Advertisement
Guest User

Untitled

a guest
Dec 19th, 2018
102
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.46 KB | None | 0 0
  1. diff crypto-lib/libhl-crypto/src/signatures/ed25519.rs ursa/libursa/src/signatures/ed25519.rs
  2. 2c2
  3. < use super::super::CryptoError;
  4. ---
  5. > use CryptoError;
  6. 34c34,35
  7. < use rand::{Rng, ChaChaRng, SeedableRng};
  8. ---
  9. > use rand_chacha::ChaChaRng;
  10. > use rand::{RngCore, SeedableRng};
  11. 53c54
  12. < let mut rng = ChaChaRng::from_seed(s.chunks(4).map(get_u32).collect::<Vec<u32>>().as_slice());
  13. ---
  14. > let mut rng = ChaChaRng::from_seed(*array_ref!(s.as_slice(), 0, 32));
  15. 112,113c113,116
  16. < use rand::{Rng, ChaChaRng, SeedableRng};
  17. < use rand::os::OsRng;
  18. ---
  19. > use hash::{digest, DigestAlgorithm};
  20. > use rand::{RngCore, SeedableRng};
  21. > use rand_chacha::ChaChaRng;
  22. > use rand::rngs::OsRng;
  23. 125c128,129
  24. < let mut rng = ChaChaRng::from_seed(s.chunks(4).map(get_u32).collect::<Vec<u32>>().as_slice());
  25. ---
  26. > let hash = digest(DigestAlgorithm::Sha2_256, &s.as_slice())?;
  27. > let mut rng = ChaChaRng::from_seed(*array_ref!(hash, 0, 32));
  28. diff crypto-lib/libhl-crypto/src/signatures/mod.rs ursa/libursa/src/signatures/mod.rs
  29. 66,74d65
  30. <
  31. < fn get_u32(n: &[u8]) -> u32 {
  32. < let mut res = 0u32;
  33. < for i in 0..4 {
  34. < res <<= 8;
  35. < res |= n[i] as u32;
  36. < }
  37. < res
  38. < }
  39. diff crypto-lib/libhl-crypto/src/signatures/secp256k1.rs ursa/libursa/src/signatures/secp256k1.rs
  40. 5c5
  41. < use rand::os::OsRng;
  42. ---
  43. > use rand::rngs::OsRng;
  44. 61c61,62
  45. < use rand::{ChaChaRng, SeedableRng};
  46. ---
  47. > use rand_chacha::ChaChaRng;
  48. > use rand::{RngCore, SeedableRng};
  49. 67c68
  50. < let pk = libsecp256k1::key::PublicKey::from_slice(&self.0, &pk[..]).unwrap();
  51. ---
  52. > let pk = libsecp256k1::key::PublicKey::from_slice(&pk[..]).unwrap();
  53. 71c72
  54. < let pk = libsecp256k1::key::PublicKey::from_slice(&self.0, &pk[..]).unwrap();
  55. ---
  56. > let pk = libsecp256k1::key::PublicKey::from_slice(&pk[..]).unwrap();
  57. 75c76
  58. < let res = libsecp256k1::key::PublicKey::from_slice(&self.0, data)?;
  59. ---
  60. > let res = libsecp256k1::key::PublicKey::from_slice(data)?;
  61. 87,88c88,91
  62. < let mut rng = ChaChaRng::from_seed(seed.chunks(4).map(get_u32).collect::<Vec<u32>>().as_slice());
  63. < libsecp256k1::key::SecretKey::new(&self.0, &mut rng)
  64. ---
  65. > let mut s = [0u8; PRIVATE_KEY_SIZE];
  66. > let mut rng = ChaChaRng::from_seed(*array_ref!(seed.as_slice(), 0, 32));
  67. > rng.fill_bytes(&mut s);
  68. > libsecp256k1::key::SecretKey::from_slice(&s[..])?
  69. 90c93
  70. < KeyPairOption::FromSecretKey(s) => libsecp256k1::key::SecretKey::from_slice(&self.0, &s[..])?
