void API_NS(scalar_destroy) ( | |||
| @@ -1170,7 +1172,7 @@ void API_NS(point_from_hash_nonuniform) ( | |||
| assert(API_NS(point_valid)(p)); | |||
| } | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| API_NS(invert_elligator_nonuniform) ( | |||
| unsigned char recovered_hash[SER_BYTES], | |||
| const point_t p, | |||
| @@ -1218,7 +1220,7 @@ API_NS(invert_elligator_nonuniform) ( | |||
| gf_encode(recovered_hash, b); | |||
| /* TODO: deal with overflow flag */ | |||
| return succ; | |||
| return decaf_succeed_if(succ); | |||
| } | |||
| void API_NS(point_from_hash_uniform) ( | |||
| @@ -1231,7 +1233,7 @@ void API_NS(point_from_hash_uniform) ( | |||
| API_NS(point_add)(pt,pt,pt2); | |||
| } | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| API_NS(invert_elligator_uniform) ( | |||
| unsigned char partial_hash[2*SER_BYTES], | |||
| const point_t p, | |||
| @@ -1481,7 +1483,7 @@ void API_NS(point_cond_sel) ( | |||
| const point_t b, | |||
| decaf_bool_t pick_b | |||
| ) { | |||
| pick_b = ~(((decaf_dword_t)pick_b - 1) >> WBITS); | |||
| pick_b = ~word_is_zero(pick_b); | |||
| constant_time_select(out,b,a,sizeof(point_t),pick_b); | |||
| } | |||
| @@ -1491,12 +1493,12 @@ void API_NS(scalar_cond_sel) ( | |||
| const scalar_t b, | |||
| decaf_bool_t pick_b | |||
| ) { | |||
| pick_b = ~(((decaf_dword_t)pick_b - 1) >> WBITS); | |||
| pick_b = ~word_is_zero(pick_b); | |||
| constant_time_select(out,b,a,sizeof(scalar_t),pick_b); | |||
| } | |||
| /* TODO: restore Curve25519 Montgomery ladder? */ | |||
| decaf_bool_t API_NS(direct_scalarmul) ( | |||
| decaf_error_t API_NS(direct_scalarmul) ( | |||
| uint8_t scaled[SER_BYTES], | |||
| const uint8_t base[SER_BYTES], | |||
| const scalar_t scalar, | |||
| @@ -1504,13 +1506,13 @@ decaf_bool_t API_NS(direct_scalarmul) ( | |||
| decaf_bool_t short_circuit | |||
| ) { | |||
| point_t basep; | |||
| decaf_bool_t succ = API_NS(point_decode)(basep, base, allow_identity); | |||
| if (short_circuit & ~succ) return succ; | |||
| decaf_bool_t succ = decaf_successful(API_NS(point_decode)(basep, base, allow_identity)); | |||
| if (short_circuit && ~succ) return DECAF_FAILURE; | |||
| API_NS(point_cond_sel)(basep, API_NS(point_base), basep, succ); | |||
| API_NS(point_scalarmul)(basep, basep, scalar); | |||
| API_NS(point_encode)(scaled, basep); | |||
| API_NS(point_destroy)(basep); | |||
| return succ; | |||
| return decaf_succeed_if(succ); | |||
| } | |||
| /** | |||
| @@ -75,7 +75,7 @@ int main(int argc, char **argv) { | |||
| API_NS(point_t) real_point_base; | |||
| int ret = API_NS(point_decode)(real_point_base,base_point_ser_for_pregen,0); | |||
| if (!ret) return 1; | |||
| if (ret != DECAF_SUCCESS) return 1; | |||
| API_NS(precomputed_s) *pre; | |||
| ret = posix_memalign((void**)&pre, API_NS2(alignof,precomputed_s), API_NS2(sizeof,precomputed_s)); | |||
| @@ -73,7 +73,6 @@ | |||
| #define UNUSED __attribute__((unused)) | |||
| #define INLINE __inline__ __attribute__((always_inline)) | |||
| #ifdef __ARM_NEON__ | |||
| typedef uint32x4_t vecmask_t; | |||
| #elif __clang__ | |||
| @@ -51,9 +51,28 @@ extern "C" { | |||
| /** DECAF_TRUE = -1 so that DECAF_TRUE & x = x */ | |||
| static const decaf_bool_t DECAF_TRUE = -(decaf_bool_t)1, DECAF_FALSE = 0; | |||
| /** NB Success is -1, failure is 0. */ | |||
| static const decaf_bool_t DECAF_SUCCESS = -(decaf_bool_t)1 /*DECAF_TRUE*/, | |||
| DECAF_FAILURE = 0 /*DECAF_FALSE*/; | |||
| /* Success or failure */ | |||
