Revision 493d130bb523940efde89a74951e7a449fec93b0 authored by Aymeric Fromherz on 24 March 2020, 14:39:08 UTC, committed by Aymeric Fromherz on 24 March 2020, 14:39:08 UTC
2 parent s 24d3821 + 26c43ab
Raw File
Hacl_NaCl.c
/* MIT License
 *
 * Copyright (c) 2016-2020 INRIA, CMU and Microsoft Corporation
 *
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in all
 * copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 */


#include "Hacl_NaCl.h"

static void secretbox_init(u8 *xkeys, u8 *k, u8 *n1)
{
  u8 *subkey = xkeys;
  u8 *aekey = xkeys + (u32)32U;
  u8 *n0 = n1;
  u8 *n11 = n1 + (u32)16U;
  Hacl_Salsa20_hsalsa20(subkey, k, n0);
  Hacl_Salsa20_salsa20_key_block0(aekey, subkey, n11);
}

static void secretbox_detached(u32 mlen, u8 *c, u8 *tag, u8 *k, u8 *n1, u8 *m)
{
  u8 xkeys[96U] = { 0U };
  u8 *mkey;
  secretbox_init(xkeys, k, n1);
  mkey = xkeys + (u32)32U;
  {
    u8 *n11 = n1 + (u32)16U;
    u8 *subkey = xkeys;
    u8 *ekey0 = xkeys + (u32)64U;
    u32 mlen0;
    if (mlen <= (u32)32U)
      mlen0 = mlen;
    else
      mlen0 = (u32)32U;
    {
      u32 mlen1 = mlen - mlen0;
      u8 *m0 = m;
      u8 *m1 = m + mlen0;
      u8 block0[32U] = { 0U };
      u8 *c0;
      u8 *c1;
      memcpy(block0, m0, mlen0 * sizeof (m0[0U]));
      {
        u32 i;
        for (i = (u32)0U; i < (u32)32U; i++)
        {
          u8 *os = block0;
          u8 x = block0[i] ^ ekey0[i];
          os[i] = x;
        }
      }
      c0 = c;
      c1 = c + mlen0;
      memcpy(c0, block0, mlen0 * sizeof (block0[0U]));
      Hacl_Salsa20_salsa20_encrypt(mlen1, c1, m1, subkey, n11, (u32)1U);
      Hacl_Poly1305_32_poly1305_mac(tag, mlen, c, mkey);
    }
  }
}

static u32 secretbox_open_detached(u32 mlen, u8 *m, u8 *k, u8 *n1, u8 *c, u8 *tag)
{
  u8 xkeys[96U] = { 0U };
  u8 *mkey;
  secretbox_init(xkeys, k, n1);
  mkey = xkeys + (u32)32U;
  {
    u8 tag_[16U] = { 0U };
    Hacl_Poly1305_32_poly1305_mac(tag_, mlen, c, mkey);
    {
      u8 res0 = (u8)255U;
      u8 z;
      u32 res;
      {
        u32 i;
        for (i = (u32)0U; i < (u32)16U; i++)
        {
          u8 uu____0 = FStar_UInt8_eq_mask(tag[i], tag_[i]);
          res0 = uu____0 & res0;
        }
      }
      z = res0;
      if (z == (u8)255U)
      {
        u8 *subkey = xkeys;
        u8 *ekey0 = xkeys + (u32)64U;
        u8 *n11 = n1 + (u32)16U;
        u32 mlen0;
        if (mlen <= (u32)32U)
          mlen0 = mlen;
        else
          mlen0 = (u32)32U;
        {
          u32 mlen1 = mlen - mlen0;
          u8 *c0 = c;
          u8 *c1 = c + mlen0;
          u8 block0[32U] = { 0U };
          memcpy(block0, c0, mlen0 * sizeof (c0[0U]));
          {
            u32 i;
            for (i = (u32)0U; i < (u32)32U; i++)
            {
              u8 *os = block0;
              u8 x = block0[i] ^ ekey0[i];
              os[i] = x;
            }
          }
          {
            u8 *m0 = m;
            u8 *m1 = m + mlen0;
            memcpy(m0, block0, mlen0 * sizeof (block0[0U]));
            Hacl_Salsa20_salsa20_decrypt(mlen1, m1, c1, subkey, n11, (u32)1U);
            res = (u32)0U;
          }
        }
      }
      else
        res = (u32)0xffffffffU;
      return res;
    }
  }
}

static void secretbox_easy(u32 mlen, u8 *c, u8 *k, u8 *n1, u8 *m)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  secretbox_detached(mlen, cip, tag, k, n1, m);
}

static u32 secretbox_open_easy(u32 mlen, u8 *m, u8 *k, u8 *n1, u8 *c)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  return secretbox_open_detached(mlen, m, k, n1, cip, tag);
}

static inline u32 box_beforenm(u8 *k, u8 *pk, u8 *sk)
{
  u8 n0[16U] = { 0U };
  bool r = Hacl_Curve25519_51_ecdh(k, sk, pk);
  if (r)
  {
    Hacl_Salsa20_hsalsa20(k, k, n0);
    return (u32)0U;
  }
  return (u32)0xffffffffU;
}

static inline u32 box_detached_afternm(u32 mlen, u8 *c, u8 *tag, u8 *k, u8 *n1, u8 *m)
{
  secretbox_detached(mlen, c, tag, k, n1, m);
  return (u32)0U;
}

static inline u32 box_detached(u32 mlen, u8 *c, u8 *tag, u8 *sk, u8 *pk, u8 *n1, u8 *m)
{
  u8 k[32U] = { 0U };
  u32 r = box_beforenm(k, pk, sk);
  if (r == (u32)0U)
    return box_detached_afternm(mlen, c, tag, k, n1, m);
  return (u32)0xffffffffU;
}

static inline u32 box_open_detached_afternm(u32 mlen, u8 *m, u8 *k, u8 *n1, u8 *c, u8 *tag)
{
  return secretbox_open_detached(mlen, m, k, n1, c, tag);
}

static inline u32 box_open_detached(u32 mlen, u8 *m, u8 *pk, u8 *sk, u8 *n1, u8 *c, u8 *tag)
{
  u8 k[32U] = { 0U };
  u32 r = box_beforenm(k, pk, sk);
  if (r == (u32)0U)
    return box_open_detached_afternm(mlen, m, k, n1, c, tag);
  return (u32)0xffffffffU;
}

static inline u32 box_easy_afternm(u32 mlen, u8 *c, u8 *k, u8 *n1, u8 *m)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  u32 res = box_detached_afternm(mlen, cip, tag, k, n1, m);
  return res;
}

static inline u32 box_easy(u32 mlen, u8 *c, u8 *sk, u8 *pk, u8 *n1, u8 *m)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  u32 res = box_detached(mlen, cip, tag, sk, pk, n1, m);
  return res;
}

static inline u32 box_open_easy_afternm(u32 mlen, u8 *m, u8 *k, u8 *n1, u8 *c)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  return box_open_detached_afternm(mlen, m, k, n1, cip, tag);
}

static inline u32 box_open_easy(u32 mlen, u8 *m, u8 *pk, u8 *sk, u8 *n1, u8 *c)
{
  u8 *tag = c;
  u8 *cip = c + (u32)16U;
  return box_open_detached(mlen, m, pk, sk, n1, cip, tag);
}

u32 Hacl_NaCl_crypto_secretbox_detached(u8 *c, u8 *tag, u8 *m, u32 mlen, u8 *n1, u8 *k)
{
  secretbox_detached(mlen, c, tag, k, n1, m);
  return (u32)0U;
}

u32 Hacl_NaCl_crypto_secretbox_open_detached(u8 *m, u8 *c, u8 *tag, u32 mlen, u8 *n1, u8 *k)
{
  return secretbox_open_detached(mlen, m, k, n1, c, tag);
}

u32 Hacl_NaCl_crypto_secretbox_easy(u8 *c, u8 *m, u32 mlen, u8 *n1, u8 *k)
{
  secretbox_easy(mlen, c, k, n1, m);
  return (u32)0U;
}

u32 Hacl_NaCl_crypto_secretbox_open_easy(u8 *m, u8 *c, u32 clen, u8 *n1, u8 *k)
{
  return secretbox_open_easy(clen - (u32)16U, m, k, n1, c);
}

u32 Hacl_NaCl_crypto_box_beforenm(u8 *k, u8 *pk, u8 *sk)
{
  return box_beforenm(k, pk, sk);
}

u32 Hacl_NaCl_crypto_box_detached_afternm(u8 *c, u8 *tag, u8 *m, u32 mlen, u8 *n1, u8 *k)
{
  return box_detached_afternm(mlen, c, tag, k, n1, m);
}

u32 Hacl_NaCl_crypto_box_detached(u8 *c, u8 *tag, u8 *m, u32 mlen, u8 *n1, u8 *pk, u8 *sk)
{
  return box_detached(mlen, c, tag, sk, pk, n1, m);
}

u32 Hacl_NaCl_crypto_box_open_detached_afternm(u8 *m, u8 *c, u8 *tag, u32 mlen, u8 *n1, u8 *k)
{
  return box_open_detached_afternm(mlen, m, k, n1, c, tag);
}

u32 Hacl_NaCl_crypto_box_open_detached(u8 *m, u8 *c, u8 *tag, u32 mlen, u8 *n1, u8 *pk, u8 *sk)
{
  return box_open_detached(mlen, m, pk, sk, n1, c, tag);
}

u32 Hacl_NaCl_crypto_box_easy_afternm(u8 *c, u8 *m, u32 mlen, u8 *n1, u8 *k)
{
  return box_easy_afternm(mlen, c, k, n1, m);
}

u32 Hacl_NaCl_crypto_box_easy(u8 *c, u8 *m, u32 mlen, u8 *n1, u8 *pk, u8 *sk)
{
  return box_easy(mlen, c, sk, pk, n1, m);
}

u32 Hacl_NaCl_crypto_box_open_easy_afternm(u8 *m, u8 *c, u32 clen, u8 *n1, u8 *k)
{
  return box_open_easy_afternm(clen - (u32)16U, m, k, n1, c);
}

u32 Hacl_NaCl_crypto_box_open_easy(u8 *m, u8 *c, u32 clen, u8 *n1, u8 *pk, u8 *sk)
{
  return box_open_easy(clen - (u32)16U, m, pk, sk, n1, c);
}

back to top