file_name
stringlengths
5
52
name
stringlengths
4
95
original_source_type
stringlengths
0
23k
source_type
stringlengths
9
23k
source_definition
stringlengths
9
57.9k
source
dict
source_range
dict
file_context
stringlengths
0
721k
dependencies
dict
opens_and_abbrevs
listlengths
2
94
vconfig
dict
interleaved
bool
1 class
verbose_type
stringlengths
1
7.42k
effect
stringclasses
118 values
effect_flags
sequencelengths
0
2
mutual_with
sequencelengths
0
11
ideal_premises
sequencelengths
0
236
proof_features
sequencelengths
0
1
is_simple_lemma
bool
2 classes
is_div
bool
2 classes
is_proof
bool
2 classes
is_simply_typed
bool
2 classes
is_type
bool
2 classes
partial_definition
stringlengths
5
3.99k
completed_definiton
stringlengths
1
1.63M
isa_cross_project_example
bool
1 class
Spec.Agile.HPKE.fsti
Spec.Agile.HPKE.maybe_lte
val maybe_lte : n1: Prims.int -> n2: FStar.Pervasives.Native.option Prims.int -> Prims.bool
let maybe_lte (n1: int) (n2: option int) = match n2 with | None -> true | Some n2 -> n1 <= n2
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 23, "end_line": 346, "start_col": 0, "start_line": 343 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs) inline_for_extraction let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1 // Need the additional byte for representation inline_for_extraction let size_dh_serialized (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 inline_for_extraction let size_kem_kdf (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kem_key (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kdf (cs:ciphersuite): size_nat = Hash.hash_length (hash_of_cs cs) let max_seq (cs:ciphersuite): nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> pow2 (8*(size_aead_nonce cs)) - 1 inline_for_extraction let size_suite_id_kem: size_nat = size_label_KEM + 2 inline_for_extraction let size_suite_id_hpke: size_nat = size_label_HPKE + 6 inline_for_extraction let size_mode_identifier: size_nat = 1 let size_ks_ctx (cs:ciphersuite): size_nat = size_mode_identifier + 2*(size_kdf cs) let labeled_extract_ikm_length_pred (a:hash_algorithm) (ikm_length:nat) = HKDF.extract_ikm_length_pred a (size_label_version + ikm_length) let labeled_expand_info_length_pred (a:hash_algorithm) (info_length:nat) = HKDF.expand_info_length_pred a (2 + size_label_version + info_length) let pow2_61_1 : _:unit{pow2 61 - 1 == 2305843009213693951} = assert_norm(pow2 61 - 1 == 2305843009213693951) let pow2_125_1 : _:unit{pow2 125 - 1 == 42535295865117307932921825928971026431} = assert_norm(pow2 125 - 1 == 42535295865117307932921825928971026431) let labeled_extract_max_length_ikm (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v(Hash.max_input_length a) - size_label_version - size_suite_id - size_local_label - Spec.Hash.Definitions.block_length a) let labeled_expand_max_length_info (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v (Hash.max_input_length a) - Spec.Hash.Definitions.hash_length a - 2 - size_label_version - size_suite_id - size_local_label - 1 - Spec.Hash.Definitions.block_length a) let max_length_psk (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_secret let max_length_psk_id (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_psk_id_hash let max_length_info (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_info_hash let max_length_exp_ctx (a:hash_algorithm) = labeled_expand_max_length_info a size_suite_id_hpke size_label_sec let max_length_dkp_ikm (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_kem size_label_dkp_prk /// Types
{ "checked_file": "/", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
n1: Prims.int -> n2: FStar.Pervasives.Native.option Prims.int -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Prims.int", "FStar.Pervasives.Native.option", "Prims.op_LessThanOrEqual", "Prims.bool" ]
[]
false
false
false
true
false
let maybe_lte (n1: int) (n2: option int) =
match n2 with | None -> true | Some n2 -> n1 <= n2
false
Spec.Agile.HPKE.fsti
Spec.Agile.HPKE.exp_len
val exp_len : cs: Spec.Agile.HPKE.ciphersuite -> Type0
let exp_len (cs:ciphersuite) = l:size_nat{HKDF.expand_output_length_pred (hash_of_cs cs) l}
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 91, "end_line": 381, "start_col": 0, "start_line": 381 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs) inline_for_extraction let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1 // Need the additional byte for representation inline_for_extraction let size_dh_serialized (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 inline_for_extraction let size_kem_kdf (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kem_key (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kdf (cs:ciphersuite): size_nat = Hash.hash_length (hash_of_cs cs) let max_seq (cs:ciphersuite): nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> pow2 (8*(size_aead_nonce cs)) - 1 inline_for_extraction let size_suite_id_kem: size_nat = size_label_KEM + 2 inline_for_extraction let size_suite_id_hpke: size_nat = size_label_HPKE + 6 inline_for_extraction let size_mode_identifier: size_nat = 1 let size_ks_ctx (cs:ciphersuite): size_nat = size_mode_identifier + 2*(size_kdf cs) let labeled_extract_ikm_length_pred (a:hash_algorithm) (ikm_length:nat) = HKDF.extract_ikm_length_pred a (size_label_version + ikm_length) let labeled_expand_info_length_pred (a:hash_algorithm) (info_length:nat) = HKDF.expand_info_length_pred a (2 + size_label_version + info_length) let pow2_61_1 : _:unit{pow2 61 - 1 == 2305843009213693951} = assert_norm(pow2 61 - 1 == 2305843009213693951) let pow2_125_1 : _:unit{pow2 125 - 1 == 42535295865117307932921825928971026431} = assert_norm(pow2 125 - 1 == 42535295865117307932921825928971026431) let labeled_extract_max_length_ikm (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v(Hash.max_input_length a) - size_label_version - size_suite_id - size_local_label - Spec.Hash.Definitions.block_length a) let labeled_expand_max_length_info (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v (Hash.max_input_length a) - Spec.Hash.Definitions.hash_length a - 2 - size_label_version - size_suite_id - size_local_label - 1 - Spec.Hash.Definitions.block_length a) let max_length_psk (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_secret let max_length_psk_id (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_psk_id_hash let max_length_info (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_hpke size_label_info_hash let max_length_exp_ctx (a:hash_algorithm) = labeled_expand_max_length_info a size_suite_id_hpke size_label_sec let max_length_dkp_ikm (a:hash_algorithm) = labeled_extract_max_length_ikm a size_suite_id_kem size_label_dkp_prk /// Types let maybe_lte (n1: int) (n2: option int) = match n2 with | None -> true | Some n2 -> n1 <= n2 type key_dh_public_s (cs:ciphersuite) = lbytes (size_dh_public cs) type key_dh_secret_s (cs:ciphersuite) = lbytes (size_dh_key cs) type key_kem_s (cs:ciphersuite) = lbytes (size_kem_key cs) type key_aead_s (cs:ciphersuite) = lbytes (size_aead_key cs) type nonce_aead_s (cs:ciphersuite) = lbytes (size_aead_nonce cs) type seq_aead_s (cs:ciphersuite) = n:nat{n <= max_seq cs} type exporter_secret_s (cs:ciphersuite) = lbytes (size_kdf cs) type psk_s (cs:ciphersuite) = b:bytes{Seq.length b >= 32 /\ Seq.length b `maybe_lte` (max_length_psk (hash_of_cs cs))} type psk_id_s (cs:ciphersuite) = b:bytes{Seq.length b >= 1 /\ Seq.length b `maybe_lte` (max_length_psk_id (hash_of_cs cs))} type info_s (cs:ciphersuite) = b:bytes{Seq.length b `maybe_lte` (max_length_info (hash_of_cs cs))} type exp_ctx_s (cs:ciphersuite) = b:bytes{Seq.length b `maybe_lte` (max_length_exp_ctx (hash_of_cs cs))} type dkp_ikm_s (cs:ciphersuite) = b:bytes{Seq.length b `maybe_lte` (max_length_dkp_ikm (kem_hash_of_cs cs)) /\ Seq.length b >= size_dh_key cs} // deserialize returns a serialized point, this is due to HPKE // using a different format (the extra byte) val deserialize_public_key: cs:ciphersuite -> pk:key_dh_public_s cs -> Tot (DH.serialized_point (kem_dh_of_cs cs)) val serialize_public_key: cs:ciphersuite -> pk:DH.serialized_point (kem_dh_of_cs cs) -> Tot (key_dh_public_s cs) // never returns None for Curve25519. val derive_key_pair: cs:ciphersuite -> ikm:dkp_ikm_s cs -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) val encryption_context (cs:ciphersuite) : Type0
{ "checked_file": "/", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> Type0
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Lib.IntTypes.size_nat", "Prims.b2t", "Spec.Agile.HKDF.expand_output_length_pred", "Spec.Agile.HPKE.hash_of_cs" ]
[]
false
false
false
true
true
let exp_len (cs: ciphersuite) =
l: size_nat{HKDF.expand_output_length_pred (hash_of_cs cs) l}
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.params_nbar
val params_nbar : Prims.int
let params_nbar = 8
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 19, "end_line": 58, "start_col": 0, "start_line": 58 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Prims.int
Prims.Tot
[ "total" ]
[]
[]
[]
false
false
false
true
false
let params_nbar =
8
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.bytes_seed_a
val bytes_seed_a : Prims.int
let bytes_seed_a = 16
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 21, "end_line": 59, "start_col": 0, "start_line": 59 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Prims.int
Prims.Tot
[ "total" ]
[]
[]
[]
false
false
false
true
false
let bytes_seed_a =
16
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.bytes_pkhash
val bytes_pkhash (a: frodo_alg) : size_pos
val bytes_pkhash (a: frodo_alg) : size_pos
let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 62, "start_col": 0, "start_line": 61 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Spec.Frodo.Params.crypto_bytes", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let bytes_pkhash (a: frodo_alg) : size_pos =
crypto_bytes a
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.params_logq
val params_logq (a: frodo_alg) : x: size_pos{x <= 16}
