mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-02-08 22:13:48 +01:00
EdDSA signature type added
This commit is contained in:
parent
8891d9aa4d
commit
454f2dabbd
4 changed files with 40 additions and 3 deletions
17
Identity.cpp
17
Identity.cpp
|
@ -94,7 +94,14 @@ namespace data
|
||||||
excessBuf = new uint8_t[excessLen];
|
excessBuf = new uint8_t[excessLen];
|
||||||
memcpy (excessBuf, signingKey + 128, excessLen);
|
memcpy (excessBuf, signingKey + 128, excessLen);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
case SIGNING_KEY_TYPE_EDDSA_SHA512:
|
||||||
|
{
|
||||||
|
size_t padding = 128 - i2p::crypto::EDDSA_PUBLIC_KEY_LENGTH; // 96 = 128 - 32
|
||||||
|
i2p::context.GetRandomNumberGenerator ().GenerateBlock (m_StandardIdentity.signingKey, padding);
|
||||||
|
memcpy (m_StandardIdentity.signingKey + padding, signingKey, i2p::crypto::EDDSA_PUBLIC_KEY_LENGTH);
|
||||||
|
break;
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
LogPrint ("Signing key type ", (int)type, " is not supported");
|
LogPrint ("Signing key type ", (int)type, " is not supported");
|
||||||
}
|
}
|
||||||
|
@ -344,7 +351,13 @@ namespace data
|
||||||
memcpy (signingKey + 128, m_ExtendedBuffer + 4, excessLen); // right after signing and crypto key types
|
memcpy (signingKey + 128, m_ExtendedBuffer + 4, excessLen); // right after signing and crypto key types
|
||||||
m_Verifier = new i2p::crypto:: RSASHA5124096Verifier (signingKey);
|
m_Verifier = new i2p::crypto:: RSASHA5124096Verifier (signingKey);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
case SIGNING_KEY_TYPE_EDDSA_SHA512:
|
||||||
|
{
|
||||||
|
size_t padding = 128 - i2p::crypto::EDDSA_PUBLIC_KEY_LENGTH; // 96 = 128 - 32
|
||||||
|
m_Verifier = new i2p::crypto::EDDSAVerifier (m_StandardIdentity.signingKey + padding);
|
||||||
|
break;
|
||||||
|
}
|
||||||
default:
|
default:
|
||||||
LogPrint ("Signing key type ", (int)keyType, " is not supported");
|
LogPrint ("Signing key type ", (int)keyType, " is not supported");
|
||||||
}
|
}
|
||||||
|
|
|
@ -117,6 +117,7 @@ namespace data
|
||||||
const uint16_t SIGNING_KEY_TYPE_RSA_SHA256_2048 = 4;
|
const uint16_t SIGNING_KEY_TYPE_RSA_SHA256_2048 = 4;
|
||||||
const uint16_t SIGNING_KEY_TYPE_RSA_SHA384_3072 = 5;
|
const uint16_t SIGNING_KEY_TYPE_RSA_SHA384_3072 = 5;
|
||||||
const uint16_t SIGNING_KEY_TYPE_RSA_SHA512_4096 = 6;
|
const uint16_t SIGNING_KEY_TYPE_RSA_SHA512_4096 = 6;
|
||||||
|
const uint16_t SIGNING_KEY_TYPE_EDDSA_SHA512 = 7;
|
||||||
typedef uint16_t SigningKeyType;
|
typedef uint16_t SigningKeyType;
|
||||||
typedef uint16_t CryptoKeyType;
|
typedef uint16_t CryptoKeyType;
|
||||||
|
|
||||||
|
|
|
@ -77,7 +77,12 @@ namespace crypto
|
||||||
private:
|
private:
|
||||||
|
|
||||||
CryptoPP::Integer q, l, d, I;
|
CryptoPP::Integer q, l, d, I;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
bool EDDSAVerifier::Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const
|
||||||
|
{
|
||||||
|
return true; // TODO:
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
18
Signature.h
18
Signature.h
|
@ -410,6 +410,24 @@ namespace crypto
|
||||||
{
|
{
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// EdDSA
|
||||||
|
const size_t EDDSA_PUBLIC_KEY_LENGTH = 32;
|
||||||
|
const size_t EDDSA_SIGNATURE_LENGTH = 64;
|
||||||
|
const size_t EDDSA_PRIVATE_KEY_LENGTH = 32;
|
||||||
|
class EDDSAVerifier: public Verifier
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
EDDSAVerifier (const uint8_t * signingKey)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const;
|
||||||
|
|
||||||
|
size_t GetPublicKeyLen () const { return EDDSA_PUBLIC_KEY_LENGTH; };
|
||||||
|
size_t GetSignatureLen () const { return EDDSA_SIGNATURE_LENGTH; };
|
||||||
|
};
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue