/* MIT License * * Copyright (c) 2016-2020 INRIA, CMU and Microsoft Corporation * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE * SOFTWARE. */ #include "Hacl_HPKE_P256_CP32_SHA256.h" #include "internal/Hacl_P256.h" uint32_t Hacl_HPKE_P256_CP32_SHA256_setupBaseI( uint8_t *o_pkE, uint8_t *o_k, uint8_t *o_n, uint8_t *skE, uint8_t *pkR, uint32_t infolen, uint8_t *info ) { uint8_t zz[65U] = { 0U }; uint8_t *o_pkE_ = o_pkE + (uint32_t)1U; uint8_t *o_zz_ = zz + (uint32_t)1U; uint64_t tempBuffer[100U] = { 0U }; uint64_t resultBuffer[12U] = { 0U }; uint64_t *resultBufferX = resultBuffer; uint64_t *resultBufferY = resultBuffer + (uint32_t)4U; uint8_t *resultX0 = o_pkE_; uint8_t *resultY0 = o_pkE_ + (uint32_t)32U; uint64_t flag0; bool res0; uint32_t res1; uint8_t *uu____0; Hacl_Impl_P256_Core_secretToPublic(resultBuffer, skE, tempBuffer); flag0 = Hacl_Impl_P256_Core_isPointAtInfinityPrivate(resultBuffer); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferX); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferY); Hacl_Impl_P256_LowLevel_toUint8(resultBufferX, resultX0); Hacl_Impl_P256_LowLevel_toUint8(resultBufferY, resultY0); res0 = flag0 == (uint64_t)0U; if (res0) { res1 = (uint32_t)0U; } else { res1 = (uint32_t)1U; } uu____0 = pkR + (uint32_t)1U; { uint8_t tmp0[64U] = { 0U }; uint64_t resultBufferFelem[12U] = { 0U }; uint64_t *resultBufferFelemX = resultBufferFelem; uint64_t *resultBufferFelemY = resultBufferFelem + (uint32_t)4U; uint8_t *resultX = tmp0; uint8_t *resultY = tmp0 + (uint32_t)32U; uint64_t publicKeyAsFelem[8U] = { 0U }; uint64_t *publicKeyFelemX = publicKeyAsFelem; uint64_t *publicKeyFelemY = publicKeyAsFelem + (uint32_t)4U; uint8_t *pubKeyX = uu____0; uint8_t *pubKeyY = uu____0 + (uint32_t)32U; uint64_t flag; bool res3; uint32_t res2; uint32_t res; Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyX, publicKeyFelemX); Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyY, publicKeyFelemY); flag = Hacl_Impl_P256_DH__ecp256dh_r(resultBufferFelem, publicKeyAsFelem, skE); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemX); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemY); Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemX, resultX); Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemY, resultY); res3 = flag == (uint64_t)0U; memcpy(o_zz_, tmp0, (uint32_t)64U * sizeof (uint8_t)); if (res3) { res2 = (uint32_t)0U; } else { res2 = (uint32_t)1U; } zz[0U] = (uint8_t)4U; o_pkE[0U] = (uint8_t)4U; res = res1 | res2; { uint8_t default_psk[32U] = { 0U }; uint8_t default_pkI[65U] = { 0U }; uint32_t context_len = (uint32_t)7U + (uint32_t)3U * (uint32_t)65U + (uint32_t)2U * (uint32_t)32U; KRML_CHECK_SIZE(sizeof (uint8_t), context_len); { uint8_t context[context_len]; memset(context, 0U, context_len * sizeof (uint8_t)); { uint8_t label_key[8U] = { (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x79U }; uint8_t label_nonce[10U] = { (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U, (uint8_t)0x6eU, (uint8_t)0x6fU, (uint8_t)0x6eU, (uint8_t)0x63U, (uint8_t)0x65U }; KRML_CHECK_SIZE(sizeof (uint8_t), (uint32_t)10U + context_len); { uint8_t tmp[(uint32_t)10U + context_len]; memset(tmp, 0U, ((uint32_t)10U + context_len) * sizeof (uint8_t)); { uint8_t secret[32U] = { 0U }; uint8_t *info_hash = tmp; uint8_t *pskID_hash = tmp + (uint32_t)32U; uint8_t *empty_b; uint8_t *uu____1; uint8_t *uu____2; uint8_t *uu____3; uint8_t *uu____4; uint8_t *pskhash_b; uint8_t *output_info; uint8_t *info_key; Hacl_Hash_SHA2_hash_256(info, infolen, info_hash); empty_b = info; Hacl_Hash_SHA2_hash_256(empty_b, (uint32_t)0U, pskID_hash); context[0U] = (uint8_t)0U; uu____1 = context + (uint32_t)1U; uu____2 = uu____1; uu____2[0U] = (uint8_t)0U; uu____2[1U] = (uint8_t)1U; uu____3 = uu____1 + (uint32_t)2U; uu____3[0U] = (uint8_t)0U; uu____3[1U] = (uint8_t)1U; uu____4 = uu____1 + (uint32_t)4U; uu____4[0U] = (uint8_t)0U; uu____4[1U] = (uint8_t)3U; memcpy(context + (uint32_t)7U, o_pkE, (uint32_t)65U * sizeof (uint8_t)); memcpy(context + (uint32_t)7U + (uint32_t)65U, pkR, (uint32_t)65U * sizeof (uint8_t)); memcpy(context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U, default_pkI, (uint32_t)65U * sizeof (uint8_t)); pskhash_b = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U; memcpy(pskhash_b, pskID_hash, (uint32_t)32U * sizeof (uint8_t)); output_info = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U + (uint32_t)32U; memcpy(output_info, info_hash, (uint32_t)32U * sizeof (uint8_t)); Hacl_HKDF_extract_sha2_256(secret, default_psk, (uint32_t)32U, zz, (uint32_t)65U); info_key = tmp + (uint32_t)2U; memcpy(info_key, label_key, (uint32_t)8U * sizeof (uint8_t)); memcpy(info_key + (uint32_t)8U, context, context_len * sizeof (uint8_t)); Hacl_HKDF_expand_sha2_256(o_k, secret, (uint32_t)32U, info_key, (uint32_t)8U + context_len, (uint32_t)32U); memcpy(tmp, label_nonce, (uint32_t)10U * sizeof (uint8_t)); Hacl_HKDF_expand_sha2_256(o_n, secret, (uint32_t)32U, tmp, (uint32_t)10U + context_len, (uint32_t)12U); return res; } } } } } } } uint32_t Hacl_HPKE_P256_CP32_SHA256_setupBaseR( uint8_t *o_key_aead, uint8_t *o_nonce_aead, uint8_t *pkE, uint8_t *skR, uint32_t infolen, uint8_t *info ) { uint8_t pkR[65U] = { 0U }; uint8_t *pkR_ = pkR + (uint32_t)1U; uint8_t zz[65U] = { 0U }; uint64_t tempBuffer[100U] = { 0U }; uint64_t resultBuffer[12U] = { 0U }; uint64_t *resultBufferX = resultBuffer; uint64_t *resultBufferY = resultBuffer + (uint32_t)4U; uint8_t *resultX0 = pkR_; uint8_t *resultY0 = pkR_ + (uint32_t)32U; uint64_t flag0; bool res0; uint32_t res1; uint8_t *o_pkR_; uint8_t *uu____0; Hacl_Impl_P256_Core_secretToPublic(resultBuffer, skR, tempBuffer); flag0 = Hacl_Impl_P256_Core_isPointAtInfinityPrivate(resultBuffer); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferX); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferY); Hacl_Impl_P256_LowLevel_toUint8(resultBufferX, resultX0); Hacl_Impl_P256_LowLevel_toUint8(resultBufferY, resultY0); res0 = flag0 == (uint64_t)0U; if (res0) { res1 = (uint32_t)0U; } else { res1 = (uint32_t)1U; } pkR[0U] = (uint8_t)4U; o_pkR_ = zz + (uint32_t)1U; uu____0 = pkE + (uint32_t)1U; { uint8_t tmp0[64U] = { 0U }; uint64_t resultBufferFelem[12U] = { 0U }; uint64_t *resultBufferFelemX = resultBufferFelem; uint64_t *resultBufferFelemY = resultBufferFelem + (uint32_t)4U; uint8_t *resultX = tmp0; uint8_t *resultY = tmp0 + (uint32_t)32U; uint64_t publicKeyAsFelem[8U] = { 0U }; uint64_t *publicKeyFelemX = publicKeyAsFelem; uint64_t *publicKeyFelemY = publicKeyAsFelem + (uint32_t)4U; uint8_t *pubKeyX = uu____0; uint8_t *pubKeyY = uu____0 + (uint32_t)32U; uint64_t flag; bool res3; uint32_t res; uint32_t res2; Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyX, publicKeyFelemX); Hacl_Impl_P256_LowLevel_toUint64ChangeEndian(pubKeyY, publicKeyFelemY); flag = Hacl_Impl_P256_DH__ecp256dh_r(resultBufferFelem, publicKeyAsFelem, skR); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemX); Hacl_Impl_P256_LowLevel_changeEndian(resultBufferFelemY); Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemX, resultX); Hacl_Impl_P256_LowLevel_toUint8(resultBufferFelemY, resultY); res3 = flag == (uint64_t)0U; memcpy(o_pkR_, tmp0, (uint32_t)64U * sizeof (uint8_t)); if (res3) { res = (uint32_t)0U; } else { res = (uint32_t)1U; } zz[0U] = (uint8_t)4U; res2 = res; { uint8_t default_psk[32U] = { 0U }; uint8_t default_pkI[65U] = { 0U }; uint32_t context_len = (uint32_t)7U + (uint32_t)3U * (uint32_t)65U + (uint32_t)2U * (uint32_t)32U; KRML_CHECK_SIZE(sizeof (uint8_t), context_len); { uint8_t context[context_len]; memset(context, 0U, context_len * sizeof (uint8_t)); { uint8_t label_key[8U] = { (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x79U }; uint8_t label_nonce[10U] = { (uint8_t)0x68U, (uint8_t)0x70U, (uint8_t)0x6bU, (uint8_t)0x65U, (uint8_t)0x20U, (uint8_t)0x6eU, (uint8_t)0x6fU, (uint8_t)0x6eU, (uint8_t)0x63U, (uint8_t)0x65U }; KRML_CHECK_SIZE(sizeof (uint8_t), (uint32_t)10U + context_len); { uint8_t tmp[(uint32_t)10U + context_len]; memset(tmp, 0U, ((uint32_t)10U + context_len) * sizeof (uint8_t)); { uint8_t secret[32U] = { 0U }; uint8_t *info_hash = tmp; uint8_t *pskID_hash = tmp + (uint32_t)32U; uint8_t *empty_b; uint8_t *uu____1; uint8_t *uu____2; uint8_t *uu____3; uint8_t *uu____4; uint8_t *pskhash_b; uint8_t *output_info; uint8_t *info_key; Hacl_Hash_SHA2_hash_256(info, infolen, info_hash); empty_b = info; Hacl_Hash_SHA2_hash_256(empty_b, (uint32_t)0U, pskID_hash); context[0U] = (uint8_t)0U; uu____1 = context + (uint32_t)1U; uu____2 = uu____1; uu____2[0U] = (uint8_t)0U; uu____2[1U] = (uint8_t)1U; uu____3 = uu____1 + (uint32_t)2U; uu____3[0U] = (uint8_t)0U; uu____3[1U] = (uint8_t)1U; uu____4 = uu____1 + (uint32_t)4U; uu____4[0U] = (uint8_t)0U; uu____4[1U] = (uint8_t)3U; memcpy(context + (uint32_t)7U, pkE, (uint32_t)65U * sizeof (uint8_t)); memcpy(context + (uint32_t)7U + (uint32_t)65U, pkR, (uint32_t)65U * sizeof (uint8_t)); memcpy(context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U, default_pkI, (uint32_t)65U * sizeof (uint8_t)); pskhash_b = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U; memcpy(pskhash_b, pskID_hash, (uint32_t)32U * sizeof (uint8_t)); output_info = context + (uint32_t)7U + (uint32_t)65U + (uint32_t)65U + (uint32_t)65U + (uint32_t)32U; memcpy(output_info, info_hash, (uint32_t)32U * sizeof (uint8_t)); Hacl_HKDF_extract_sha2_256(secret, default_psk, (uint32_t)32U, zz, (uint32_t)65U); info_key = tmp + (uint32_t)2U; memcpy(info_key, label_key, (uint32_t)8U * sizeof (uint8_t)); memcpy(info_key + (uint32_t)8U, context, context_len * sizeof (uint8_t)); Hacl_HKDF_expand_sha2_256(o_key_aead, secret, (uint32_t)32U, info_key, (uint32_t)8U + context_len, (uint32_t)32U); memcpy(tmp, label_nonce, (uint32_t)10U * sizeof (uint8_t)); Hacl_HKDF_expand_sha2_256(o_nonce_aead, secret, (uint32_t)32U, tmp, (uint32_t)10U + context_len, (uint32_t)12U); return res1 | res2; } } } } } } } uint32_t Hacl_HPKE_P256_CP32_SHA256_sealBase( uint8_t *skE, uint8_t *pkR, uint32_t mlen, uint8_t *m, uint32_t infolen, uint8_t *info, uint8_t *output ) { uint8_t zz[65U] = { 0U }; uint8_t k[32U] = { 0U }; uint8_t n[12U] = { 0U }; uint8_t *pkE = output; uint32_t res0 = Hacl_HPKE_P256_CP32_SHA256_setupBaseI(pkE, k, n, skE, pkR, infolen, info); uint8_t *dec = output + (uint32_t)65U; uint32_t res; Hacl_Chacha20Poly1305_32_aead_encrypt(k, n, infolen, info, mlen, m, dec, dec + mlen); res = res0; return res; } uint32_t Hacl_HPKE_P256_CP32_SHA256_openBase( uint8_t *pkE, uint8_t *skR, uint32_t mlen, uint8_t *m, uint32_t infolen, uint8_t *info, uint8_t *output ) { uint8_t zz[65U] = { 0U }; uint8_t k[32U] = { 0U }; uint8_t n[12U] = { 0U }; uint8_t *pkE1 = m; uint32_t clen = mlen - (uint32_t)65U; uint8_t *c = m + (uint32_t)65U; uint32_t res1 = Hacl_HPKE_P256_CP32_SHA256_setupBaseR(k, n, pkE1, skR, infolen, info); uint32_t res2 = Hacl_Chacha20Poly1305_32_aead_decrypt(k, n, infolen, info, clen - (uint32_t)16U, output, c, c + clen - (uint32_t)16U); uint32_t z = res1 | res2; return z; }