val params_logq (a: frodo_alg) : x: size_pos{x <= 16}
let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 30, "end_line": 39, "start_col": 0, "start_line": 36 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x <= 16}
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
false
false
false
false
false
let params_logq (a: frodo_alg) : x: size_pos{x <= 16} =
match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.params_n
val params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344}
val params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344}
let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 21, "end_line": 32, "start_col": 0, "start_line": 27 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x % 8 = 0 /\ x <= 1344}
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.l_and", "Prims.b2t", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Prims.op_LessThanOrEqual" ]
[]
false
false
false
false
false
let params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344} =
match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.params_extracted_bits
val params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8}
val params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8}
let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 18, "end_line": 47, "start_col": 0, "start_line": 43 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x < Spec.Frodo.Params.params_logq a /\ x <= 8}
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.l_and", "Prims.b2t", "Prims.op_LessThan", "Spec.Frodo.Params.params_logq", "Prims.op_LessThanOrEqual" ]
[]
false
false
false
false
false
let params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8} =
match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.crypto_bytes
val crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32}
val crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32}
let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 19, "end_line": 55, "start_col": 0, "start_line": 51 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x <= 32}
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
false
false
false
false
false
let crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32} =
match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.frodo_shake_st
val frodo_shake_st : Type0
let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 25, "end_line": 114, "start_col": 0, "start_line": 110 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Type0
Prims.Tot
[ "total" ]
[]
[ "Prims.nat", "Lib.ByteSequence.bytes", "Prims.eq2", "Lib.Sequence.length", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes" ]
[]
false
false
false
true
true
let frodo_shake_st =
inputByteLen: nat -> input: bytes{length input == inputByteLen} -> outputByteLen: size_nat -> lbytes outputByteLen
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.secretmatrixbytes_len
val secretmatrixbytes_len (a: frodo_alg) : size_pos
val secretmatrixbytes_len (a: frodo_alg) : size_pos
let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 30, "end_line": 71, "start_col": 0, "start_line": 70 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8)
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_n", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let secretmatrixbytes_len (a: frodo_alg) : size_pos =
(2 * params_n a) * params_nbar
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.publicmatrixbytes_len
val publicmatrixbytes_len (a: frodo_alg) : size_pos
val publicmatrixbytes_len (a: frodo_alg) : size_pos
let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 48, "end_line": 68, "start_col": 0, "start_line": 67 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_n", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let publicmatrixbytes_len (a: frodo_alg) : size_pos =
params_logq a * (params_n a * params_nbar / 8)
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.crypto_publickeybytes
val crypto_publickeybytes (a: frodo_alg) : size_pos
val crypto_publickeybytes (a: frodo_alg) : size_pos
let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 40, "end_line": 80, "start_col": 0, "start_line": 79 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8)
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.bytes_seed_a", "Spec.Frodo.Params.publicmatrixbytes_len", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let crypto_publickeybytes (a: frodo_alg) : size_pos =
bytes_seed_a + publicmatrixbytes_len a
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.crypto_secretkeybytes
val crypto_secretkeybytes (a: frodo_alg) : size_pos
val crypto_secretkeybytes (a: frodo_alg) : size_pos
let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 85, "end_line": 83, "start_col": 0, "start_line": 82 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.crypto_bytes", "Spec.Frodo.Params.crypto_publickeybytes", "Spec.Frodo.Params.secretmatrixbytes_len", "Spec.Frodo.Params.bytes_pkhash", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let crypto_secretkeybytes (a: frodo_alg) : size_pos =
crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.bytes_mu
val bytes_mu (a: frodo_alg) : size_pos
val bytes_mu (a: frodo_alg) : size_pos
let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 57, "end_line": 65, "start_col": 0, "start_line": 64 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Division", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_extracted_bits", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let bytes_mu (a: frodo_alg) : size_pos =
(params_extracted_bits a * params_nbar) * params_nbar / 8
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.ct2bytes_len
val ct2bytes_len (a: frodo_alg) : size_pos
val ct2bytes_len (a: frodo_alg) : size_pos
let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 49, "end_line": 77, "start_col": 0, "start_line": 76 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8)
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let ct2bytes_len (a: frodo_alg) : size_pos =
params_logq a * (params_nbar * params_nbar / 8)
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.ct1bytes_len
val ct1bytes_len (a: frodo_alg) : size_pos
val ct1bytes_len (a: frodo_alg) : size_pos
let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 48, "end_line": 74, "start_col": 0, "start_line": 73 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_nbar", "Spec.Frodo.Params.params_n", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let ct1bytes_len (a: frodo_alg) : size_pos =
params_logq a * (params_nbar * params_n a / 8)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.flag_of
val flag_of (f:flags_t) : nat1
val flag_of (f:flags_t) : nat1
let flag_of f = bool_to_nat1 (overflow f)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 41, "end_line": 22, "start_col": 0, "start_line": 22 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
f: Vale.Bignum.X64.flags_t -> Vale.Def.Words_s.nat1
Prims.Tot
[ "total" ]
[]
[ "Vale.Bignum.X64.flags_t", "Vale.Bignum.X64.bool_to_nat1", "Vale.X64.Decls.overflow", "Vale.Def.Words_s.nat1" ]
[]
false
false
false
true
false
let flag_of f =
bool_to_nat1 (overflow f)
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.crypto_ciphertextbytes
val crypto_ciphertextbytes (a: frodo_alg) : size_pos
val crypto_ciphertextbytes (a: frodo_alg) : size_pos
let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 33, "end_line": 86, "start_col": 0, "start_line": 85 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.ct1bytes_len", "Spec.Frodo.Params.ct2bytes_len", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let crypto_ciphertextbytes (a: frodo_alg) : size_pos =
ct1bytes_len a + ct2bytes_len a
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.frodo_gen_matrix
val frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st
val frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st
let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 49, "end_line": 135, "start_col": 0, "start_line": 132 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_gen_a -> Spec.Frodo.Params.frodo_gen_matrix_st
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_gen_a", "Spec.Frodo.Gen.frodo_gen_matrix_shake", "Spec.Frodo.Gen.frodo_gen_matrix_aes", "Spec.Frodo.Params.frodo_gen_matrix_st" ]
[]
false
false
false
true
false
let frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st =
match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.frodo_shake
val frodo_shake (a: frodo_alg) : frodo_shake_st
val frodo_shake (a: frodo_alg) : frodo_shake_st
let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 46, "end_line": 121, "start_col": 0, "start_line": 118 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Spec.Frodo.Params.frodo_shake_st
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Spec.SHA3.shake128", "Spec.SHA3.shake256", "Spec.Frodo.Params.frodo_shake_st" ]
[]
false
false
false
true
false
let frodo_shake (a: frodo_alg) : frodo_shake_st =
match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.flag_cf
val flag_cf (f:flags_t) : nat1
val flag_cf (f:flags_t) : nat1
let flag_cf f = bool_to_nat1 (cf f)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 35, "end_line": 21, "start_col": 0, "start_line": 21 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
f: Vale.Bignum.X64.flags_t -> Vale.Def.Words_s.nat1
Prims.Tot
[ "total" ]
[]
[ "Vale.Bignum.X64.flags_t", "Vale.Bignum.X64.bool_to_nat1", "Vale.X64.Decls.cf", "Vale.Def.Words_s.nat1" ]
[]
false
false
false
true
false
let flag_cf f =
bool_to_nat1 (cf f)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.bool_to_nat1
val bool_to_nat1 (b: bool) : nat1
val bool_to_nat1 (b: bool) : nat1
let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 53, "end_line": 20, "start_col": 0, "start_line": 20 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
b: Prims.bool -> Vale.Def.Words_s.nat1
Prims.Tot
[ "total" ]
[]
[ "Prims.bool", "Vale.Def.Words_s.nat1" ]
[]
false
false
false
true
false
let bool_to_nat1 (b: bool) : nat1 =
