mirror of
https://gogs.blitter.com/RLabs/xs
synced 2024-08-14 10:26:42 +00:00
Compare commits
No commits in common. "e7a3d60b36711af54b095921200a91dddb528fa4" and "d60101a599ae92f75a7bbc8731f0d879003732d2" have entirely different histories.
e7a3d60b36
...
d60101a599
3 changed files with 33 additions and 11 deletions
2
Makefile
2
Makefile
|
|
@ -1,4 +1,4 @@
|
||||||
VERSION := 0.9.2
|
VERSION := 0.9.0
|
||||||
.PHONY: lint vis clean common client server passwd subpkgs install uninstall reinstall
|
.PHONY: lint vis clean common client server passwd subpkgs install uninstall reinstall
|
||||||
|
|
||||||
## Tag version of binaries with build info wrt.
|
## Tag version of binaries with build info wrt.
|
||||||
|
|
|
||||||
42
xsnet/net.go
42
xsnet/net.go
|
|
@ -39,7 +39,6 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
crand "crypto/rand"
|
|
||||||
|
|
||||||
hkex "blitter.com/go/herradurakex"
|
hkex "blitter.com/go/herradurakex"
|
||||||
"blitter.com/go/kyber"
|
"blitter.com/go/kyber"
|
||||||
|
|
@ -475,11 +474,24 @@ func FrodoKEMDialSetup(c io.ReadWriter, hc *Conn) (err error) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// randReader wraps rand.Read() in a struct that implements io.Reader
|
||||||
|
// for use by the Kyber and NEWHOPE/NEWHOPE_SIMPLE KEM methods.
|
||||||
|
type randReader struct {
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r randReader) Read(b []byte) (n int, e error) {
|
||||||
|
n, e = rand.Read(b)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
func NewHopeDialSetup(c io.ReadWriter, hc *Conn) (err error) {
|
func NewHopeDialSetup(c io.ReadWriter, hc *Conn) (err error) {
|
||||||
// Send xsnet.Conn parameters to remote side
|
// Send xsnet.Conn parameters to remote side
|
||||||
|
|
||||||
// Alice, step 1: Generate a key pair.
|
// Alice, step 1: Generate a key pair.
|
||||||
privKeyAlice, pubKeyAlice, err := newhope.GenerateKeyPairAlice(crand.Reader)
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
|
|
||||||
|
privKeyAlice, pubKeyAlice, err := newhope.GenerateKeyPairAlice(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
@ -521,7 +533,9 @@ func NewHopeSimpleDialSetup(c io.ReadWriter, hc *Conn) (err error) {
|
||||||
// Send xsnet.Conn parameters to remote side
|
// Send xsnet.Conn parameters to remote side
|
||||||
|
|
||||||
// Alice, step 1: Generate a key pair.
|
// Alice, step 1: Generate a key pair.
|
||||||
privKeyAlice, pubKeyAlice, err := newhope.GenerateKeyPairSimpleAlice(crand.Reader)
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
|
privKeyAlice, pubKeyAlice, err := newhope.GenerateKeyPairSimpleAlice(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
@ -563,17 +577,19 @@ func KyberDialSetup(c io.ReadWriter /*net.Conn*/, hc *Conn) (err error) {
|
||||||
// Send xsnet.Conn parameters to remote side
|
// Send xsnet.Conn parameters to remote side
|
||||||
|
|
||||||
// Alice, step 1: Generate a key pair.
|
// Alice, step 1: Generate a key pair.
|
||||||
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
var alicePublicKey *kyber.PublicKey
|
var alicePublicKey *kyber.PublicKey
|
||||||
var alicePrivateKey *kyber.PrivateKey
|
var alicePrivateKey *kyber.PrivateKey
|
||||||
switch hc.kex {
|
switch hc.kex {
|
||||||
case KEX_KYBER512:
|
case KEX_KYBER512:
|
||||||
alicePublicKey, alicePrivateKey, err = kyber.Kyber512.GenerateKeyPair(crand.Reader)
|
alicePublicKey, alicePrivateKey, err = kyber.Kyber512.GenerateKeyPair(r)
|
||||||
case KEX_KYBER768:
|
case KEX_KYBER768:
|
||||||
alicePublicKey, alicePrivateKey, err = kyber.Kyber768.GenerateKeyPair(crand.Reader)
|
alicePublicKey, alicePrivateKey, err = kyber.Kyber768.GenerateKeyPair(r)
|
||||||
case KEX_KYBER1024:
|
case KEX_KYBER1024:
|
||||||
alicePublicKey, alicePrivateKey, err = kyber.Kyber1024.GenerateKeyPair(crand.Reader)
|
alicePublicKey, alicePrivateKey, err = kyber.Kyber1024.GenerateKeyPair(r)
|
||||||
default:
|
default:
|
||||||
alicePublicKey, alicePrivateKey, err = kyber.Kyber768.GenerateKeyPair(crand.Reader)
|
alicePublicKey, alicePrivateKey, err = kyber.Kyber768.GenerateKeyPair(r)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
@ -715,6 +731,8 @@ func FrodoKEMAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewHopeAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
func NewHopeAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
// Bob, step 1: Deserialize Alice's public key from the binary encoding.
|
// Bob, step 1: Deserialize Alice's public key from the binary encoding.
|
||||||
alicePublicKey := big.NewInt(0)
|
alicePublicKey := big.NewInt(0)
|
||||||
_, err = fmt.Fscanln(*c, alicePublicKey)
|
_, err = fmt.Fscanln(*c, alicePublicKey)
|
||||||
|
|
@ -736,7 +754,7 @@ func NewHopeAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
||||||
pubKeyBob, bobSharedSecret, err := newhope.KeyExchangeBob(crand.Reader, &pubKeyAlice)
|
pubKeyBob, bobSharedSecret, err := newhope.KeyExchangeBob(r, &pubKeyAlice)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
@ -751,6 +769,8 @@ func NewHopeAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewHopeSimpleAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
func NewHopeSimpleAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
// Bob, step 1: Deserialize Alice's public key from the binary encoding.
|
// Bob, step 1: Deserialize Alice's public key from the binary encoding.
|
||||||
alicePublicKey := big.NewInt(0)
|
alicePublicKey := big.NewInt(0)
|
||||||
_, err = fmt.Fscanln(*c, alicePublicKey)
|
_, err = fmt.Fscanln(*c, alicePublicKey)
|
||||||
|
|
@ -772,7 +792,7 @@ func NewHopeSimpleAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
||||||
pubKeyBob, bobSharedSecret, err := newhope.KeyExchangeSimpleBob(crand.Reader, &pubKeyAlice)
|
pubKeyBob, bobSharedSecret, err := newhope.KeyExchangeSimpleBob(r, &pubKeyAlice)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
@ -818,7 +838,9 @@ func KyberAcceptSetup(c *net.Conn, hc *Conn) (err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
// Bob, step 2: Generate the KEM cipher text and shared secret.
|
||||||
cipherText, bobSharedSecret, err := peerPublicKey.KEMEncrypt(crand.Reader)
|
r := new(randReader)
|
||||||
|
rand.Seed(time.Now().UnixNano())
|
||||||
|
cipherText, bobSharedSecret, err := peerPublicKey.KEMEncrypt(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err)
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue