Legend:
Page
Library
Module
Module type
Parameter
Class
Class type
Source
Page
Library
Module
Module type
Parameter
Class
Class type
Source
spoke.ml
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
exception Invalid_algorithm exception Invalid_cipher exception Invalid_hash external bytes_get_uint8 : bytes -> int -> int = "%bytes_safe_get" external bytes_set_uint8 : bytes -> int -> int -> unit = "%bytes_safe_set" external bytes_set_uint16 : bytes -> int -> int -> unit = "%caml_bytes_set16" external bytes_set_uint32 : bytes -> int -> int32 -> unit = "%caml_bytes_set32" external bytes_set_uint64 : bytes -> int -> int64 -> unit = "%caml_bytes_set64" external string_get_uint16 : string -> int -> int = "%caml_string_get16" external string_get_uint64 : string -> int -> int64 = "%caml_string_get64" external swap16 : int -> int = "%bswap16" external swap64 : int64 -> int64 = "%bswap_int64" let bytes_set_uint16_be = if Sys.big_endian then bytes_set_uint16 else fun buf off v -> bytes_set_uint16 buf off (swap16 v) let string_get_uint16_be = if Sys.big_endian then string_get_uint16 else fun str off -> swap16 (string_get_uint16 str off) let bytes_set_uint64_be = if Sys.big_endian then bytes_set_uint64 else fun buf off v -> bytes_set_uint64 buf off (swap64 v) let string_get_uint64_be = if Sys.big_endian then string_get_uint64 else fun str off -> swap64 (string_get_uint64 str off) type public = string type secret = string type scalar = Scalar of string let scalar (Scalar v) = v type keys = { _M : scalar; _N : scalar; _L : scalar; h_K : string; h_L : string; } external spoke_ed25519_from_uniform : bytes -> dst_off:int -> string -> src_off:int -> unit = "spoke_ed25519_from_uniform" let ed25519_from_uniform src ~off = let buf = Bytes.create 32 in spoke_ed25519_from_uniform buf ~dst_off:0 src ~src_off:off; Scalar (Bytes.unsafe_to_string buf) external spoke_ed25519_scalarmult_base : bytes -> dst_off:int -> string -> src_off:int -> unit = "spoke_ed25519_scalarmult_base" let ed25519_scalarmult_base hash ~off = let buf = Bytes.create 32 in spoke_ed25519_scalarmult_base buf ~dst_off:0 hash ~src_off:off; Scalar (Bytes.unsafe_to_string buf) let random_buffer ?g buf = let g = match g with Some g -> g | None -> Random.State.make_self_init () in let len = Bytes.length buf in let len0 = len land 3 in let len1 = len asr 2 in for i = 0 to len1 - 1 do let i = i * 4 in bytes_set_uint32 buf i (Random.State.int32 g Int32.max_int) done; for i = 0 to len0 - 1 do let i = (len1 * 4) + i in bytes_set_uint8 buf i (Random.State.bits g land 0xff) done let random_bytes ?g len = let buf = Bytes.create len in random_buffer ?g buf; Bytes.unsafe_to_string buf let version = 1 let version_string = let buf = Bytes.create 2 in bytes_set_uint16 buf 0 1; Bytes.unsafe_to_string buf type _ algorithm = Pbkdf2 : int algorithm type a = Algorithm : 'a algorithm -> a type _ aead = | GCM : Mirage_crypto.Cipher_block.AES.GCM.key aead | CCM16 : Mirage_crypto.Cipher_block.AES.CCM16.key aead | ChaCha20_Poly1305 : Mirage_crypto.Chacha20.key aead type cipher = AEAD : 'k aead -> cipher type hash = Hash : 'k Digestif.hash -> hash let int_of_algorithm : type a. a algorithm -> int = function Pbkdf2 -> 2 let algorithm_of_int : int -> a = function | 2 -> Algorithm Pbkdf2 | _ -> raise Invalid_algorithm let int_of_hash : type k. k Digestif.hash -> int = function | Digestif.SHA256 -> 4 | _ -> assert false (* TODO *) let hash_of_int : int -> hash = function | 4 -> Hash Digestif.SHA256 | _ -> raise Invalid_hash let int_of_cipher = function | AEAD GCM -> 0 | AEAD CCM16 -> 1 | AEAD ChaCha20_Poly1305 -> 2 let cipher_of_int = function | 0 -> AEAD GCM | 1 -> AEAD CCM16 | 2 -> AEAD ChaCha20_Poly1305 | _ -> raise Invalid_cipher let keys : type a. salt:string -> hash:hash -> string -> algorithm:a algorithm -> a -> keys * int64 = fun ~salt ~hash password ~algorithm arguments -> let (Hash hash) = hash in let mnkl = match algorithm with | Pbkdf2 -> let count = arguments in Pbkdf2.generate hash ~password ~salt ~count (Int32.of_int (32 * 4)) in let h_K = String.sub mnkl 64 32 in let h_L = String.sub mnkl 96 32 in let _M = ed25519_from_uniform mnkl ~off:0 in let _N = ed25519_from_uniform mnkl ~off:32 in let _L = ed25519_scalarmult_base mnkl ~off:96 in let arguments = match algorithm with Pbkdf2 -> Int64.of_int arguments in ({ _M; _N; _L; h_K; h_L }, arguments) let uint16_be_to_string v = let buf = Bytes.create 2 in bytes_set_uint16_be buf 0 v; Bytes.unsafe_to_string buf let pbkdf2 = uint16_be_to_string (int_of_algorithm Pbkdf2) let uint64_be_to_string v = let buf = Bytes.create 8 in bytes_set_uint64_be buf 0 v; Bytes.unsafe_to_string buf module Format = struct open Encore open Syntax let uint16be = Bij.v ~fwd:(fun str -> string_get_uint16_be str 0) ~bwd:uint16_be_to_string let uint64be = Bij.v ~fwd:(fun str -> string_get_uint64_be str 0) ~bwd:uint64_be_to_string let version = uint16be <$> fixed 2 let algorithm_and_arguments = choice [ const pbkdf2 <*> (uint64be <$> fixed 8) ] let safe f x = try f x with _ -> raise Bij.Bijection let cipher = let cipher = Bij.v ~fwd:(safe cipher_of_int) ~bwd:int_of_cipher in Bij.compose uint16be cipher <$> fixed 2 let ciphers = cipher <*> cipher let hash = let hash = Bij.v ~fwd:(safe hash_of_int) ~bwd:(fun (Hash hash) -> int_of_hash hash) in Bij.compose uint16be hash <$> fixed 2 let salt = fixed 16 let scalar = let scalar = Bij.v ~fwd:(fun str -> Scalar str) ~bwd:(fun (Scalar str) -> str) in scalar <$> fixed 32 let secret = Bij.obj5 <$> (version <*> algorithm_and_arguments <*> ciphers <*> hash <*> salt) <*> (Bij.obj4 <$> (scalar <*> scalar <*> fixed 32 <*> scalar)) let public = Bij.obj5 <$> (version <*> algorithm_and_arguments <*> ciphers <*> hash <*> salt) let secret_to_string v = Encore.Lavoisier.emit_string v (Encore.to_lavoisier secret) let secret_of_string str = Angstrom.parse_string ~consume:All (Encore.to_angstrom secret) str let public_to_string v = Encore.Lavoisier.emit_string v (Encore.to_lavoisier public) let public_of_string str = Angstrom.parse_string ~consume:All (Encore.to_angstrom public) str end let generate : type a. ?hash:hash -> ?ciphers:cipher * cipher -> ?g:Random.State.t -> password:string -> algorithm:a algorithm -> a -> string * string = fun ?(hash = Hash Digestif.SHA256) ?