if b then 1 else 0
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_code_Adcx_64
val va_code_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
val va_code_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ())))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 65, "end_line": 39, "start_col": 0, "start_line": 38 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Adcx64Wrap", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
false
false
false
true
false
let va_code_Adcx_64 dst src =
(va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ())))
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.frodo_gen_matrix_st
val frodo_gen_matrix_st : Type0
let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 15, "end_line": 128, "start_col": 0, "start_line": 125 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Type0
Prims.Tot
[ "total" ]
[]
[ "Lib.IntTypes.size_nat", "Prims.l_and", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Lib.IntTypes.max_size_t", "Lib.IntTypes.maxint", "Lib.IntTypes.U16", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Lib.ByteSequence.lbytes", "Spec.Matrix.matrix" ]
[]
false
false
false
true
true
let frodo_gen_matrix_st =
n: size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed: lbytes 16 -> matrix n n
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_code_Adox_64
val va_code_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
val va_code_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ())))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 65, "end_line": 74, "start_col": 0, "start_line": 73 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Adox64Wrap", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
false
false
false
true
false
let va_code_Adox_64 dst src =
(va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ())))
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_codegen_success_Mulx_64
val va_codegen_success_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
val va_codegen_success_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
let va_codegen_success_Mulx_64 dst_hi dst_lo src = (va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ()))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 76, "end_line": 113, "start_col": 0, "start_line": 112 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64 [@ "opaque_to_smt"] let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ())))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Mulx64", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
false
false
false
true
false
let va_codegen_success_Mulx_64 dst_hi dst_lo src =
(va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ()))
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.params_n_sqr
val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16)
val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16)
let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 29, "end_line": 106, "start_col": 0, "start_line": 103 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg ->
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> FStar.Pervasives.Lemma (ensures Spec.Frodo.Params.params_n a * Spec.Frodo.Params.params_n a <= Lib.IntTypes.max_size_t /\ Spec.Frodo.Params.params_n a <= Lib.IntTypes.maxint Lib.IntTypes.U16)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Math.Lemmas.pow2_plus", "Prims.unit", "FStar.Math.Lemmas.lemma_mult_lt_sqr", "Spec.Frodo.Params.params_n", "Lib.IntTypes.maxint", "Lib.IntTypes.U16", "Prims._assert", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
true
false
true
false
false
let params_n_sqr a =
assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_codegen_success_Adcx_64
val va_codegen_success_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
val va_codegen_success_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ()))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 70, "end_line": 43, "start_col": 0, "start_line": 42 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ())))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Adcx64Wrap", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
false
false
false
true
false
let va_codegen_success_Adcx_64 dst src =
(va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ()))
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_code_Mulx_64
val va_code_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
val va_code_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ())))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 71, "end_line": 109, "start_col": 0, "start_line": 108 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Mulx64", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
false
false
false
true
false
let va_code_Mulx_64 dst_hi dst_lo src =
(va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ())))
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_codegen_success_Adox_64
val va_codegen_success_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
val va_codegen_success_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ()))
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 70, "end_line": 78, "start_col": 0, "start_line": 77 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ())))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
Prims.Tot
[ "total" ]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Adox64Wrap", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
false
false
false
true
false
let va_codegen_success_Adox_64 dst src =
(va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ()))
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_list_976
val cdf_list_976:list uint16
val cdf_list_976:list uint16
let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 37, "end_line": 145, "start_col": 7, "start_line": 143 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
Prims.Tot
[ "total" ]
[]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
false
false
false
true
false
let cdf_list_976:list uint16 =
[ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_table
val cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a)
val cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a)
let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 22, "end_line": 175, "start_col": 0, "start_line": 174 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.Sequence.lseq Lib.IntTypes.uint16 (Spec.Frodo.Params.cdf_table_len a)
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.Sequence.createL", "Lib.IntTypes.uint16", "Spec.Frodo.Params.cdf_list", "Lib.Sequence.lseq", "Spec.Frodo.Params.cdf_table_len" ]
[]
false
false
false
false
false
let cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a) =
createL (cdf_list a)
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_list_1344
val cdf_list_1344:list uint16
val cdf_list_1344:list uint16
let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ]
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 80, "end_line": 148, "start_col": 7, "start_line": 147 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
Prims.Tot
[ "total" ]
[]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
false
false
false
true
false
let cdf_list_1344:list uint16 =
[u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767]
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_list
val cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a}
val cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a}
let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 17, "end_line": 170, "start_col": 0, "start_line": 160 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> x: Prims.list Lib.IntTypes.uint16 {FStar.List.Tot.Base.length x == Spec.Frodo.Params.cdf_table_len a}
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Spec.Frodo.Params.cdf_list_640", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_Equality", "Prims.int", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_976", "Spec.Frodo.Params.cdf_list_1344", "Prims.list", "Lib.IntTypes.uint16", "Prims.eq2", "Prims.l_or", "Prims.op_GreaterThanOrEqual", "Prims.l_and", "Prims.op_GreaterThan", "Prims.op_LessThanOrEqual", "Lib.IntTypes.max_size_t", "Spec.Frodo.Params.cdf_table_len" ]
[]
false
false
false
false
false
let cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a} =
match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_list_640
val cdf_list_640:list uint16
val cdf_list_640:list uint16
let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 59, "end_line": 141, "start_col": 7, "start_line": 139 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
Prims.Tot
[ "total" ]
[]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
false
false
false
true
false
let cdf_list_640:list uint16 =
[ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.cdf_table_len
val cdf_table_len (a: frodo_alg) : size_pos
val cdf_table_len (a: frodo_alg) : size_pos
let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 18, "end_line": 156, "start_col": 0, "start_line": 152 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ]
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
Prims.Tot
[ "total" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos" ]
[]
false
false
false
true
false
let cdf_table_len (a: frodo_alg) : size_pos =
match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.lemma_cdf_list
val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
let lemma_cdf_list a i = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); lemma_cdf_list_640 i | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); lemma_cdf_list_976 i | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); lemma_cdf_list_1344 i
