123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236 |
- #define hydro_secretbox_IVBYTES 20
- #define hydro_secretbox_SIVBYTES 20
- #define hydro_secretbox_MACBYTES 16
- void
- hydro_secretbox_keygen(uint8_t key[hydro_secretbox_KEYBYTES])
- {
- hydro_random_buf(key, hydro_secretbox_KEYBYTES);
- }
- static void
- hydro_secretbox_xor_enc(uint8_t buf[gimli_BLOCKBYTES], uint8_t *out, const uint8_t *in,
- size_t inlen)
- {
- size_t i;
- size_t leftover;
- for (i = 0; i < inlen / gimli_RATE; i++) {
- mem_xor2(&out[i * gimli_RATE], &in[i * gimli_RATE], buf, gimli_RATE);
- memcpy(buf, &out[i * gimli_RATE], gimli_RATE);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- }
- leftover = inlen % gimli_RATE;
- if (leftover != 0) {
- mem_xor2(&out[i * gimli_RATE], &in[i * gimli_RATE], buf, leftover);
- mem_cpy(buf, &out[i * gimli_RATE], leftover);
- }
- gimli_pad_u8(buf, leftover, gimli_DOMAIN_AEAD);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- }
- static void
- hydro_secretbox_xor_dec(uint8_t buf[gimli_BLOCKBYTES], uint8_t *out, const uint8_t *in,
- size_t inlen)
- {
- size_t i;
- size_t leftover;
- for (i = 0; i < inlen / gimli_RATE; i++) {
- mem_xor2(&out[i * gimli_RATE], &in[i * gimli_RATE], buf, gimli_RATE);
- memcpy(buf, &in[i * gimli_RATE], gimli_RATE);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- }
- leftover = inlen % gimli_RATE;
- if (leftover != 0) {
- mem_xor2(&out[i * gimli_RATE], &in[i * gimli_RATE], buf, leftover);
- mem_cpy(buf, &in[i * gimli_RATE], leftover);
- }
- gimli_pad_u8(buf, leftover, gimli_DOMAIN_AEAD);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- }
- static void
- hydro_secretbox_setup(uint8_t buf[gimli_BLOCKBYTES], uint64_t msg_id,
- const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES],
- const uint8_t iv[hydro_secretbox_IVBYTES], uint8_t key_tag)
- {
- static const uint8_t prefix[] = { 6, 's', 'b', 'x', '2', '5', '6', 8 };
- uint8_t msg_id_le[8];
- mem_zero(buf, gimli_BLOCKBYTES);
- COMPILER_ASSERT(hydro_secretbox_CONTEXTBYTES == 8);
- COMPILER_ASSERT(sizeof prefix + hydro_secretbox_CONTEXTBYTES <= gimli_RATE);
- memcpy(buf, prefix, sizeof prefix);
- memcpy(buf + sizeof prefix, ctx, hydro_secretbox_CONTEXTBYTES);
- COMPILER_ASSERT(sizeof prefix + hydro_secretbox_CONTEXTBYTES == gimli_RATE);
- gimli_core_u8(buf, gimli_TAG_HEADER);
- COMPILER_ASSERT(hydro_secretbox_KEYBYTES == 2 * gimli_RATE);
- mem_xor(buf, key, gimli_RATE);
- gimli_core_u8(buf, key_tag);
- mem_xor(buf, key + gimli_RATE, gimli_RATE);
- gimli_core_u8(buf, key_tag);
- COMPILER_ASSERT(hydro_secretbox_IVBYTES < gimli_RATE * 2);
- buf[0] ^= hydro_secretbox_IVBYTES;
- mem_xor(&buf[1], iv, gimli_RATE - 1);
- gimli_core_u8(buf, gimli_TAG_HEADER);
- mem_xor(buf, iv + gimli_RATE - 1, hydro_secretbox_IVBYTES - (gimli_RATE - 1));
- STORE64_LE(msg_id_le, msg_id);
- COMPILER_ASSERT(hydro_secretbox_IVBYTES - gimli_RATE + 8 <= gimli_RATE);
- mem_xor(buf + hydro_secretbox_IVBYTES - gimli_RATE, msg_id_le, 8);
- gimli_core_u8(buf, gimli_TAG_HEADER);
- }
- static void
- hydro_secretbox_finalize(uint8_t *buf, const uint8_t key[hydro_secretbox_KEYBYTES], uint8_t tag)
- {
- COMPILER_ASSERT(hydro_secretbox_KEYBYTES == gimli_CAPACITY);
- mem_xor(buf + gimli_RATE, key, hydro_secretbox_KEYBYTES);
- gimli_core_u8(buf, tag);
- mem_xor(buf + gimli_RATE, key, hydro_secretbox_KEYBYTES);
- gimli_core_u8(buf, tag);
- }
- static int
- hydro_secretbox_encrypt_iv(uint8_t *c, const void *m_, size_t mlen, uint64_t msg_id,
- const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES],
- const uint8_t iv[hydro_secretbox_IVBYTES])
- {
- _hydro_attr_aligned_(16) uint32_t state[gimli_BLOCKBYTES / 4];
- uint8_t * buf = (uint8_t *) (void *) state;
- const uint8_t * m = (const uint8_t *) m_;
- uint8_t * siv = &c[0];
- uint8_t * mac = &c[hydro_secretbox_SIVBYTES];
- uint8_t * ct = &c[hydro_secretbox_SIVBYTES + hydro_secretbox_MACBYTES];
- size_t i;
- size_t leftover;
- if (c == m) {
- memmove(c + hydro_secretbox_HEADERBYTES, m, mlen);