(ciphers = (AEAD GCM, AEAD ChaCha20_Poly1305)) ?g ~password ~algorithm arguments -> let salt = random_bytes ?g 16 in let keys, arguments = keys ~salt ~hash password ~algorithm arguments in let (Hash hash) = hash in let secret = Format.secret_to_string ( (version, (pbkdf2, arguments), ciphers, Hash hash, salt), (keys._M, keys._N, keys.h_K, keys._L) ) in let public = Format.public_to_string (version, (pbkdf2, arguments), ciphers, Hash hash, salt) in (secret, public) let public_to_string str = str let public_of_string str = Ok str let public_of_secret secret = String.sub secret 0 34 let zero = String.make 32 '\000' let random_scalar ?g () = let buf = Bytes.create 32 in let rec go () = random_buffer ?g buf; Bytes.set buf 0 (Char.chr (bytes_get_uint8 buf 0 land 248)); Bytes.set buf 31 (Char.chr (bytes_get_uint8 buf 31 land 127)); if Eqaf.compare_be (Bytes.unsafe_to_string buf) zero = 0 then go () in go (); Bytes.unsafe_to_string buf external spoke_ed25519_scalarmult_base_noclamp : bytes -> dst_off:int -> string -> src_off:int -> unit = "spoke_ed25519_scalarmult_base_noclamp" let ed25519_scalarmult_base_noclamp hash ~off = let buf = Bytes.create 32 in spoke_ed25519_scalarmult_base_noclamp buf ~src_off:0 hash ~dst_off:off; Scalar (Bytes.unsafe_to_string buf) external spoke_ed25519_add : bytes -> dst_off:int -> string -> string -> unit = "spoke_ed25519_add" let ed25519_add (Scalar f) (Scalar g) = let buf = Bytes.create 32 in spoke_ed25519_add buf ~dst_off:0 f g; Scalar (Bytes.unsafe_to_string buf) type client = { h_K : string; h_L : string; _N : scalar; x : string; _X : scalar; ciphers : cipher * cipher; } let ciphers_of_client { ciphers; _ } = ciphers let hello ?g ~public password = match Format.public_of_string public with | Error _ -> Error `Invalid_public_packet | Ok (_version, (algorithm, arguments), ciphers, Hash hash, salt) -> let keys, _arguments = match (algorithm_of_int (string_get_uint16_be algorithm 0), arguments) with | Algorithm Pbkdf2, count -> let count = Int64.to_int count in let algorithm = Pbkdf2 in keys ~salt ~hash:(Hash hash) password ~algorithm count in let x = random_scalar ?g () in let gx = ed25519_scalarmult_base_noclamp x ~off:0 in let _X = ed25519_add gx keys._M in Ok ( { h_K = keys.h_K; h_L = keys.h_L; _N = keys._N; x; _X; ciphers }, scalar _X ) let ciphers_of_public public = match Format.public_of_string public with | Error _ -> Error `Invalid_public_packet | Ok (_, _, ciphers, _, _) -> Ok ciphers let ciphers_of_secret secret = match Format.secret_of_string secret with | Error _ -> invalid_arg "Invalid secret value" | Ok ((_, _, ciphers, _, _), _) -> ciphers type error = [ `Point_is_not_on_prime_order_subgroup | `Invalid_client_validator | `Invalid_server_validator | `Invalid_public_packet | `Invalid_secret_packet ] let pp_error ppf = function | `Point_is_not_on_prime_order_subgroup -> Fmt.pf ppf "Point is not on prime-order subgroup" | `Invalid_client_validator -> Fmt.pf ppf "Invalid client validator" | `Invalid_server_validator -> Fmt.pf ppf "Invalid server validator" | `Invalid_public_packet -> Fmt.pf ppf "Invalid public packet" | `Invalid_secret_packet -> Fmt.pf ppf "Invalid secret packet" external spoke_ed25519_scalarmult_noclamp : bytes -> string -> src_off:int -> point:string -> bool = "spoke_ed25519_scalarmult_noclamp" let ed25519_scalarmult_noclamp hash ~off ~point:(Scalar point) = let buf = Bytes.create 32 in let res = spoke_ed25519_scalarmult_noclamp buf hash ~src_off:off ~point in if res then Ok (Scalar (Bytes.unsafe_to_string buf)) else Error `Point_is_not_on_prime_order_subgroup external spoke_ed25519_scalarmult : bytes -> string -> src_off:int -> point:string -> bool = "spoke_ed25519_scalarmult" let ed25519_scalarmult hash ~off ~point:(Scalar point) = let buf = Bytes.create 32 in let res = spoke_ed25519_scalarmult buf hash ~src_off:off ~point in if res then Ok (Scalar (Bytes.unsafe_to_string buf)) else Error `Point_is_not_on_prime_order_subgroup let subkey_from_key ~identity context main_key = if String.length context > 8 then Fmt.invalid_arg "Invalid context for key derivation"; let ctx = let buf = Bytes.make 16 '\000' in Bytes.blit_string context 0 buf 0 (String.length context); Bytes.unsafe_to_string buf in let salt = let buf = Bytes.make 16 '\000' in bytes_set_uint64 buf 0 identity; Bytes.unsafe_to_string buf in let module Hash = Digestif.BLAKE2B in Hash.Keyed.mac_string ~key:main_key (ctx ^ salt) |> Hash.to_raw_string (* XXX(dinosaure): [salt] and [ctx] can be a part of the BLAKE2B initialization. * However, [digestif] does not provide such API. *) let context = "SPOKE" let ~identity:(client, server) (Scalar _X) (Scalar _Y) (Scalar _Z) h_K (Scalar _V) = let module Hash = Digestif.BLAKE2B in let ctx = Hash.empty in let ctx = Hash.feed_string ctx version_string in let ctx = Hash.feed_string ctx client in let ctx = Hash.feed_string ctx server in let ctx = Hash.feed_string ctx _X in let ctx = Hash.feed_string ctx _Y in let ctx = Hash.feed_string ctx _Z in let ctx = Hash.feed_string ctx h_K in let ctx = Hash.feed_string ctx _V in let main_key = Hash.to_raw_string (Hash.get ctx) in let client_sk = subkey_from_key ~identity:0L context main_key in let server_sk = subkey_from_key ~identity:1L context main_key in let client_validator = subkey_from_key ~identity:2L context main_key in let server_validator = subkey_from_key ~identity:3L context main_key in ((client_sk, server_sk), (client_validator, server_validator)) external spoke_ed25519_sub : bytes -> dst_off:int -> string -> string -> unit = "spoke_ed25519_sub" let ed25519_sub (Scalar f) (Scalar g) = let buf = Bytes.create 32 in spoke_ed25519_sub buf ~dst_off:0 f g; Scalar (Bytes.unsafe_to_string buf) let ( let* ) = Result.bind type server = { validator : string; shared_keys : string * string; ciphers : cipher * cipher; } let server_compute ?g ~secret ~identity _X = match Format.secret_of_string secret with | Error _ -> Error `Invalid_secret_packet | Ok ( (_version, (_algorithm, _arguments), ciphers, _hash, _salt), (_M, _N, h_K, _L) ) -> let y = random_scalar ?g () in let gy = ed25519_scalarmult_base_noclamp y ~off:0 in let _Y = ed25519_add gy _N in let _X = Scalar _X in let gx = ed25519_sub _X _M in let* _Z = ed25519_scalarmult_noclamp y ~off:0 ~point:gx in let* _V = ed25519_scalarmult_noclamp y ~off:0 ~point:_L in let , validators = shared_keys_and_validators ~identity _X _Y _Z h_K _V in Ok ( { shared_keys; validator = snd validators; ciphers }, (scalar _Y, fst validators) ) let client_compute ~client ~identity _Y client_validator = let _Y = Scalar _Y in let gy = ed25519_sub _Y client._N in let* _Z = ed25519_scalarmult_noclamp client.x ~off:0 ~point:gy in let* _V = ed25519_scalarmult client.h_L ~off:0 ~point:gy in let , validators = shared_keys_and_validators ~identity client._X _Y _Z client.h_K _V in if Eqaf.compare_le (fst validators) client_validator = 0 then Ok (shared_keys, snd validators) else Error `Invalid_client_validator let server_finalize ~server server_validator = if Eqaf.compare_le server.validator server_validator = 0 then Ok server.shared_keys else Error `Invalid_server_validator