| // FIXME: deploy project-wide | |||
| typedef enum { | |||
| DECAF_SUCCESS = -1, | |||
| DECAF_FAILURE = 0 | |||
| } decaf_error_t; | |||
| /** Return success if x is true */ | |||
| static __inline__ __attribute__((unused,always_inline)) | |||
| decaf_error_t | |||
| decaf_succeed_if(decaf_bool_t x) { | |||
| return (decaf_error_t)x; | |||
| } | |||
| /** Return DECAF_TRUE iff x == DECAF_SUCCESS */ | |||
| static __inline__ __attribute__((unused,always_inline)) | |||
| decaf_bool_t | |||
| decaf_successful(decaf_error_t e) { | |||
| decaf_dword_t w = ((decaf_word_t)e) ^ ((decaf_word_t)DECAF_SUCCESS); | |||
| return (w-1)>>DECAF_WORD_BITS; | |||
| } | |||
| /** | |||
| * @brief Overwrite data with zeros. Uses memset_s if available. | |||
| @@ -103,7 +103,7 @@ void decaf_255_private_to_public ( | |||
| * @warning This is a pretty silly shared secret computation | |||
| * and will almost definitely change in the future. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_shared_secret ( | |||
| uint8_t *shared, | |||
| size_t shared_bytes, | |||
| @@ -147,8 +147,11 @@ decaf_255_sign ( | |||
| * @param [in] sig The signature. | |||
| * @param [in] pub The public key. | |||
| * @param [in] shake A SHAKE256 context with the message. | |||
| * | |||
| * @return DECAF_SUCCESS The signature verified successfully. | |||
| * @return DECAF_FAILURE The signature did not verify successfully. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_verify_shake ( | |||
| const decaf_255_signature_t sig, | |||
| const decaf_255_public_key_t pub, | |||
| @@ -162,8 +165,11 @@ decaf_255_verify_shake ( | |||
| * @param [in] pub The public key. | |||
| * @param [in] message The message. | |||
| * @param [in] message_len The message's length. | |||
| * | |||
| * @return DECAF_SUCCESS The signature verified successfully. | |||
| * @return DECAF_FAILURE The signature did not verify successfully. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_verify ( | |||
| const decaf_255_signature_t sig, | |||
| const decaf_255_public_key_t pub, | |||
| @@ -64,14 +64,14 @@ public: | |||
| } | |||
| /** @brief Verify a sig. TODO: nothrow version? */ | |||
| inline bool verify_shake(const SHAKE<SHAKE_BITS> &ctx_, const FixedBlock<SIG_BYTES> &sig) throw(CryptoException) { | |||
| inline void verify_shake(const SHAKE<SHAKE_BITS> &ctx_, const FixedBlock<SIG_BYTES> &sig) throw(CryptoException) { | |||
| SHAKE<SHAKE_BITS> ctx(ctx_); | |||
| ctx << ser << sig.slice(0,Group::Point::SER_BYTES); | |||
| FixedArrayBuffer<CHALLENGE_BYTES> challenge; | |||
| ctx.output(challenge); | |||
| typename Group::Scalar response; | |||
| decaf_bool_t scalar_OK = Group::Scalar::decode( | |||
| decaf_error_t scalar_OK = Group::Scalar::decode( | |||
| response, | |||
| sig.slice(Group::Point::SER_BYTES, Group::Scalar::SER_BYTES) | |||
| ); | |||
| @@ -79,9 +79,10 @@ public: | |||
| const typename Group::Point combo = point().non_secret_combo_with_base( | |||
| typename Group::Scalar(challenge), response | |||
| ); | |||
| //if (combo != typename Group::Point(sig.slice(0,Group::Point::SER_BYTES))) | |||
| // throw CryptoException(); | |||
| return scalar_OK & (combo == typename Group::Point(sig.slice(0,Group::Point::SER_BYTES))); | |||
| if (!decaf_successful(scalar_OK) | |||
| || combo != typename Group::Point(sig.slice(0,Group::Point::SER_BYTES))) | |||
| throw CryptoException(); | |||
| //return scalar_OK & (combo == typename Group::Point(sig.slice(0,Group::Point::SER_BYTES))); | |||
| } | |||
| /** @brief Sign from a message. */ | |||
| @@ -80,7 +80,7 @@ extern const struct decaf_255_precomputed_s *decaf_255_precomputed_base API_VIS; | |||
| * @retval DECAF_FAILURE The scalar was greater than the modulus, | |||
| * and has been reduced modulo that modulus. | |||
| */ | |||
| decaf_bool_t decaf_255_scalar_decode ( | |||
| decaf_error_t decaf_255_scalar_decode ( | |||
| decaf_255_scalar_t out, | |||
| const unsigned char ser[DECAF_255_SCALAR_BYTES] | |||
| ) API_VIS WARN_UNUSED NONNULL2 NOINLINE; | |||
| @@ -164,7 +164,7 @@ void decaf_255_scalar_mul ( | |||
| * @param [out] out 1/a. | |||
| * @return DECAF_SUCCESS The input is nonzero. | |||
| */ | |||
| decaf_bool_t decaf_255_scalar_invert ( | |||
| decaf_error_t decaf_255_scalar_invert ( | |||
| decaf_255_scalar_t out, | |||
| const decaf_255_scalar_t a | |||
| ) API_VIS WARN_UNUSED NONNULL2 NOINLINE; | |||
| @@ -217,7 +217,7 @@ void decaf_255_point_encode ( | |||
| * @retval DECAF_FAILURE The decoding didn't succeed, because | |||
| * ser does not represent a point. | |||
| */ | |||
| decaf_bool_t decaf_255_point_decode ( | |||
| decaf_error_t decaf_255_point_decode ( | |||
| decaf_255_point_t pt, | |||
| const uint8_t ser[DECAF_255_SER_BYTES], | |||
| decaf_bool_t allow_identity | |||
| @@ -335,7 +335,7 @@ void decaf_255_point_scalarmul ( | |||
| * @retval DECAF_FAILURE The scalarmul didn't succeed, because | |||
| * base does not represent a point. | |||
| */ | |||
| decaf_bool_t decaf_255_direct_scalarmul ( | |||
| decaf_error_t decaf_255_direct_scalarmul ( | |||
| uint8_t scaled[DECAF_255_SER_BYTES], | |||
| const uint8_t base[DECAF_255_SER_BYTES], | |||
| const decaf_255_scalar_t scalar, | |||
| @@ -552,7 +552,7 @@ void decaf_255_point_from_hash_uniform ( | |||
| * @retval DECAF_SUCCESS The inverse succeeded. | |||
| * @retval DECAF_FAILURE The inverse failed. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_invert_elligator_nonuniform ( | |||
| unsigned char recovered_hash[DECAF_255_SER_BYTES], | |||
| const decaf_255_point_t pt, | |||
| @@ -577,7 +577,7 @@ decaf_255_invert_elligator_nonuniform ( | |||
| * @retval DECAF_SUCCESS The inverse succeeded. | |||
| * @retval DECAF_FAILURE The inverse failed. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_255_invert_elligator_uniform ( | |||
| unsigned char recovered_hash[2*DECAF_255_SER_BYTES], | |||
| const decaf_255_point_t pt, | |||
| @@ -139,7 +139,7 @@ public: | |||
| * @brief Decode from correct-length little-endian byte sequence. | |||
| * @return DECAF_FAILURE if the scalar is greater than or equal to the group order q. | |||
| */ | |||
| static inline decaf_bool_t __attribute__((warn_unused_result)) decode ( | |||
| static inline decaf_error_t __attribute__((warn_unused_result)) decode ( | |||
| Scalar &sc, const FixedBlock<SER_BYTES> buffer | |||
| ) NOEXCEPT { | |||
| return decaf_255_scalar_decode(sc.s,buffer.data()); | |||
| @@ -268,7 +268,7 @@ public: | |||
| * @return DECAF_FAILURE the string was the wrong length, or wasn't the encoding of a point, | |||
| * or was the identity and allow_identity was DECAF_FALSE. Contents of the buffer are undefined. | |||
| */ | |||
| static inline decaf_bool_t __attribute__((warn_unused_result)) decode ( | |||
| static inline decaf_error_t __attribute__((warn_unused_result)) decode ( | |||
| Point &p, const FixedBlock<SER_BYTES> &buffer, decaf_bool_t allow_identity=DECAF_TRUE | |||
| ) NOEXCEPT { | |||
| return decaf_255_point_decode(p.p,buffer.data(),allow_identity); | |||
| @@ -354,7 +354,7 @@ public: | |||
| inline Point &operator/=(const Scalar &s) throw(CryptoException) { return (*this) *= s.inverse(); } | |||
| /** @brief Validate / sanity check */ | |||
| inline bool validate() const NOEXCEPT { return DECAF_SUCCESS == decaf_255_point_valid(p); } | |||
| inline bool validate() const NOEXCEPT { return decaf_255_point_valid(p); } | |||
| /** @brief Double-scalar multiply, equivalent to q*qs + r*rs but faster. */ | |||
| static inline Point double_scalarmul ( | |||
| @@ -398,10 +398,10 @@ public: | |||
| } | |||
| /** | |||
| * Modify buffer so that Point::from_hash(Buffer) == *this, and return true; | |||
| * or leave buf unmodified and return false. | |||
| * Modify buffer so that Point::from_hash(Buffer) == *this, and return DECAF_SUCCESS; | |||
| * or leave buf unmodified and return DECAF_FAILURE. | |||
| */ | |||
| inline bool invert_elligator ( | |||
| inline decaf_error_t invert_elligator ( | |||
| Buffer buf, uint16_t hint | |||
| ) const NOEXCEPT { | |||
| unsigned char buf2[2*HASH_BYTES]; | |||
| @@ -409,30 +409,30 @@ public: | |||
| memcpy(buf2,buf.data(),(buf.size() > 2*HASH_BYTES) ? 2*HASH_BYTES : buf.size()); | |||
| decaf_bool_t ret; | |||
| if (buf.size() > HASH_BYTES) { | |||
| ret = decaf_255_invert_elligator_uniform(buf2, p, hint); | |||
| ret = decaf_successful(decaf_255_invert_elligator_uniform(buf2, p, hint)); | |||
| } else { | |||
| ret = decaf_255_invert_elligator_nonuniform(buf2, p, hint); | |||
| ret = decaf_successful(decaf_255_invert_elligator_nonuniform(buf2, p, hint)); | |||
| } | |||
| if (buf.size() < HASH_BYTES) { | |||
| ret &= decaf_memeq(&buf2[buf.size()], &buf2[HASH_BYTES], HASH_BYTES - buf.size()); | |||
| } | |||
| if (DECAF_SUCCESS == ret) { | |||
| if (ret) { | |||
| /* TODO: make this constant time?? */ | |||
| memcpy(buf.data(),buf2,(buf.size() < HASH_BYTES) ? buf.size() : HASH_BYTES); | |||
| } | |||
| decaf_bzero(buf2,sizeof(buf2)); | |||
| return DECAF_SUCCESS == ret; | |||
| return decaf_succeed_if(ret); | |||
| } | |||
| /** @brief Steganographically encode this */ | |||
| inline SecureBuffer steg_encode(Rng &rng, size_t size=STEG_BYTES) const throw(std::bad_alloc, LengthException) { | |||
| if (size <= HASH_BYTES + 4 || size > 2*HASH_BYTES) throw LengthException(); | |||
| SecureBuffer out(STEG_BYTES); | |||
| bool done; | |||
| decaf_error_t done; | |||
| do { | |||
| rng.read(Buffer(out).slice(HASH_BYTES-1,STEG_BYTES-HASH_BYTES+1)); | |||
| done = invert_elligator(out, out[HASH_BYTES-1]); | |||
| } while (!done); | |||
| } while (!decaf_successful(done)); | |||
| return out; | |||
| } | |||
| @@ -80,7 +80,7 @@ extern const struct decaf_448_precomputed_s *decaf_448_precomputed_base API_VIS; | |||
| * @retval DECAF_FAILURE The scalar was greater than the modulus, | |||
| * and has been reduced modulo that modulus. | |||
| */ | |||
| decaf_bool_t decaf_448_scalar_decode ( | |||
| decaf_error_t decaf_448_scalar_decode ( | |||
| decaf_448_scalar_t out, | |||
| const unsigned char ser[DECAF_448_SCALAR_BYTES] | |||
| ) API_VIS WARN_UNUSED NONNULL2 NOINLINE; | |||
| @@ -164,7 +164,7 @@ void decaf_448_scalar_mul ( | |||
| * @param [out] out 1/a. | |||
| * @return DECAF_TRUE The input is nonzero. | |||
| */ | |||
| decaf_bool_t decaf_448_scalar_invert ( | |||
| decaf_error_t decaf_448_scalar_invert ( | |||
| decaf_448_scalar_t out, | |||
| const decaf_448_scalar_t a | |||
| ) API_VIS WARN_UNUSED NONNULL2 NOINLINE; | |||
| @@ -217,7 +217,7 @@ void decaf_448_point_encode ( | |||
| * @retval DECAF_FAILURE The decoding didn't succeed, because | |||
| * ser does not represent a point. | |||
| */ | |||
| decaf_bool_t decaf_448_point_decode ( | |||
| decaf_error_t decaf_448_point_decode ( | |||
| decaf_448_point_t pt, | |||
| const uint8_t ser[DECAF_448_SER_BYTES], | |||
| decaf_bool_t allow_identity | |||
| @@ -335,7 +335,7 @@ void decaf_448_point_scalarmul ( | |||
| * @retval DECAF_FAILURE The scalarmul didn't succeed, because | |||
| * base does not represent a point. | |||
| */ | |||
| decaf_bool_t decaf_448_direct_scalarmul ( | |||
| decaf_error_t decaf_448_direct_scalarmul ( | |||
| uint8_t scaled[DECAF_448_SER_BYTES], | |||
| const uint8_t base[DECAF_448_SER_BYTES], | |||
| const decaf_448_scalar_t scalar, | |||
| @@ -552,7 +552,7 @@ void decaf_448_point_from_hash_uniform ( | |||
| * @retval DECAF_SUCCESS The inverse succeeded. | |||
| * @retval DECAF_FAILURE The inverse failed. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_448_invert_elligator_nonuniform ( | |||
| unsigned char recovered_hash[DECAF_448_SER_BYTES], | |||
| const decaf_448_point_t pt, | |||
| @@ -577,7 +577,7 @@ decaf_448_invert_elligator_nonuniform ( | |||
| * @retval DECAF_SUCCESS The inverse succeeded. | |||
| * @retval DECAF_FAILURE The inverse failed. | |||
| */ | |||
| decaf_bool_t | |||
| decaf_error_t | |||
| decaf_448_invert_elligator_uniform ( | |||
| unsigned char recovered_hash[2*DECAF_448_SER_BYTES], | |||
| const decaf_448_point_t pt, | |||
| @@ -130,7 +130,7 @@ public: | |||
| * @brief Decode from correct-length little-endian byte sequence. | |||
| * @return DECAF_FAILURE if the scalar is greater than or equal to the group order q. | |||
| */ | |||
| static inline decaf_bool_t __attribute__((warn_unused_result)) decode ( | |||
| static inline decaf_error_t __attribute__((warn_unused_result)) decode ( | |||
| Scalar &sc, const FixedBlock<SER_BYTES> buffer | |||
| ) NOEXCEPT { | |||
| return decaf_448_scalar_decode(sc.s,buffer.data()); | |||
| @@ -271,7 +271,7 @@ public: | |||
| * @return DECAF_FAILURE the string was the wrong length, or wasn't the encoding of a point, | |||
| * or was the identity and allow_identity was DECAF_FALSE. Contents of the buffer are undefined. | |||
| */ | |||
| static inline decaf_bool_t __attribute__((warn_unused_result)) decode ( | |||
| static inline decaf_error_t __attribute__((warn_unused_result)) decode ( | |||
| Point &p, const FixedBlock<SER_BYTES> &buffer, decaf_bool_t allow_identity=DECAF_TRUE | |||
| ) NOEXCEPT { | |||
| return decaf_448_point_decode(p.p,buffer.data(),allow_identity); | |||
| @@ -366,7 +366,7 @@ public: | |||
| inline Point &operator/=(const Scalar &s) throw(CryptoException) { return (*this) *= s.inverse(); } | |||
| /** @brief Validate / sanity check */ | |||
| inline bool validate() const NOEXCEPT { return DECAF_SUCCESS == decaf_448_point_valid(p); } | |||
| inline bool validate() const NOEXCEPT { return decaf_448_point_valid(p); } | |||
| /** @brief Double-scalar multiply, equivalent to q*qs + r*rs but faster. */ | |||
| static inline Point double_scalarmul ( | |||
| @@ -415,10 +415,10 @@ public: | |||
| } | |||
| /** | |||
| * Modify buffer so that Point::from_hash(Buffer) == *this, and return true; | |||
| * or leave buf unmodified and return false. | |||
| * Modify buffer so that Point::from_hash(Buffer) == *this, and return DECAF_SUCCESS; | |||
| * or leave buf unmodified and return DECAF_FAILURE. | |||
| */ | |||
| inline bool invert_elligator ( | |||
| inline decaf_error_t invert_elligator ( | |||
| Buffer buf, uint16_t hint | |||
| ) const NOEXCEPT { | |||
| unsigned char buf2[2*HASH_BYTES]; | |||
| @@ -426,30 +426,29 @@ public: | |||
| memcpy(buf2,buf.data(),(buf.size() > 2*HASH_BYTES) ? 2*HASH_BYTES : buf.size()); | |||
| decaf_bool_t ret; | |||
| if (buf.size() > HASH_BYTES) { | |||
| ret = decaf_448_invert_elligator_uniform(buf2, p, hint); | |||
| ret = decaf_successful(decaf_448_invert_elligator_uniform(buf2, p, hint)); | |||
| } else { | |||
| ret = decaf_448_invert_elligator_nonuniform(buf2, p, hint); | |||
| ret = decaf_successful(decaf_448_invert_elligator_nonuniform(buf2, p, hint)); | |||
| } | |||
| if (buf.size() < HASH_BYTES) { | |||
| // FIXME: this &= will fail if success becomes 0 | |||
| ret &= decaf_memeq(&buf2[buf.size()], &buf2[HASH_BYTES], HASH_BYTES - buf.size()); | |||
| } | |||
| if (DECAF_SUCCESS == ret) { | |||
| if (ret) { | |||
| /* TODO: make this constant time?? */ | |||
| memcpy(buf.data(),buf2,(buf.size() < HASH_BYTES) ? buf.size() : HASH_BYTES); | |||
| } | |||
| decaf_bzero(buf2,sizeof(buf2)); | |||
| return (ret == DECAF_SUCCESS); | |||
| return decaf_succeed_if(ret); | |||
| } | |||
| /** @brief Steganographically encode this */ | |||
| inline SecureBuffer steg_encode(Rng &rng) const throw(std::bad_alloc) { | |||
| SecureBuffer out(STEG_BYTES); | |||
| bool done; | |||
| decaf_error_t done; | |||
| do { | |||
| rng.read(Buffer(out).slice(HASH_BYTES-1,STEG_BYTES-HASH_BYTES+1)); | |||
| done = invert_elligator(out, out[HASH_BYTES-1]); | |||
| } while (!done); | |||
| } while (!decaf_successful(done)); | |||
| return out; | |||
| } | |||
| @@ -201,8 +201,8 @@ static void test_elligator() { | |||
| if (len > Point::HASH_BYTES) | |||
| memcpy(&(*alts2[j])[Point::HASH_BYTES], &b1[Point::HASH_BYTES], len-Point::HASH_BYTES); | |||
| successes[j] = s.invert_elligator(*alts[j], j); | |||
| successes2[j] = ss.invert_elligator(*alts2[j],j); | |||
| successes[j] = decaf_successful( s.invert_elligator(*alts[j], j)); | |||
| successes2[j] = decaf_successful(ss.invert_elligator(*alts2[j],j)); | |||
| if (successes[j] != successes2[j] | |||
| || (successes[j] && successes2[j] && *alts[j] != *alts2[j]) | |||
| @@ -353,17 +353,17 @@ static void test_decaf() { | |||
| decaf_255_private_to_public(p1,s1); | |||
| decaf_255_derive_private_key(s2,proto2); | |||
| decaf_255_private_to_public(p2,s2); | |||
| if (!decaf_255_shared_secret (shared1,sizeof(shared1),s1,p2)) { | |||
| if (DECAF_SUCCESS != decaf_255_shared_secret (shared1,sizeof(shared1),s1,p2)) { | |||
| test.fail(); printf("Fail ss12\n"); | |||
| } | |||
| if (!decaf_255_shared_secret (shared2,sizeof(shared2),s2,p1)) { | |||
| if (DECAF_SUCCESS != decaf_255_shared_secret (shared2,sizeof(shared2),s2,p1)) { | |||
| test.fail(); printf("Fail ss21\n"); | |||
| } | |||
| if (memcmp(shared1,shared2,sizeof(shared1))) { | |||
| test.fail(); printf("Fail ss21 == ss12\n"); | |||
| } | |||
| decaf_255_sign (sig,s1,(const unsigned char *)message,strlen(message)); | |||
| if (!decaf_255_verify (sig,p1,(const unsigned char *)message,strlen(message))) { | |||
| if (DECAF_SUCCESS != decaf_255_verify (sig,p1,(const unsigned char *)message,strlen(message))) { | |||
| test.fail(); printf("Fail sig ver\n"); | |||
| } | |||
| } | |||