line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Crypt::Perl::ECDSA::Utils; |
2
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
=encoding utf-8 |
4
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
=head1 NAME |
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
Crypt::Perl::ECDSA::Utils |
8
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
=head1 DISCUSSION |
10
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
This interface is undocumented for now. |
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
=cut |
14
|
|
|
|
|
|
|
|
15
|
7
|
|
|
7
|
|
35
|
use strict; |
|
7
|
|
|
|
|
12
|
|
|
7
|
|
|
|
|
158
|
|
16
|
7
|
|
|
7
|
|
25
|
use warnings; |
|
7
|
|
|
|
|
13
|
|
|
7
|
|
|
|
|
124
|
|
17
|
|
|
|
|
|
|
|
18
|
7
|
|
|
7
|
|
2188
|
use Crypt::Perl::ECDSA::Math (); |
|
7
|
|
|
|
|
16
|
|
|
7
|
|
|
|
|
101
|
|
19
|
7
|
|
|
7
|
|
48
|
use Crypt::Perl::X (); |
|
7
|
|
|
|
|
13
|
|
|
7
|
|
|
|
|
2815
|
|
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
#Splits the combined (uncompressed) generator or the public key |
22
|
|
|
|
|
|
|
#into its two component halves (octet strings). |
23
|
|
|
|
|
|
|
sub split_G_or_public { |
24
|
401
|
|
|
401
|
0
|
1207
|
my ($bytes_str) = @_; |
25
|
|
|
|
|
|
|
|
26
|
401
|
50
|
|
|
|
1537
|
die Crypt::Perl::X::create('Generic', "Only bytes, not “$bytes_str”!") if ref $bytes_str; |
27
|
|
|
|
|
|
|
|
28
|
401
|
|
|
|
|
1337
|
my $gen_prefix = ord( substr $bytes_str, 0, 1); |
29
|
|
|
|
|
|
|
|
30
|
401
|
50
|
|
|
|
1208
|
if ( $gen_prefix ne 0x04 ) { |
31
|
0
|
|
|
|
|
0
|
die Crypt::Perl::X::create('Generic', "Unrecognized generator or public key prefix/type ($gen_prefix)!"); |
32
|
|
|
|
|
|
|
} |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
#Should never happen, but. |
35
|
401
|
50
|
|
|
|
1465
|
if ( !(length($bytes_str) % 2) ) { |
36
|
0
|
|
|
|
|
0
|
die Crypt::Perl::X::create('Generic', "Invalid generator or public key: length must be uneven" ); |
37
|
|
|
|
|
|
|
} |
38
|
|
|
|
|
|
|
|
39
|
401
|
|
|
|
|
1163
|
my $len = (length($bytes_str) - 1) / 2; |
40
|
|
|
|
|
|
|
|
41
|
401
|
|
|
|
|
7759
|
return unpack( "x a$len a$len", $bytes_str ); |
42
|
|
|
|
|
|
|
} |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
sub compress_point { |
45
|
7
|
|
|
7
|
0
|
26
|
my ($pub_bin) = @_; |
46
|
|
|
|
|
|
|
|
47
|
7
|
50
|
|
|
|
25
|
if (substr($pub_bin, 0, 1) ne "\x04") { |
48
|
0
|
|
|
|
|
0
|
die( sprintf "Invalid point to compress: %v.02x", $pub_bin ); |
49
|
|
|
|
|
|
|
} |
50
|
|
|
|
|
|
|
|
51
|
7
|
100
|
|
|
|
33
|
my $first_octet = (ord( substr $pub_bin, -1 ) % 2) ? "\x03" : "\x02"; |
52
|
|
|
|
|
|
|
|
53
|
7
|
|
|
|
|
32
|
my ($xb) = split_G_or_public( $pub_bin ); |
54
|
|
|
|
|
|
|
|
55
|
7
|
|
|
|
|
33
|
return( $first_octet . $xb ); |
56
|
|
|
|
|
|
|
} |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
#$pub_bin is a string; $p/$a/$b are BigInt |
59
|
|
|
|
|
|
|
#returns a string |
60
|
|
|
|
|
|
|
sub decompress_point { |
61
|
112
|
|
|
112
|
0
|
668
|
my ($cpub_bin, $p, $a, $b) = @_; |
62
|
|
|
|
|
|
|
|
63
|
112
|
|
|
|
|
426
|
my $y_is_even = 0; |
64
|
112
|
|
|
|
|
721
|
my $octet1 = substr($cpub_bin, 0, 1); |
65
|
112
|
100
|
|
|
|
883
|
if ($octet1 eq "\x02") { |
|
|
50
|
|
|
|
|
|
66
|
53
|
|
|
|
|
232
|
$y_is_even = 1; |
67
|
|
|
|
|
|
|
} |
68
|
|
|
|
|
|
|
elsif ($octet1 ne "\x03") { |
69
|
0
|
|
|
|
|
0
|
die( sprintf "Invalid point to decompress: %v.02x", $cpub_bin ); |
70
|
|
|
|
|
|
|
} |
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
#http://stackoverflow.com/questions/17171542/algorithm-for-elliptic-curve-point-compression |
73
|
112
|
|
|
|
|
445
|
my $a_p = $a->copy()->bsub($p); |
74
|
|
|
|
|
|
|
|
75
|
112
|
|
|
|
|
21014
|
my $x = Crypt::Perl::BigInt->from_bytes(substr $cpub_bin, 1); |
76
|
112
|
|
|
|
|
87488
|
my $y = $x->copy()->bmodpow(3, $p); |
77
|
|
|
|
|
|
|
|
78
|
112
|
|
|
|
|
261668
|
my $t2 = $x->copy()->bmul($a)->bmod($p); |
79
|
112
|
|
|
|
|
83876
|
$y->badd($t2)->badd($b); |
80
|
112
|
|
|
|
|
14179
|
$y = Crypt::Perl::ECDSA::Math::tonelli_shanks( $y, $p ); |
81
|
|
|
|
|
|
|
|
82
|
112
|
100
|
|
|
|
32497481
|
if (!!$y_is_even eq !!$y->is_odd()) { |
83
|
55
|
|
|
|
|
1836
|
$y->bsub($p)->bneg(); |
84
|
|
|
|
|
|
|
} |
85
|
|
|
|
|
|
|
|
86
|
112
|
|
|
|
|
12583
|
return join( |
87
|
|
|
|
|
|
|
q<>, |
88
|
|
|
|
|
|
|
"\x04", |
89
|
|
|
|
|
|
|
pad_bytes_for_asn1(substr($cpub_bin, 1), $p), |
90
|
|
|
|
|
|
|
pad_bytes_for_asn1($y->as_bytes(), $p), |
91
|
|
|
|
|
|
|
); |
92
|
|
|
|
|
|
|
} |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
sub pad_bytes_for_asn1 { |
95
|
742
|
|
|
742
|
0
|
2519
|
my ($bytes, $p) = @_; |
96
|
|
|
|
|
|
|
|
97
|
742
|
|
|
|
|
2539
|
my $nbytes = length $p->as_bytes(); |
98
|
|
|
|
|
|
|
|
99
|
742
|
|
|
|
|
2347
|
substr( $bytes, 0, 0 ) = ("\0" x ($nbytes - length $bytes)); |
100
|
|
|
|
|
|
|
|
101
|
742
|
|
|
|
|
5679
|
return $bytes; |
102
|
|
|
|
|
|
|
} |
103
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
1; |