Revision 539576ec53104316dacac738fca7bc8fd967de62 authored by Son Ho on 26 February 2021, 12:56:35 UTC, committed by Son Ho on 26 February 2021, 12:56:35 UTC
1 parent 7fc6186
Raw File
Hacl_HPKE_P256_CP32_SHA256.c
/* MIT License
 *
 * Copyright (c) 2016-2020 INRIA, CMU and Microsoft Corporation
 *
 * Permission is hereby granted, free of charge, to any person obtaining a copy
 * of this software and associated documentation files (the "Software"), to deal
 * in the Software without restriction, including without limitation the rights
 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 * copies of the Software, and to permit persons to whom the Software is
 * furnished to do so, subject to the following conditions:
 *
 * The above copyright notice and this permission notice shall be included in all
 * copies or substantial portions of the Software.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 */


#include "Hacl_HPKE_P256_CP32_SHA256.h"

uint32_t
Hacl_HPKE_P256_CP32_SHA256_setupBaseI(
  uint8_t *o_pkE,
  uint8_t *o_k,
  uint8_t *o_n,
  uint8_t *skE,
  uint8_t *pkR,
  uint32_t infolen,
  uint8_t *info
)
{
  uint8_t zz[65U] = { 0U };
  uint8_t *o_pkE_ = o_pkE + (uint32_t)1U;
  uint8_t *o_zz_ = zz + (uint32_t)1U;
  uint64_t tempBuffer[100U] = { 0U };
  uint64_t resultBuffer[12U] = { 0U };
  uint64_t *resultBufferX = resultBuffer;
  uint64_t *resultBufferY = resultBuffer + (uint32_t)4U;
  uint8_t *resultX0 = o_pkE_;
  uint8_t *resultY0 = o_pkE_ + (uint32_t)32U;
  uint64_t flag0;
  bool res0;
  uint32_t res1;
  uint8_t *uu____0;
  Hacl_Impl_P256_Core_secretToPublic(resultBuffer, skE, tempBuffer);
  flag0 = Hacl_Impl_P256_Core_isPointAtInfinityPrivate(resultBuffer);
  Hacl_Impl_P256_LowLevel_changeEndian(resultBufferX);
  Hacl_Impl_P256_LowLevel_changeEndian(resultBufferY);
  Hacl_Impl_P256_LowLevel_toUint8(resultBufferX, resultX0);
  Hacl_Impl_P256_LowLevel_toUint8(resultBufferY, resultY0);
  res0 = flag0 == (uint64_t)0U;
  if (res0)
  {
    res1 = (uint32_t)0U;
  }
  else
  {
    res1 = (uint32_t)1U;
  }
  uu____0 = pkR + (uint32_t)1U;
  {
    uint8_t tmp0[64U] = { 0U };
    uint64_t resultBufferFelem[12U] = { 0U };
    uint64_t *resultBufferFelemX = resultBufferFelem;
    uint64_t *resultBufferFelemY = resultBufferFelem + (uint32_t)4U;
    uint8_t *resultX = tmp0;
    uint8_t *resultY = tmp0 + (uint32_t)32U;
    uint64_t publicKeyAsFelem[8U] = { 0U };
    uint64_t *publicKeyFelemX = publicKeyAsFelem;
    uint64_t *publicKeyFelemY = publicKeyAsFelem + (uint32_t)4U;
    uint8_t *pubKeyX = uu____0;
    uint8_t *pubKeyY = uu____0 + (uint32_t)32U;
    uint64_t flag;
    bool res3;
    uint32_t res2;
    uint32_t res;
    Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyX, publicKeyFelemX);
    Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyY, publicKeyFelemY);
    flag = Hacl_Impl_P256_DH__ecp256dh_r(resultBufferFelem, publicKeyAsFelem, skE);
    Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemX);
    Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemY);
    Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemX, resultX);
    Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemY, resultY);
    res3 = flag == (uint64_t)0U;
    memcpy(o_zz_, tmp0, (uint32_t)64U * sizeof (uint8_t));
    if (res3)
    {
      res2 = (uint32_t)0U;
    }
    else
    {
      res2 = (uint32_t)1U;
    }
    zz[0U] = (uint8_t)4U;
    o_pkE[0U] = (uint8_t)4U;
    res = res1 | res2;
    {
      uint8_t default_psk[32U] = { 0U };
      uint8_t default_pkI[65U] = { 0U };
      uint32_t
      context_len = (uint32_t)7U + (uint32_t)3U * (uint32_t)65U + (uint32_t)2U * (uint32_t)32U;
      KRML_CHECK_SIZE(sizeof (uint8_t), context_len);
      {
        uint8_t context[context_len];
        memset(context, 0U, context_len * sizeof (uint8_t));
        {
          uint8_t
          label_key[8U] =
            {
              (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U,
              (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x79U
            };
          uint8_t
          label_nonce[10U] =
            {
              (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U,
              (uint8_t)0x6eU, (uint8_t)0x6fU, (uint8_t)0x6eU, (uint8_t)0x63U, (uint8_t)0x65U
            };
          KRML_CHECK_SIZE(sizeof (uint8_t), (uint32_t)10U + context_len);
          {
            uint8_t tmp[(uint32_t)10U + context_len];
            memset(tmp, 0U, ((uint32_t)10U + context_len) * sizeof (uint8_t));
            {
              uint8_t secret[32U] = { 0U };
              uint8_t *info_hash = tmp;
              uint8_t *pskID_hash = tmp + (uint32_t)32U;
              uint8_t *empty_b;
              uint8_t *uu____1;
              uint8_t *uu____2;
              uint8_t *uu____3;
              uint8_t *uu____4;
              uint8_t *pskhash_b;
              uint8_t *output_info;
              uint8_t *info_key;
              Hacl_Hash_SHA2_hash_256(info, infolen, info_hash);
              empty_b = info;
              Hacl_Hash_SHA2_hash_256(empty_b, (uint32_t)0U, pskID_hash);
              context[0U] = (uint8_t)0U;
              uu____1 = context + (uint32_t)1U;
              uu____2 = uu____1;
              uu____2[0U] = (uint8_t)0U;
              uu____2[1U] = (uint8_t)1U;
              uu____3 = uu____1 + (uint32_t)2U;
              uu____3[0U] = (uint8_t)0U;
              uu____3[1U] = (uint8_t)1U;
              uu____4 = uu____1 + (uint32_t)4U;
              uu____4[0U] = (uint8_t)0U;
              uu____4[1U] = (uint8_t)3U;
              memcpy(context + (uint32_t)7U, o_pkE, (uint32_t)65U * sizeof (uint8_t));
              memcpy(context + (uint32_t)7U + (uint32_t)65U, pkR, (uint32_t)65U * sizeof (uint8_t));
              memcpy(context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U,
                default_pkI,
                (uint32_t)65U * sizeof (uint8_t));
              pskhash_b = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U;
              memcpy(pskhash_b, pskID_hash, (uint32_t)32U * sizeof (uint8_t));
              output_info =
                context
                + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U + (uint32_t)32U;
              memcpy(output_info, info_hash, (uint32_t)32U * sizeof (uint8_t));
              Hacl_HKDF_extract_sha2_256(secret, default_psk, (uint32_t)32U, zz, (uint32_t)65U);
              info_key = tmp + (uint32_t)2U;
              memcpy(info_key, label_key, (uint32_t)8U * sizeof (uint8_t));
              memcpy(info_key + (uint32_t)8U, context, context_len * sizeof (uint8_t));
              Hacl_HKDF_expand_sha2_256(o_k,
                secret,
                (uint32_t)32U,
                info_key,
                (uint32_t)8U + context_len,
                (uint32_t)32U);
              memcpy(tmp, label_nonce, (uint32_t)10U * sizeof (uint8_t));
              Hacl_HKDF_expand_sha2_256(o_n,
                secret,
                (uint32_t)32U,
                tmp,
                (uint32_t)10U + context_len,
                (uint32_t)12U);
              return res;
            }
          }
        }
      }
    }
  }
}

uint32_t
Hacl_HPKE_P256_CP32_SHA256_setupBaseR(
  uint8_t *o_key_aead,
  uint8_t *o_nonce_aead,
  uint8_t *pkE,
  uint8_t *skR,
  uint32_t infolen,
  uint8_t *info
)
{
  uint8_t pkR[65U] = { 0U };
  uint8_t *pkR_ = pkR + (uint32_t)1U;
  uint8_t zz[65U] = { 0U };
  uint64_t tempBuffer[100U] = { 0U };
  uint64_t resultBuffer[12U] = { 0U };
  uint64_t *resultBufferX = resultBuffer;
  uint64_t *resultBufferY = resultBuffer + (uint32_t)4U;
  uint8_t *resultX0 = pkR_;
  uint8_t *resultY0 = pkR_ + (uint32_t)32U;
  uint64_t flag0;
  bool res0;
  uint32_t res1;
  uint8_t *o_pkR_;
  uint8_t *uu____0;
  Hacl_Impl_P256_Core_secretToPublic(resultBuffer, skR, tempBuffer);
  flag0 = Hacl_Impl_P256_Core_isPointAtInfinityPrivate(resultBuffer);
  Hacl_Impl_P256_LowLevel_changeEndian(resultBufferX);
  Hacl_Impl_P256_LowLevel_changeEndian(resultBufferY);
  Hacl_Impl_P256_LowLevel_toUint8(resultBufferX, resultX0);
  Hacl_Impl_P256_LowLevel_toUint8(resultBufferY, resultY0);
  res0 = flag0 == (uint64_t)0U;
  if (res0)
  {
    res1 = (uint32_t)0U;
  }
  else
  {
    res1 = (uint32_t)1U;
  }
  pkR[0U] = (uint8_t)4U;
  o_pkR_ = zz + (uint32_t)1U;
  uu____0 = pkE + (uint32_t)1U;
  {
    uint8_t tmp0[64U] = { 0U };
    uint64_t resultBufferFelem[12U] = { 0U };
    uint64_t *resultBufferFelemX = resultBufferFelem;
    uint64_t *resultBufferFelemY = resultBufferFelem + (uint32_t)4U;
    uint8_t *resultX = tmp0;
    uint8_t *resultY = tmp0 + (uint32_t)32U;
    uint64_t publicKeyAsFelem[8U] = { 0U };
    uint64_t *publicKeyFelemX = publicKeyAsFelem;
    uint64_t *publicKeyFelemY = publicKeyAsFelem + (uint32_t)4U;
    uint8_t *pubKeyX = uu____0;
    uint8_t *pubKeyY = uu____0 + (uint32_t)32U;
    uint64_t flag;
    bool res3;
    uint32_t res;
    uint32_t res2;
    Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyX, publicKeyFelemX);
    Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyY, publicKeyFelemY);
    flag = Hacl_Impl_P256_DH__ecp256dh_r(resultBufferFelem, publicKeyAsFelem, skR);
    Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemX);
    Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemY);
    Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemX, resultX);
    Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemY, resultY);
    res3 = flag == (uint64_t)0U;
    memcpy(o_pkR_, tmp0, (uint32_t)64U * sizeof (uint8_t));
    if (res3)
    {
      res = (uint32_t)0U;
    }
    else
    {
      res = (uint32_t)1U;
    }
    zz[0U] = (uint8_t)4U;
    res2 = res;
    {
      uint8_t default_psk[32U] = { 0U };
      uint8_t default_pkI[65U] = { 0U };
      uint32_t
      context_len = (uint32_t)7U + (uint32_t)3U * (uint32_t)65U + (uint32_t)2U * (uint32_t)32U;
      KRML_CHECK_SIZE(sizeof (uint8_t), context_len);
      {
        uint8_t context[context_len];
        memset(context, 0U, context_len * sizeof (uint8_t));
        {
          uint8_t
          label_key[8U] =
            {
              (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U,
              (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x79U
            };
          uint8_t
          label_nonce[10U] =
            {
              (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U,
              (uint8_t)0x6eU, (uint8_t)0x6fU, (uint8_t)0x6eU, (uint8_t)0x63U, (uint8_t)0x65U
            };
          KRML_CHECK_SIZE(sizeof (uint8_t), (uint32_t)10U + context_len);
          {
            uint8_t tmp[(uint32_t)10U + context_len];
            memset(tmp, 0U, ((uint32_t)10U + context_len) * sizeof (uint8_t));
            {
              uint8_t secret[32U] = { 0U };
              uint8_t *info_hash = tmp;
              uint8_t *pskID_hash = tmp + (uint32_t)32U;
              uint8_t *empty_b;
              uint8_t *uu____1;
              uint8_t *uu____2;
              uint8_t *uu____3;
              uint8_t *uu____4;
              uint8_t *pskhash_b;
              uint8_t *output_info;
              uint8_t *info_key;
              Hacl_Hash_SHA2_hash_256(info, infolen, info_hash);
              empty_b = info;
              Hacl_Hash_SHA2_hash_256(empty_b, (uint32_t)0U, pskID_hash);
              context[0U] = (uint8_t)0U;
              uu____1 = context + (uint32_t)1U;
              uu____2 = uu____1;
              uu____2[0U] = (uint8_t)0U;
              uu____2[1U] = (uint8_t)1U;
              uu____3 = uu____1 + (uint32_t)2U;
              uu____3[0U] = (uint8_t)0U;
              uu____3[1U] = (uint8_t)1U;
              uu____4 = uu____1 + (uint32_t)4U;
              uu____4[0U] = (uint8_t)0U;
              uu____4[1U] = (uint8_t)3U;
              memcpy(context + (uint32_t)7U, pkE, (uint32_t)65U * sizeof (uint8_t));
              memcpy(context + (uint32_t)7U + (uint32_t)65U, pkR, (uint32_t)65U * sizeof (uint8_t));
              memcpy(context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U,
                default_pkI,
                (uint32_t)65U * sizeof (uint8_t));
              pskhash_b = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U;
              memcpy(pskhash_b, pskID_hash, (uint32_t)32U * sizeof (uint8_t));
              output_info =
                context
                + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U + (uint32_t)32U;
              memcpy(output_info, info_hash, (uint32_t)32U * sizeof (uint8_t));
              Hacl_HKDF_extract_sha2_256(secret, default_psk, (uint32_t)32U, zz, (uint32_t)65U);
              info_key = tmp + (uint32_t)2U;
              memcpy(info_key, label_key, (uint32_t)8U * sizeof (uint8_t));
              memcpy(info_key + (uint32_t)8U, context, context_len * sizeof (uint8_t));
              Hacl_HKDF_expand_sha2_256(o_key_aead,
                secret,
                (uint32_t)32U,
                info_key,
                (uint32_t)8U + context_len,
                (uint32_t)32U);
              memcpy(tmp, label_nonce, (uint32_t)10U * sizeof (uint8_t));
              Hacl_HKDF_expand_sha2_256(o_nonce_aead,
                secret,
                (uint32_t)32U,
                tmp,
                (uint32_t)10U + context_len,
                (uint32_t)12U);
              return res1 | res2;
            }
          }
        }
      }
    }
  }
}

uint32_t
Hacl_HPKE_P256_CP32_SHA256_sealBase(
  uint8_t *skE,
  uint8_t *pkR,
  uint32_t mlen,
  uint8_t *m,
  uint32_t infolen,
  uint8_t *info,
  uint8_t *output
)
{
  uint8_t zz[65U] = { 0U };
  uint8_t k[32U] = { 0U };
  uint8_t n[12U] = { 0U };
  uint8_t *pkE = output;
  uint32_t res0 = Hacl_HPKE_P256_CP32_SHA256_setupBaseI(pkE, k, n, skE, pkR, infolen, info);
  uint8_t *dec = output + (uint32_t)65U;
  uint32_t res;
  Hacl_Chacha20Poly1305_32_aead_encrypt(k, n, infolen, info, mlen, m, dec, dec + mlen);
  res = res0;
  return res;
}

uint32_t
Hacl_HPKE_P256_CP32_SHA256_openBase(
  uint8_t *pkE,
  uint8_t *skR,
  uint32_t mlen,
  uint8_t *m,
  uint32_t infolen,
  uint8_t *info,
  uint8_t *output
)
{
  uint8_t zz[65U] = { 0U };
  uint8_t k[32U] = { 0U };
  uint8_t n[12U] = { 0U };
  uint8_t *pkE1 = m;
  uint32_t clen = mlen - (uint32_t)65U;
  uint8_t *c = m + (uint32_t)65U;
  uint32_t res1 = Hacl_HPKE_P256_CP32_SHA256_setupBaseR(k, n, pkE1, skR, infolen, info);
  uint32_t
  res2 =
    Hacl_Chacha20Poly1305_32_aead_decrypt(k,
      n,
      infolen,
      info,
      clen - (uint32_t)16U,
      output,
      c,
      c + clen - (uint32_t)16U);
  uint32_t z = res1 | res2;
  return z;
}

back to top