Using the crypto library ========================= Picking a distribution ---------------------- Building the full ``hacl-star`` repository verifies the source F* and Vale code, then proceeds to extract it to C and assembly. However, users do not have to use this full build process: we provide the generated code in the ``dist/`` directory, under version control to facilitate obtaining the source code. Each subdirectory corresponds to a *distribution*, i.e. a particular set of options passed to KreMLin (the F*-to-C compiler) that influence how the generated C code looks like. There is a total order on distributions: ``c89-compatible <= msvc-compatible <= gcc-compatible <= gcc64-only`` - The C89 distribution will work with the most C compilers; it relies on ``alloca``; eliminates compound literals and enforces C89 scope to generate syntactically C89-compliant code; code still relies on inttypes.h and other headers that you may have to provide depending on your target. It does not include Merkle Trees and the code is incredibly verbose. - The MSVC distribution relies on ``alloca`` to avoid C11 VLA for the sake of MSVC; relies on KreMLin for tail-call optimizations. It also does not use GCC inline assembly for Curve25519 and uses external linkage instead. - The GCC distribution relies on C11 VLA and therefore does not work with MSVC. - The GCC64 distribution assumes a native ``unsigned __int128`` type which can be manipulated via the standard arithmetic operators. This generates very compact code but only works on 64-bit GCC and Clang. Other distributions are either for distinguished consumers of our code who need specific KreMLin compilation options (e.g. Mozilla, CCF) or for testing (e.g. portable-gcc-compatible, which compiles without ``-march=native``, to ensure all our assumptions about CPU targets are explicit in our Makefile). Compiling a full distribution ----------------------------- Each distribution comes with its own Makefile. It builds a static object (libevercrypt.a) and a dynamic object (libevercrypt.{so,dll}) along with the import library for Windows systems (libevercrypt.dll.a). On Windows, the Makefile has been tested in a Cygwin environment equipped with the MinGW cross-compilers. The `dist/compact-msvc` distribution works with the Microsoft compilers, but we provide no build support (i.e. no Visual Studio project, no NMake-compatible makefile). .. note:: The ``gcc-compatible`` distribution also features OCaml bindings to our code. These require a valid OCaml setup, including packages ctypes and bigstring, usually obtained via OPAM. You can easily disable building these bindings by removing the ``lib_gen`` directory in ``dist/gcc-compatible``. Integrating the code -------------------- To incorporate our verified crypto code into a C software project, a developer has two choices. - Pick a full EverCrypt distribution, along with the `dist/kremlin` directory, thus giving a "wholesale" integration of the EverCrypt library, including all supported algorithms from HACL* and Vale. - For a more selective integration, cherry-pick the C or assembly files for specific versions of specific algorithms. Each header file contains the list of other headers (and implementations) it depends on so it's easy to integrate, say, an individual algorithm from the HACL API without taking the full library. The ``dist/kremlin`` directory contains all the required headers from KreMLin. In particular, these headers contain implementations of FStar.UInt128, the module for 128-bit arithmetic. The ``kremlin/include/kremlin/internal/types.h`` header will attempt to use C preprocessor macros to pick the right UInt128 implementation for your platform: - 64-bit environment with GCC/Clang: hand-written implementation using ``unsigned __int128`` (unverified) - MSVC: hand-written implementation using intrinsics (also unverified) - every other case, or when ``KRML_VERIFIED_UINT128`` is defined at compile-time: verified (slow) implementation extracted from FStar.UInt128 Bindings for Other Languages ---------------------------- HACL* and EverCrypt are designed to primarily be used either within verification-oriented projects in F* or as part of larger C developments. In addition to these use cases, the library developers and other HACL* users have also developed bindings for other programming languages: OCaml ^^^^^ The KReMLin compiler auto-generates ``ocaml-ctypes`` bindings for HACL*. On top of these "raw" bindings, we add a high-level wrapper that uses functors, shares type signatures, performs run-time checks and offers a much more idiomatic API. They are both available as opam packages and can be installed using ``opam install hacl-star`` or, to get the low-level bindings only, ``opam install hacl-star-raw``. From source, the low-level bindings can be installed by running ``make install-hacl-star-raw`` in ``dist/gcc-compatible``. Then, the high-level wrapper can be installed by running ``dune build && dune install`` in ``bindings/ocaml``. Documentation for the high-level API is available `here `_. JavaScript ^^^^^^^^^^ HACL* is compiled to WebAssembly via the WASM backend of KreMLin (see the Oakland'19 paper for details). We offer an idiomatic JavaScript API on top of HACL-WASM so that clients do not have to be aware of the KreMLin memory layout, calling convention, etc. This latter API is available as a `Node.js package `_. The `jsdoc` documentation of the package can be found `online `_. Please note that the API is asynchronous (it uses promises). Here is a small example of how to use the library (with Node.js) : .. code-block:: javascript var hacl = require("hacl-wasm"); hacl.Curve25519.ecdh(new Uint8Array(32), new Uint8Array(32)).then(function (result) { // Here result contains an Uint8Array of size 32 with the DH exchange result }); Rust ^^^^ Various users have also published Rust crates for HACL*, but these have not been vetted by the HACL maintainers.