-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add Poly1305 MAC and ChaCha20Poly1305 AEAD
- Loading branch information
Showing
11 changed files
with
1,915 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -23,6 +23,8 @@ members = [ | |
"sha2", | ||
"ed25519", | ||
"curve25519", | ||
"poly1305", | ||
"chacha20poly1305", | ||
] | ||
|
||
[workspace.package] | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
[package] | ||
name = "libcrux-chacha20poly1305" | ||
description = "Formally verified ChaCha20-Poly1305 AEAD library" | ||
|
||
version.workspace = true | ||
authors.workspace = true | ||
license.workspace = true | ||
homepage.workspace = true | ||
edition.workspace = true | ||
repository.workspace = true | ||
readme.workspace = true | ||
|
||
[features] | ||
default = ["hacl"] | ||
hacl = ["dep:libcrux-poly1305", "dep:libcrux-hacl-rs", "dep:libcrux-macros"] | ||
|
||
[dependencies] | ||
libcrux-poly1305 = { version = "=0.0.2-beta.2", path = "../poly1305/", features = [ | ||
"expose-hacl", | ||
], optional = true } | ||
libcrux-hacl-rs = { version = "=0.0.2-beta.2", path = "../hacl-rs/", optional = true } | ||
libcrux-macros = { version = "=0.0.2-beta.2", path = "../macros", optional = true } |
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,190 @@ | ||
#![allow(non_snake_case)] | ||
#![allow(non_upper_case_globals)] | ||
#![allow(non_camel_case_types)] | ||
#![allow(unused_assignments)] | ||
#![allow(unreachable_patterns)] | ||
|
||
//! This module contains generated hacl code. | ||
use libcrux_hacl_rs::prelude::*; | ||
use libcrux_macros as krml; | ||
|
||
pub(crate) const chacha20_constants: [u32; 4] = | ||
[0x61707865u32, 0x3320646eu32, 0x79622d32u32, 0x6b206574u32]; | ||
|
||
#[inline] | ||
fn quarter_round(st: &mut [u32], a: u32, b: u32, c: u32, d: u32) { | ||
let sta: u32 = st[a as usize]; | ||
let stb: u32 = st[b as usize]; | ||
let std: u32 = st[d as usize]; | ||
let sta1: u32 = sta.wrapping_add(stb); | ||
let std1: u32 = std ^ sta1; | ||
let std2: u32 = std1.wrapping_shl(16u32) | std1.wrapping_shr(16u32); | ||
st[a as usize] = sta1; | ||
st[d as usize] = std2; | ||
let sta0: u32 = st[c as usize]; | ||
let stb0: u32 = st[d as usize]; | ||
let std0: u32 = st[b as usize]; | ||
let sta10: u32 = sta0.wrapping_add(stb0); | ||
let std10: u32 = std0 ^ sta10; | ||
let std20: u32 = std10.wrapping_shl(12u32) | std10.wrapping_shr(20u32); | ||
st[c as usize] = sta10; | ||
st[b as usize] = std20; | ||
let sta2: u32 = st[a as usize]; | ||
let stb1: u32 = st[b as usize]; | ||
let std3: u32 = st[d as usize]; | ||
let sta11: u32 = sta2.wrapping_add(stb1); | ||
let std11: u32 = std3 ^ sta11; | ||
let std21: u32 = std11.wrapping_shl(8u32) | std11.wrapping_shr(24u32); | ||
st[a as usize] = sta11; | ||
st[d as usize] = std21; | ||