  71. ---
  72. > KeyPairOption::FromSecretKey(s) => libsecp256k1::key::SecretKey::from_slice(&s[..])?
  73. 95c98,100
  74. < libsecp256k1::key::SecretKey::new(&self.0, &mut rng)
  75. ---
  76. > let mut s = [0u8; PRIVATE_KEY_SIZE];
  77. > rng.fill_bytes(&mut s);
  78. > libsecp256k1::key::SecretKey::from_slice(&s[..])?
  79. 104c109
  80. < let s = libsecp256k1::key::SecretKey::from_slice(&self.0, &sk[..])?;
  81. ---
  82. > let s = libsecp256k1::key::SecretKey::from_slice(&sk[..])?;
  83. 106c111
  84. < Ok(sig.serialize_compact(&self.0).to_vec())
  85. ---
  86. > Ok(sig.serialize_compact().to_vec())
  87. 111,112c116,117
  88. < let p = libsecp256k1::PublicKey::from_slice(&self.0, &pk[..])?;
  89. < let sig = libsecp256k1::Signature::from_compact(&self.0, signature)?;
  90. ---
  91. > let p = libsecp256k1::PublicKey::from_slice(&pk[..])?;
  92. > let sig = libsecp256k1::Signature::from_compact(signature)?;
  93. 121,123c126,128
  94. < let mut sig = libsecp256k1::Signature::from_compact(&self.0, signature)?;
  95. < sig.normalize_s(&self.0);
  96. < let compact = sig.serialize_compact(&self.0);
  97. ---
  98. > let mut sig = libsecp256k1::Signature::from_compact(signature)?;
  99. > sig.normalize_s();
  100. > let compact = sig.serialize_compact();
  101. 135c140,141
  102. < use rand::{ChaChaRng, SeedableRng, Rng};
  103. ---
  104. > use rand::{SeedableRng, RngCore};
  105. > use rand_chacha::ChaChaRng;
  106. 137c143
  107. < use amcl_3::secp256k1::{ecp, ecdh};
  108. ---
  109. > use amcl::secp256k1::{ecp, ecdh};
  110. 172c178
  111. < let mut rng = ChaChaRng::from_seed(seed.chunks(4).map(get_u32).collect::<Vec<u32>>().as_slice());
  112. ---
  113. > let mut rng = ChaChaRng::from_seed(*array_ref!(seed.as_slice(), 0, PRIVATE_KEY_SIZE));
  114. 174c180
  115. < let d = digest(DigestAlgorithm::SHA2_256, &sk[..])?;
  116. ---
  117. > let d = digest(DigestAlgorithm::Sha2_256, &sk[..])?;
  118. 183c189
  119. < let d = digest(DigestAlgorithm::SHA2_256, &sk[..])?;
  120. ---
  121. > let d = digest(DigestAlgorithm::Sha2_256, &sk[..])?;
  122. 187c193
  123. < let mut pk = [0u8; PUBLIC_KEY_SIZE]; //Compressed
  124. ---
  125. > let mut pk = [0u8; PUBLIC_UNCOMPRESSED_KEY_SIZE];
  126. 189c195,197
  127. < Ok((PublicKey(pk.to_vec()), PrivateKey(sk.to_vec())))
  128. ---
  129. > let mut compressed = [0u8; PUBLIC_KEY_SIZE];
  130. > ecp::ECP::frombytes(&pk[..]).tobytes(&mut compressed, true);
  131. > Ok((PublicKey(compressed.to_vec()), PrivateKey(sk.to_vec())))
  132. 240a249,257
  133. > fn get_u32(n: &[u8]) -> u32 {
  134. > let mut res = 0u32;
  135. > for i in 0..4 {
  136. > res <<= 8;
  137. > res |= n[i] as u32;
  138. > }
  139. > res
  140. > }
  141. >
  142. 375,376c392
  143. < let context = libsecp256k1::Secp256k1::new();
  144. < let sk = libsecp256k1::key::SecretKey::from_slice(&context, &s[..]);
  145. ---
  146. > let sk = libsecp256k1::key::SecretKey::from_slice(&s[..]);
  147. 378c394
  148. < let pk = libsecp256k1::key::PublicKey::from_slice(&context, &p[..]);
  149. ---
  150. > let pk = libsecp256k1::key::PublicKey::from_slice(&p[..]);
  151. 380c396
  152. < let pk = libsecp256k1::key::PublicKey::from_slice(&context, &scheme.serialize_uncompressed(&p)[..]);
  153. ---
  154. > let pk = libsecp256k1::key::PublicKey::from_slice(&scheme.serialize_uncompressed(&p)[..]);
  155. 399c415
  156. < let pk = libsecp256k1::key::PublicKey::from_slice(&context, hex::hex2bin(PUBLIC_KEY).unwrap().as_slice()).unwrap();
  157. ---
  158. > let pk = libsecp256k1::key::PublicKey::from_slice(hex::hex2bin(PUBLIC_KEY).unwrap().as_slice()).unwrap();
  159. 405,406c421,422
  160. < let mut signature = libsecp256k1::Signature::from_compact(&context, &hex::hex2bin(SIGNATURE_1).unwrap()[..]).unwrap();
  161. < signature.normalize_s(&context);
  162. ---
  163. > let mut signature = libsecp256k1::Signature::from_compact(&hex::hex2bin(SIGNATURE_1).unwrap()[..]).unwrap();
  164. > signature.normalize_s();
  165. 442c458
  166. < let sk = libsecp256k1::key::SecretKey::from_slice(&context, hex::hex2bin(PRIVATE_KEY).unwrap().as_slice()).unwrap();
  167. ---
  168. > let sk = libsecp256k1::key::SecretKey::from_slice(hex::hex2bin(PRIVATE_KEY).unwrap().as_slice()).unwrap();
  169. 447c463
  170. < let sig_1 = context.sign(&msg, &sk).serialize_compact(&context);
  171. ---
  172. > let sig_1 = context.sign(&msg, &sk).serialize_compact();
  173.  
  174. ~~~~~~~~~~~~
  175. CRYPTO-LIB
  176. $ git log -n2
  177. commit 0771d89d4292225af376970a95fbeb3037fe39eb (HEAD -> master, upstream/master, upstream/HEAD)
  178. Merge: f09813e 5efb17c
  179. Author: Michael Lodder <redmike7@gmail.com>
  180. Date: Mon Nov 5 15:50:18 2018 -0700
  181.  
  182. Merge pull request #14 from mikelodder7/master
  183.  
  184. Better documentation for Mac
  185.  
  186. commit 5efb17cbf632be15b8281298b6b186c215a8856f
  187. Merge: 47eacb3 f09813e
  188. Author: Michael Lodder <redmike7@gmail.com>
  189. Date: Mon Nov 5 15:50:09 2018 -0700
  190.  
  191. Merge branch 'master' into master
  192. ~~~~~~~~~~~~~
  193. URSA
  194. $ git log -n2
  195. commit 4516c05c895f854a2f731f2488d5ed304f8e221a (HEAD -> mikelodder7-z-mix)
  196. Merge: 49a6a74 c38a23d
  197. Author: Dan Middleton <dan.middleton@intel.com>
  198. Date: Tue Dec 18 11:30:06 2018 -0600
  199.  
  200. Merge branch 'z-mix' of https://github.com/mikelodder7/ursa into mikelodder7-z-mix
  201.  
  202. commit c38a23d37f3380783fa9ac7ce1b139a562d81bfa
  203. Author: Michael Lodder <redmike7@gmail.com>
  204. Date: Tue Dec 18 10:27:15 2018 -0700
  205.  
  206. Remove libc dependency
  207.  
  208. Signed-off-by: Michael Lodder <redmike7@gmail.com>
  209.  
  210. ~~~~~~~~~~~~~~~
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement