blob: 3d3050595b2c1f73727da1c62c70914fbb046884 [file] [log] [blame]
/*
Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing,
software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the
specific language governing permissions and limitations
under the License.
*/
/* MPIN API Functions */
var MPIN192 = function(ctx) {
"use strict";
var MPIN192 = {
BAD_PARAMS: -11,
INVALID_POINT: -14,
WRONG_ORDER: -18,
BAD_PIN: -19,
/* configure PIN here */
MAXPIN: 10000,
/* max PIN */
PBLEN: 14,
/* MAXPIN length in bits */
TS: 12,
/* 10 for 4 digit PIN, 14 for 6-digit PIN - 2^TS/TS approx = sqrt(MAXPIN) */
TRAP: 2000,
/* 200 for 4 digit PIN, 2000 for 6-digit PIN - approx 2*sqrt(MAXPIN) */
EFS: ctx.BIG.MODBYTES,
EGS: ctx.BIG.MODBYTES,
//PAS: 16,
SHA256: 32,
SHA384: 48,
SHA512: 64,
//HASH_TYPE: 32,
/* return time in slots since epoch */
today: function() {
var now = new Date();
return Math.floor(now.getTime() / (60000 * 1440)); // for daily tokens
},
bytestostring: function(b) {
var s = "",
len = b.length,
ch, i;
for (i = 0; i < len; i++) {
ch = b[i];
s += ((ch >>> 4) & 15).toString(16);
s += (ch & 15).toString(16);
}
return s;
},
stringtobytes: function(s) {
var b = [],
i;
for (i = 0; i < s.length; i++) {
b.push(s.charCodeAt(i));
}
return b;
},
comparebytes: function(a, b) {
if (a.length != b.length) {
return false;
}
for (var i = 0; i < a.length; i++) {
if (a[i] != b[i]) {
return false;
}
}
return true;
},
mpin_hash: function(sha, c, U) {
var t = [],
w = [],
h = [],
H, R, i;
c.geta().geta().getA().toBytes(w);
for (i = 0; i < this.EFS; i++) {
t[i] = w[i];
}
c.geta().geta().getB().toBytes(w);
for (i = this.EFS; i < 2 * this.EFS; i++) {
t[i] = w[i - this.EFS];
}
c.geta().getb().getA().toBytes(w);
for (i = 2 * this.EFS; i < 3 * this.EFS; i++) {
t[i] = w[i - 2 * this.EFS];
}
c.geta().getb().getB().toBytes(w);
for (i = 3 * this.EFS; i < 4 * this.EFS; i++) {
t[i] = w[i - 3 * this.EFS];
}
c.getb().geta().getA().toBytes(w);
for (i = 4 * this.EFS; i < 5 * this.EFS; i++) {
t[i] = w[i - 4 * this.EFS];
}
c.getb().geta().getB().toBytes(w);
for (i = 5 * this.EFS; i < 6 * this.EFS; i++) {
t[i] = w[i - 5 * this.EFS];
}
c.getb().getb().getA().toBytes(w);
for (i = 6 * this.EFS; i < 7 * this.EFS; i++) {
t[i] = w[i - 6 * this.EFS];
}
c.getb().getb().getB().toBytes(w);
for (i = 7 * this.EFS; i < 8 * this.EFS; i++) {
t[i] = w[i - 7 * this.EFS];
}
U.getX().toBytes(w);
for (i = 8 * this.EFS; i < 9 * this.EFS; i++) {
t[i] = w[i - 8 * this.EFS];
}
U.getY().toBytes(w);
for (i = 9 * this.EFS; i < 10 * this.EFS; i++) {
t[i] = w[i - 9 * this.EFS];
}
if (sha == this.SHA256) {
H = new ctx.HASH256();
} else if (sha == this.SHA384) {
H = new ctx.HASH384();
} else if (sha == this.SHA512) {
H = new ctx.HASH512();
}
H.process_array(t);
h = H.hash();
if (h.length == 0) {
return null;
}
R = [];
for (i = 0; i < ctx.ECP.AESKEY; i++) {
R[i] = h[i];
}
return R;
},
/* Hash number (optional) and string to point on curve */
hashit: function(sha, n, B) {
var R = [],
H, W, i, len;
if (sha == this.SHA256) {
H = new ctx.HASH256();
} else if (sha == this.SHA384) {
H = new ctx.HASH384();
} else if (sha == this.SHA512) {
H = new ctx.HASH512();
}
if (n > 0) {
H.process_num(n);
}
H.process_array(B);
R = H.hash();
if (R.length == 0) {
return null;
}
W = [];
len = ctx.BIG.MODBYTES;
if (sha >= len) {
for (i = 0; i < len; i++) {
W[i] = R[i];
}
} else {
for (i = 0; i < sha; i++) {
W[i + len - sha] = R[i];
}
for (i = 0; i < len - sha; i++) {
W[i] = 0;
}
}
return W;
},
/* these next two functions help to implement elligator squared - http://eprint.iacr.org/2014/043 */
/* maps a random u to a point on the curve */
map: function(u, cb) {
var P = new ctx.ECP(),
x = new ctx.BIG(u),
p = new ctx.BIG(0);
p.rcopy(ctx.ROM_FIELD.Modulus);
x.mod(p);
for (;;) {
P.setxi(x, cb);
if (!P.is_infinity()) {
break;
}
x.inc(1);
x.norm();
}
return P;
},
/* returns u derived from P. Random value in range 1 to return value should then be added to u */
unmap: function(u, P) {
var s = P.getS(),
R = new ctx.ECP(),
r = 0,
x = P.getX();
u.copy(x);
for (;;) {
u.dec(1);
u.norm();
r++;
R.setxi(u, s); //=new ECP(u,s);
if (!R.is_infinity()) {
break;
}
}
return r;
},
/* these next two functions implement elligator squared - http://eprint.iacr.org/2014/043 */
/* Elliptic curve point E in format (0x04,x,y} is converted to form {0x0-,u,v} */
/* Note that u and v are indistinguishable from random strings */
ENCODING: function(rng, E) {
var T = [],
i, rn, m, su, sv,
u, v, P, p, W;
for (i = 0; i < this.EFS; i++) {
T[i] = E[i + 1];
}
u = ctx.BIG.fromBytes(T);
for (i = 0; i < this.EFS; i++) {
T[i] = E[i + this.EFS + 1];
}
v = ctx.BIG.fromBytes(T);
P = new ctx.ECP(0);
P.setxy(u, v);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
p = new ctx.BIG(0);
p.rcopy(ctx.ROM_FIELD.Modulus);
u = ctx.BIG.randomnum(p, rng);
su = rng.getByte();
if (su < 0) {
su = -su;
}
su %= 2;
W = this.map(u, su);
P.sub(W);
sv = P.getS();
rn = this.unmap(v, P);
m = rng.getByte();
if (m < 0) {
m = -m;
}
m %= rn;
v.inc(m + 1);
E[0] = (su + 2 * sv);
u.toBytes(T);
for (i = 0; i < this.EFS; i++) {
E[i + 1] = T[i];
}
v.toBytes(T);
for (i = 0; i < this.EFS; i++) {
E[i + this.EFS + 1] = T[i];
}
return 0;
},
DECODING: function(D) {
var T = [],
i, su, sv, u, v, W, P;
if ((D[0] & 0x04) !== 0) {
return this.INVALID_POINT;
}
for (i = 0; i < this.EFS; i++) {
T[i] = D[i + 1];
}
u = ctx.BIG.fromBytes(T);
for (i = 0; i < this.EFS; i++) {
T[i] = D[i + this.EFS + 1];
}
v = ctx.BIG.fromBytes(T);
su = D[0] & 1;
sv = (D[0] >> 1) & 1;
W = this.map(u, su);
P = this.map(v, sv);
P.add(W);
u = P.getX();
v = P.getY();
D[0] = 0x04;
u.toBytes(T);
for (i = 0; i < this.EFS; i++) {
D[i + 1] = T[i];
}
v.toBytes(T);
for (i = 0; i < this.EFS; i++) {
D[i + this.EFS + 1] = T[i];
}
return 0;
},
/* R=R1+R2 in group G1 */
RECOMBINE_G1: function(R1, R2, R) {
var P = ctx.ECP.fromBytes(R1),
Q = ctx.ECP.fromBytes(R2);
if (P.is_infinity() || Q.is_infinity()) {
return this.INVALID_POINT;
}
P.add(Q);
P.toBytes(R,false);
return 0;
},
/* W=W1+W2 in group G2 */
RECOMBINE_G2: function(W1, W2, W) {
var P = ctx.ECP4.fromBytes(W1),
Q = ctx.ECP4.fromBytes(W2);
if (P.is_infinity() || Q.is_infinity()) {
return this.INVALID_POINT;
}
P.add(Q);
P.toBytes(W);
return 0;
},
HASH_ID: function(sha, ID) {
return this.hashit(sha, 0, ID);
},
/* create random secret S */
RANDOM_GENERATE: function(rng, S) {
var r = new ctx.BIG(0),
s;
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
s = ctx.BIG.randomnum(r, rng);
//if (ROM.AES_S>0)
//{
// s.mod2m(2*ROM.AES_S);
//}
s.toBytes(S);
return 0;
},
/* Extract PIN from TOKEN for identity CID */
EXTRACT_PIN: function(sha, CID, pin, TOKEN) {
return this.EXTRACT_FACTOR(sha,CID,pin%this.MAXPIN,this.PBLEN,TOKEN);
},
/* Extract factor from TOKEN for identity CID */
EXTRACT_FACTOR: function(sha, CID, factor, facbits, TOKEN) {
var P, R, h;
P = ctx.ECP.fromBytes(TOKEN);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
h = this.hashit(sha, 0, CID);
R = ctx.ECP.mapit(h);
R = R.pinmul(factor, facbits);
P.sub(R);
P.toBytes(TOKEN,false);
return 0;
},
/* Restore factor to TOKEN for identity CID */
RESTORE_FACTOR: function(sha, CID, factor, facbits, TOKEN) {
var P, R, h;
P = ctx.ECP.fromBytes(TOKEN);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
h = this.hashit(sha, 0, CID),
R = ctx.ECP.mapit(h);
R = R.pinmul(factor, facbits);
P.add(R);
P.toBytes(TOKEN,false);
return 0;
},
/* Extract Server Secret SST=S*Q where Q is fixed generator in G2 and S is master secret */
GET_SERVER_SECRET: function(S, SST) {
var s,Q;
Q = ctx.ECP4.generator();
s = ctx.BIG.fromBytes(S);
Q = ctx.PAIR192.G2mul(Q, s);
Q.toBytes(SST);
return 0;
},
/*
W=x*H(G);
if RNG == NULL then X is passed in
if RNG != NULL the X is passed out
if type=0 W=x*G where G is point on the curve, else W=x*M(G), where M(G) is mapping of octet G to point on the curve
*/
GET_G1_MULTIPLE: function(rng, type, X, G, W) {
var r = new ctx.BIG(0),
x, P;
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
if (rng != null) {
x = ctx.BIG.randomnum(r, rng);
//if (ROM.AES_S>0)
//{
// x.mod2m(2*ROM.AES_S);
//}
x.toBytes(X);
} else {
x = ctx.BIG.fromBytes(X);
}
if (type == 0) {
P = ctx.ECP.fromBytes(G);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
} else {
P = ctx.ECP.mapit(G);
}
ctx.PAIR192.G1mul(P, x).toBytes(W,false);
return 0;
},
/* Client secret CST=S*H(CID) where CID is client ID and S is master secret */
GET_CLIENT_SECRET: function(S, CID, CST) {
return this.GET_G1_MULTIPLE(null, 1, S, CID, CST);
},
/* Time Permit CTT=S*(date|H(CID)) where S is master secret */
GET_CLIENT_PERMIT: function(sha, date, S, CID, CTT) {
var h = this.hashit(sha, date, CID),
P = ctx.ECP.mapit(h),
s = ctx.BIG.fromBytes(S);
P = ctx.PAIR192.G1mul(P, s);
P.toBytes(CTT,false);
return 0;
},
/* Implement step 1 on client side of MPin protocol */
CLIENT_1: function(sha, date, CLIENT_ID, rng, X, pin, TOKEN, SEC, xID, xCID, PERMIT) {
var r = new ctx.BIG(0),
x, P, T, W, h;
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
// var q=new ctx.BIG(0); q.rcopy(ctx.ROM_FIELD.Modulus);
if (rng !== null) {
x = ctx.BIG.randomnum(r, rng);
//if (ROM.AES_S>0)
//{
// x.mod2m(2*ROM.AES_S);
//}
x.toBytes(X);
} else {
x = ctx.BIG.fromBytes(X);
}
h = this.hashit(sha, 0, CLIENT_ID);
P = ctx.ECP.mapit(h);
T = ctx.ECP.fromBytes(TOKEN);
if (T.is_infinity()) {
return this.INVALID_POINT;
}
pin %= this.MAXPIN;
W = P.pinmul(pin, this.PBLEN);
T.add(W);
if (date != 0) {
W = ctx.ECP.fromBytes(PERMIT);
if (W.is_infinity()) {
return this.INVALID_POINT;
}
T.add(W);
h = this.hashit(sha, date, h);
W = ctx.ECP.mapit(h);
if (xID != null) {
P = ctx.PAIR192.G1mul(P, x);
P.toBytes(xID,false);
W = ctx.PAIR192.G1mul(W, x);
P.add(W);
} else {
P.add(W);
P = ctx.PAIR192.G1mul(P, x);
}
if (xCID != null) {
P.toBytes(xCID,false);
}
} else {
if (xID != null) {
P = ctx.PAIR192.G1mul(P, x);
P.toBytes(xID,false);
}
}
T.toBytes(SEC,false);
return 0;
},
/* Implement step 2 on client side of MPin protocol */
CLIENT_2: function(X, Y, SEC) {
var r = new ctx.BIG(0),
P, px, py;
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
P = ctx.ECP.fromBytes(SEC);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
px = ctx.BIG.fromBytes(X);
py = ctx.BIG.fromBytes(Y);
px.add(py);
px.mod(r);
// px.rsub(r);
P = ctx.PAIR192.G1mul(P, px);
P.neg();
P.toBytes(SEC,false);
//ctx.PAIR192.G1mul(P,px).toBytes(SEC,false);
return 0;
},
/* Outputs H(CID) and H(T|H(CID)) for time permits. If no time permits set HID=HTID */
SERVER_1: function(sha, date, CID, HID, HTID) {
var h = this.hashit(sha, 0, CID),
P = ctx.ECP.mapit(h),
R;
P.toBytes(HID,false);
if (date !== 0) {
//if (HID!=null) P.toBytes(HID,false);
h = this.hashit(sha, date, h);
R = ctx.ECP.mapit(h);
P.add(R);
P.toBytes(HTID,false);
}
//else P.toBytes(HID,false);
},
/* Implement step 1 of MPin protocol on server side. Pa is the client public key in case of DVS, otherwise must be set to null */
SERVER_2: function(date, HID, HTID, Y, SST, xID, xCID, mSEC, E, F, Pa) {
var Q, sQ, R, y, P, g;
if (typeof Pa === "undefined" || Pa == null) {
Q = ctx.ECP4.generator();
} else {
Q = ctx.ECP4.fromBytes(Pa);
if (Q.is_infinity()) {
return this.INVALID_POINT;
}
}
sQ = ctx.ECP4.fromBytes(SST);
if (sQ.is_infinity()) {
return this.INVALID_POINT;
}
if (date !== 0) {
R = ctx.ECP.fromBytes(xCID);
} else {
if (xID == null) {
return this.BAD_PARAMS;
}
R = ctx.ECP.fromBytes(xID);
}
if (R.is_infinity()) {
return this.INVALID_POINT;
}
y = ctx.BIG.fromBytes(Y);
if (date != 0) {
P = ctx.ECP.fromBytes(HTID);
} else {
if (HID == null) {
return this.BAD_PARAMS;
}
P = ctx.ECP.fromBytes(HID);
}
if (P.is_infinity()) {
return this.INVALID_POINT;
}
P = ctx.PAIR192.G1mul(P, y);
P.add(R);
//P.affine();
R = ctx.ECP.fromBytes(mSEC);
if (R.is_infinity()) {
return this.INVALID_POINT;
}
g = ctx.PAIR192.ate2(Q, R, sQ, P);
g = ctx.PAIR192.fexp(g);
if (!g.isunity()) {
if (HID != null && xID != null && E != null && F != null) {
g.toBytes(E);
if (date !== 0) {
P = ctx.ECP.fromBytes(HID);
if (P.is_infinity()) {
return this.INVALID_POINT;
}
R = ctx.ECP.fromBytes(xID);
if (R.is_infinity()) {
return this.INVALID_POINT;
}
P = ctx.PAIR192.G1mul(P, y);
P.add(R);
//P.affine();
}
g = ctx.PAIR192.ate(Q, P);
g = ctx.PAIR192.fexp(g);
g.toBytes(F);
}
return this.BAD_PIN;
}
return 0;
},
/* Pollards kangaroos used to return PIN error */
KANGAROO: function(E, F) {
var ge = ctx.FP24.fromBytes(E),
gf = ctx.FP24.fromBytes(F),
distance = [],
t = new ctx.FP24(gf),
table = [],
i, j, m, s, dn, dm, res, steps;
s = 1;
for (m = 0; m < this.TS; m++) {
distance[m] = s;
table[m] = new ctx.FP24(t);
s *= 2;
t.usqr();
}
t.one();
dn = 0;
for (j = 0; j < this.TRAP; j++) {
i = t.geta().geta().geta().getA().lastbits(20) % this.TS;
t.mul(table[i]);
dn += distance[i];
}
gf.copy(t);
gf.conj();
steps = 0;
dm = 0;
res = 0;
while (dm - dn < this.MAXPIN) {
steps++;
if (steps > 4 * this.TRAP) {
break;
}
i = ge.geta().geta().geta().getA().lastbits(20) % this.TS;
ge.mul(table[i]);
dm += distance[i];
if (ge.equals(t)) {
res = dm - dn;
break;
}
if (ge.equals(gf)) {
res = dn - dm;
break;
}
}
if (steps > 4 * this.TRAP || dm - dn >= this.MAXPIN) {
res = 0;
} // Trap Failed - probable invalid token
return res;
},
/* return time since epoch */
GET_TIME: function() {
var now = new Date();
return Math.floor(now.getTime() / (1000));
},
/* y = H(time,xCID) */
GET_Y: function(sha, TimeValue, xCID, Y) {
var q = new ctx.BIG(0),
h = this.hashit(sha, TimeValue, xCID),
y = ctx.BIG.fromBytes(h);
q.rcopy(ctx.ROM_CURVE.CURVE_Order);
y.mod(q);
//if (ROM.AES_S>0)
//{
// y.mod2m(2*ROM.AES_S);
//}
y.toBytes(Y);
return 0;
},
/* One pass MPIN Client - DVS signature. Message must be null in case of One pass MPIN. */
CLIENT: function(sha, date, CLIENT_ID, rng, X, pin, TOKEN, SEC, xID, xCID, PERMIT, TimeValue, Y, Message) {
var rtn = 0,
M = [],
pID, i;
if (date == 0) {
pID = xID;
} else {
pID = xCID;
xID = null;
}
rtn = this.CLIENT_1(sha, date, CLIENT_ID, rng, X, pin, TOKEN, SEC, xID, xCID, PERMIT);
if (rtn != 0) {
return rtn;
}
M = pID.slice();
if (typeof Message !== "undefined" || Message != null) {
for (i = 0; i < Message.length; i++) {
M.push(Message[i]);
}
}
this.GET_Y(sha, TimeValue, M, Y);
rtn = this.CLIENT_2(X, Y, SEC);
if (rtn != 0) {
return rtn;
}
return 0;
},
/* One pass MPIN Server */
SERVER: function(sha, date, HID, HTID, Y, SST, xID, xCID, mSEC, E, F, CID, TimeValue, Message, Pa) {
var rtn = 0,
M = [],
pID, i;
if (date == 0) {
pID = xID;
} else {
pID = xCID;
}
this.SERVER_1(sha, date, CID, HID, HTID);
M = pID.slice();
if (typeof Message !== "undefined" || Message != null) {
for (i = 0; i < Message.length; i++) {
M.push(Message[i]);
}
}
this.GET_Y(sha, TimeValue, M, Y);
rtn = this.SERVER_2(date, HID, HTID, Y, SST, xID, xCID, mSEC, E, F, Pa);
if (rtn != 0) {
return rtn;
}
return 0;
},
/* Functions to support M-Pin Full */
PRECOMPUTE: function(TOKEN, CID, G1, G2) {
var P, T, g, Q;
T = ctx.ECP.fromBytes(TOKEN);
if (T.is_infinity()) {
return this.INVALID_POINT;
}
P = ctx.ECP.mapit(CID);
Q = ctx.ECP4.generator();
g = ctx.PAIR192.ate(Q, T);
g = ctx.PAIR192.fexp(g);
g.toBytes(G1);
g = ctx.PAIR192.ate(Q, P);
g = ctx.PAIR192.fexp(g);
g.toBytes(G2);
return 0;
},
/* Hash the M-Pin transcript - new */
HASH_ALL: function(sha, HID, xID, xCID, SEC, Y, R, W) {
var tlen = 0,
T = [],
i;
for (i = 0; i < HID.length; i++) {
T[i] = HID[i];
}
tlen += HID.length;
if (xCID != null) {
for (i = 0; i < xCID.length; i++) {
T[i + tlen] = xCID[i];
}
tlen += xCID.length;
} else {
for (i = 0; i < xID.length; i++) {
T[i + tlen] = xID[i];
}
tlen += xID.length;
}
for (i = 0; i < SEC.length; i++) {
T[i + tlen] = SEC[i];
}
tlen += SEC.length;
for (i = 0; i < Y.length; i++) {
T[i + tlen] = Y[i];
}
tlen += Y.length;
for (i = 0; i < R.length; i++) {
T[i + tlen] = R[i];
}
tlen += R.length;
for (i = 0; i < W.length; i++) {
T[i + tlen] = W[i];
}
tlen += W.length;
return this.hashit(sha, 0, T);
},
/* calculate common key on client side */
/* wCID = w.(A+AT) */
CLIENT_KEY: function(sha, G1, G2, pin, R, X, H, wCID, CK) {
var t = [],
g1 = ctx.FP24.fromBytes(G1),
g2 = ctx.FP24.fromBytes(G2),
z = ctx.BIG.fromBytes(R),
x = ctx.BIG.fromBytes(X),
h = ctx.BIG.fromBytes(H),
W = ctx.ECP.fromBytes(wCID),
r, c, i;
if (W.is_infinity()) {
return this.INVALID_POINT;
}
W = ctx.PAIR192.G1mul(W, x);
r = new ctx.BIG(0);
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
// var q=new ctx.BIG(0); q.rcopy(ctx.ROM_FIELD.Modulus);
z.add(h);
z.mod(r);
g2.pinpow(pin, this.PBLEN);
g1.mul(g2);
c = g1.compow(z, r);
t = this.mpin_hash(sha, c, W);
for (i = 0; i < ctx.ECP.AESKEY; i++) {
CK[i] = t[i];
}
return 0;
},
/* calculate common key on server side */
/* Z=r.A - no time permits involved */
SERVER_KEY: function(sha, Z, SST, W, H, HID, xID, xCID, SK) {
var t = [],
sQ, R, A, U, w, h, g, c, i;
sQ = ctx.ECP4.fromBytes(SST);
if (sQ.is_infinity()) {
return this.INVALID_POINT;
}
R = ctx.ECP.fromBytes(Z);
if (R.is_infinity()) {
return this.INVALID_POINT;
}
A = ctx.ECP.fromBytes(HID);
if (A.is_infinity()) {
return this.INVALID_POINT;
}
if (xCID != null) {
U = ctx.ECP.fromBytes(xCID);
} else {
U = ctx.ECP.fromBytes(xID);
}
if (U.is_infinity()) {
return this.INVALID_POINT;
}
w = ctx.BIG.fromBytes(W);
h = ctx.BIG.fromBytes(H);
A = ctx.PAIR192.G1mul(A, h);
R.add(A);
//R.affine();
U = ctx.PAIR192.G1mul(U, w);
g = ctx.PAIR192.ate(sQ, R);
g = ctx.PAIR192.fexp(g);
c = g.trace();
t = this.mpin_hash(sha, c, U);
for (i = 0; i < ctx.ECP.AESKEY; i++) {
SK[i] = t[i];
}
return 0;
},
GET_DVS_KEYPAIR: function(rng, Z, Pa) {
var r = new ctx.BIG(0),
z, Q;
r.rcopy(ctx.ROM_CURVE.CURVE_Order);
if (rng != null) {
z = ctx.BIG.randomnum(r, rng);
z.toBytes(Z);
} else {
z = ctx.BIG.fromBytes(Z);
}
z.invmodp(r);
Q = ctx.ECP4.generator();
Q = ctx.PAIR192.G2mul(Q, z);
Q.toBytes(Pa);
return 0;
}
};
return MPIN192;
};