let sta3: u32 = st[c as usize]; | ||
let stb2: u32 = st[d as usize]; | ||
let std4: u32 = st[b as usize]; | ||
let sta12: u32 = sta3.wrapping_add(stb2); | ||
let std12: u32 = std4 ^ sta12; | ||
let std22: u32 = std12.wrapping_shl(7u32) | std12.wrapping_shr(25u32); | ||
st[c as usize] = sta12; | ||
st[b as usize] = std22 | ||
} | ||
|
||
#[inline] | ||
fn double_round(st: &mut [u32]) { | ||
crate::hacl::chacha20::quarter_round(st, 0u32, 4u32, 8u32, 12u32); | ||
crate::hacl::chacha20::quarter_round(st, 1u32, 5u32, 9u32, 13u32); | ||
crate::hacl::chacha20::quarter_round(st, 2u32, 6u32, 10u32, 14u32); | ||
crate::hacl::chacha20::quarter_round(st, 3u32, 7u32, 11u32, 15u32); | ||
crate::hacl::chacha20::quarter_round(st, 0u32, 5u32, 10u32, 15u32); | ||
crate::hacl::chacha20::quarter_round(st, 1u32, 6u32, 11u32, 12u32); | ||
crate::hacl::chacha20::quarter_round(st, 2u32, 7u32, 8u32, 13u32); | ||
crate::hacl::chacha20::quarter_round(st, 3u32, 4u32, 9u32, 14u32) | ||
} | ||
|
||
#[inline] | ||
fn rounds(st: &mut [u32]) { | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st); | ||
crate::hacl::chacha20::double_round(st) | ||
} | ||
|
||
#[inline] | ||
fn chacha20_core(k: &mut [u32], ctx: &[u32], ctr: u32) { | ||
(k[0usize..16usize]).copy_from_slice(&ctx[0usize..16usize]); | ||
let ctr_u32: u32 = ctr; | ||
k[12usize] = (k[12usize]).wrapping_add(ctr_u32); | ||
crate::hacl::chacha20::rounds(k); | ||
krml::unroll_for!(16, "i", 0u32, 1u32, { | ||
let x: u32 = (k[i as usize]).wrapping_add(ctx[i as usize]); | ||
let os: (&mut [u32], &mut [u32]) = k.split_at_mut(0usize); | ||
os.1[i as usize] = x | ||
}); | ||
k[12usize] = (k[12usize]).wrapping_add(ctr_u32) | ||
} | ||
|
||
fn chacha20_init(ctx: &mut [u32], k: &[u8], n: &[u8], ctr: u32) { | ||
krml::unroll_for!(4, "i", 0u32, 1u32, { | ||
let x: u32 = (&crate::hacl::chacha20::chacha20_constants)[i as usize]; | ||
let os: &mut [u32] = &mut (&mut ctx[0usize..])[0usize..]; | ||
os[i as usize] = x | ||
}); | ||
let uu____0: (&mut [u32], &mut [u32]) = ctx.split_at_mut(4usize); | ||
krml::unroll_for!(8, "i", 0u32, 1u32, { | ||
let bj: (&[u8], &[u8]) = k.split_at(i.wrapping_mul(4u32) as usize); | ||
let u: u32 = lowstar::endianness::load32_le(bj.1); | ||
let r: u32 = u; | ||
let x: u32 = r; | ||
let os: (&mut [u32], &mut [u32]) = uu____0.1.split_at_mut(0usize); | ||
os.1[i as usize] = x | ||
}); | ||
ctx[12usize] = ctr; | ||
let uu____1: (&mut [u32], &mut [u32]) = ctx.split_at_mut(13usize); | ||
krml::unroll_for!(3, "i", 0u32, 1u32, { | ||
let bj: (&[u8], &[u8]) = n.split_at(i.wrapping_mul(4u32) as usize); | ||
let u: u32 = lowstar::endianness::load32_le(bj.1); | ||
let r: u32 = u; | ||
let x: u32 = r; | ||
let os: (&mut [u32], &mut [u32]) = uu____1.1.split_at_mut(0usize); | ||
os.1[i as usize] = x | ||
}) | ||
} | ||
|