- m = c + hydro_secretbox_HEADERBYTES;
- }
- /* first pass: compute the SIV */
- hydro_secretbox_setup(buf, msg_id, ctx, key, iv, gimli_TAG_KEY0);
- for (i = 0; i < mlen / gimli_RATE; i++) {
- mem_xor(buf, &m[i * gimli_RATE], gimli_RATE);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- }
- leftover = mlen % gimli_RATE;
- if (leftover != 0) {
- mem_xor(buf, &m[i * gimli_RATE], leftover);
- }
- gimli_pad_u8(buf, leftover, gimli_DOMAIN_XOF);
- gimli_core_u8(buf, gimli_TAG_PAYLOAD);
- hydro_secretbox_finalize(buf, key, gimli_TAG_FINAL0);
- COMPILER_ASSERT(hydro_secretbox_SIVBYTES <= gimli_CAPACITY);
- memcpy(siv, buf + gimli_RATE, hydro_secretbox_SIVBYTES);
- /* second pass: encrypt the message, mix the key, squeeze an extra block for
- * the MAC */
- COMPILER_ASSERT(hydro_secretbox_SIVBYTES == hydro_secretbox_IVBYTES);
- hydro_secretbox_setup(buf, msg_id, ctx, key, siv, gimli_TAG_KEY);
- hydro_secretbox_xor_enc(buf, ct, m, mlen);
- hydro_secretbox_finalize(buf, key, gimli_TAG_FINAL);
- COMPILER_ASSERT(hydro_secretbox_MACBYTES <= gimli_CAPACITY);
- memcpy(mac, buf + gimli_RATE, hydro_secretbox_MACBYTES);
- return 0;
- }
- void
- hydro_secretbox_probe_create(uint8_t probe[hydro_secretbox_PROBEBYTES], const uint8_t *c,
- size_t c_len, const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES])
- {
- const uint8_t *mac;
- if (c_len < hydro_secretbox_HEADERBYTES) {
- abort();
- }
- mac = &c[hydro_secretbox_SIVBYTES];
- COMPILER_ASSERT(hydro_secretbox_CONTEXTBYTES >= hydro_hash_CONTEXTBYTES);
- COMPILER_ASSERT(hydro_secretbox_KEYBYTES >= hydro_hash_KEYBYTES);
- hydro_hash_hash(probe, hydro_secretbox_PROBEBYTES, mac, hydro_secretbox_MACBYTES, ctx, key);
- }
- int
- hydro_secretbox_probe_verify(const uint8_t probe[hydro_secretbox_PROBEBYTES], const uint8_t *c,
- size_t c_len, const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES])
- {
- uint8_t computed_probe[hydro_secretbox_PROBEBYTES];
- const uint8_t *mac;
- if (c_len < hydro_secretbox_HEADERBYTES) {
- return -1;
- }
- mac = &c[hydro_secretbox_SIVBYTES];
- hydro_hash_hash(computed_probe, hydro_secretbox_PROBEBYTES, mac, hydro_secretbox_MACBYTES, ctx,
- key);
- if (hydro_equal(computed_probe, probe, hydro_secretbox_PROBEBYTES) == 1) {
- return 0;
- }
- hydro_memzero(computed_probe, hydro_secretbox_PROBEBYTES);
- return -1;
- }
- int
- hydro_secretbox_encrypt(uint8_t *c, const void *m_, size_t mlen, uint64_t msg_id,
- const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES])
- {
- uint8_t iv[hydro_secretbox_IVBYTES];
- hydro_random_buf(iv, sizeof iv);
- return hydro_secretbox_encrypt_iv(c, m_, mlen, msg_id, ctx, key, iv);
- }
- int
- hydro_secretbox_decrypt(void *m_, const uint8_t *c, size_t clen, uint64_t msg_id,
- const char ctx[hydro_secretbox_CONTEXTBYTES],
- const uint8_t key[hydro_secretbox_KEYBYTES])
- {
- _hydro_attr_aligned_(16) uint32_t state[gimli_BLOCKBYTES / 4];
- uint32_t pub_mac[hydro_secretbox_MACBYTES / 4];
- uint8_t * buf = (uint8_t *) (void *) state;
- const uint8_t * siv;
- const uint8_t * mac;
- const uint8_t * ct;
- uint8_t * m = (uint8_t *) m_;
- size_t mlen;
- uint32_t cv;
- if (clen < hydro_secretbox_HEADERBYTES) {
- return -1;
- }
- siv = &c[0];
- mac = &c[hydro_secretbox_SIVBYTES];
- ct = &c[hydro_secretbox_SIVBYTES + hydro_secretbox_MACBYTES];
- mlen = clen - hydro_secretbox_HEADERBYTES;
- memcpy(pub_mac, mac, sizeof pub_mac);
- COMPILER_ASSERT(hydro_secretbox_SIVBYTES == hydro_secretbox_IVBYTES);
- hydro_secretbox_setup(buf, msg_id, ctx, key, siv, gimli_TAG_KEY);
- hydro_secretbox_xor_dec(buf, m, ct, mlen);
- hydro_secretbox_finalize(buf, key, gimli_TAG_FINAL);
- COMPILER_ASSERT(hydro_secretbox_MACBYTES <= gimli_CAPACITY);
- COMPILER_ASSERT(gimli_RATE % 4 == 0);
- cv = hydro_mem_ct_cmp_u32(state + gimli_RATE / 4, pub_mac, hydro_secretbox_MACBYTES / 4);
- hydro_mem_ct_zero_u32(state, gimli_BLOCKBYTES / 4);
- if (cv != 0) {
- mem_zero(m, mlen);
- return -1;
- }
- return 0;
- }
|