||
fn chacha20_encrypt_block(ctx: &[u32], out: &mut [u8], incr: u32, text: &[u8]) { | ||
let mut k: [u32; 16] = [0u32; 16usize]; | ||
crate::hacl::chacha20::chacha20_core(&mut k, ctx, incr); | ||
let mut bl: [u32; 16] = [0u32; 16usize]; | ||
krml::unroll_for!(16, "i", 0u32, 1u32, { | ||
let bj: (&[u8], &[u8]) = text.split_at(i.wrapping_mul(4u32) as usize); | ||
let u: u32 = lowstar::endianness::load32_le(bj.1); | ||
let r: u32 = u; | ||
let x: u32 = r; | ||
let os: (&mut [u32], &mut [u32]) = bl.split_at_mut(0usize); | ||
os.1[i as usize] = x | ||
}); | ||
krml::unroll_for!(16, "i", 0u32, 1u32, { | ||
let x: u32 = (&bl)[i as usize] ^ (&k)[i as usize]; | ||
let os: (&mut [u32], &mut [u32]) = bl.split_at_mut(0usize); | ||
os.1[i as usize] = x | ||
}); | ||
krml::unroll_for!( | ||
16, | ||
"i", | ||
0u32, | ||
1u32, | ||
lowstar::endianness::store32_le( | ||
&mut out[i.wrapping_mul(4u32) as usize..], | ||
(&bl)[i as usize] | ||
) | ||
) | ||
} | ||
|
||
#[inline] | ||
fn chacha20_encrypt_last(ctx: &[u32], len: u32, out: &mut [u8], incr: u32, text: &[u8]) { | ||
let mut plain: [u8; 64] = [0u8; 64usize]; | ||
((&mut plain)[0usize..len as usize]).copy_from_slice(&text[0usize..len as usize]); | ||
let mut plain_copy: [u8; 64] = [0u8; 64usize]; | ||
((&mut plain_copy)[0usize..64usize]).copy_from_slice(&(&plain)[0usize..64usize]); | ||
crate::hacl::chacha20::chacha20_encrypt_block(ctx, &mut plain, incr, &plain_copy); | ||
(out[0usize..len as usize]).copy_from_slice(&(&(&plain)[0usize..])[0usize..len as usize]) | ||
} | ||
|
||
fn chacha20_update(ctx: &[u32], len: u32, out: &mut [u8], text: &[u8]) { | ||
let rem: u32 = len.wrapping_rem(64u32); | ||
let nb: u32 = len.wrapping_div(64u32); | ||
let rem1: u32 = len.wrapping_rem(64u32); | ||
for i in 0u32..nb { | ||
crate::hacl::chacha20::chacha20_encrypt_block( | ||
ctx, | ||
&mut out[i.wrapping_mul(64u32) as usize..], | ||
i, | ||
&text[i.wrapping_mul(64u32) as usize..], | ||
) | ||
} | ||
if rem1 > 0u32 { | ||
crate::hacl::chacha20::chacha20_encrypt_last( | ||
ctx, | ||
rem, | ||
&mut out[nb.wrapping_mul(64u32) as usize..], | ||
nb, | ||
&text[nb.wrapping_mul(64u32) as usize..], | ||
) | ||
} | ||
} | ||
|
||
pub fn chacha20_encrypt(len: u32, out: &mut [u8], text: &[u8], key: &[u8], n: &[u8], ctr: u32) { | ||
let mut ctx: [u32; 16] = [0u32; 16usize]; | ||
crate::hacl::chacha20::chacha20_init(&mut ctx, key, n, ctr); | ||
crate::hacl::chacha20::chacha20_update(&ctx, len, out, text) | ||
} | ||
|
||
pub fn chacha20_decrypt(len: u32, out: &mut [u8], cipher: &[u8], key: &[u8], n: &[u8], ctr: u32) { | ||
let mut ctx: [u32; 16] = [0u32; 16usize]; | ||
crate::hacl::chacha20::chacha20_init(&mut ctx, key, n, ctr); | ||
crate::hacl::chacha20::chacha20_update(&ctx, len, out, cipher) | ||
} |
Oops, something went wrong.