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 25, "end_line": 240, "start_col": 0, "start_line": 230 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15) let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15) val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15) let lemma_cdf_list_1344 i = assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15) val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.Frodo.Params.frodo_alg -> i: Lib.IntTypes.size_nat{i < Spec.Frodo.Params.cdf_table_len a} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index (Spec.Frodo.Params.cdf_list a) i) < Prims.pow2 15)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "Spec.Frodo.Params.cdf_table_len", "Spec.Frodo.Params.lemma_cdf_list_640", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.op_Equality", "Prims.int", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_640", "Spec.Frodo.Params.lemma_cdf_list_976", "Spec.Frodo.Params.cdf_list_976", "Spec.Frodo.Params.lemma_cdf_list_1344", "Spec.Frodo.Params.cdf_list_1344" ]
[]
false
false
true
false
false
let lemma_cdf_list a i =
match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); lemma_cdf_list_640 i | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); lemma_cdf_list_976 i | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); lemma_cdf_list_1344 i
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.lemma_cdf_list_1344
val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15)
val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15)
let lemma_cdf_list_1344 i = assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 65, "end_line": 224, "start_col": 0, "start_line": 216 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15) let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15) val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} ->
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_1344} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_1344 i) < Prims.pow2 15)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_1344", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
true
false
true
false
false
let lemma_cdf_list_1344 i =
assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15)
false
Spec.K256.fst
Spec.K256.aff_point_mul
val aff_point_mul (a: nat) (p: aff_point) : aff_point
val aff_point_mul (a: nat) (p: aff_point) : aff_point
let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 32, "end_line": 67, "start_col": 0, "start_line": 66 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; }
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Prims.nat -> p: Spec.K256.PointOps.aff_point -> Spec.K256.PointOps.aff_point
Prims.Tot
[ "total" ]
[]
[ "Prims.nat", "Spec.K256.PointOps.aff_point", "Lib.Exponentiation.Definition.pow", "Spec.K256.mk_k256_comm_monoid" ]
[]
false
false
false
true
false
let aff_point_mul (a: nat) (p: aff_point) : aff_point =
LE.pow mk_k256_comm_monoid p a
false
Spec.K256.fst
Spec.K256.point_mul_g
val point_mul_g (a: qelem) : proj_point
val point_mul_g (a: qelem) : proj_point
let point_mul_g (a:qelem) : proj_point = point_mul a g
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 54, "end_line": 78, "start_col": 0, "start_line": 78 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.K256.PointOps.qelem -> Spec.K256.PointOps.proj_point
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.qelem", "Spec.K256.point_mul", "Spec.K256.PointOps.g", "Spec.K256.PointOps.proj_point" ]
[]
false
false
false
true
false
let point_mul_g (a: qelem) : proj_point =
point_mul a g
false
Spec.K256.fst
Spec.K256.point_mul_double_g
val point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point
val point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point
let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 28, "end_line": 82, "start_col": 0, "start_line": 81 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a1: Spec.K256.PointOps.qelem -> a2: Spec.K256.PointOps.qelem -> p: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_double", "Spec.K256.PointOps.g" ]
[]
false
false
false
true
false
let point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point =
point_mul_double a1 g a2 p
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_wpProof_Adcx_64
val va_wpProof_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adcx_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adcx_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
val va_wpProof_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adcx_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adcx_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 22, "end_line": 67, "start_col": 0, "start_line": 60 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> va_s0: Vale.X64.Decls.va_state -> va_k: (_: Vale.X64.Decls.va_state -> _: Prims.unit -> Type0) -> Prims.Ghost ((Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel) * Prims.unit)
Prims.Ghost
[]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_state", "Prims.unit", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple3", "Vale.X64.QuickCode.va_lemma_norm_mods", "Prims.Cons", "Vale.X64.QuickCode.mod_t", "Vale.X64.QuickCode.va_Mod_flags", "Vale.X64.QuickCode.va_mod_dst_opr64", "Prims.Nil", "Prims._assert", "Vale.X64.Decls.va_state_eq", "Vale.X64.Decls.va_update_flags", "Vale.X64.Decls.va_update_ok", "Vale.X64.Decls.va_update_operand_dst_opr64", "Vale.X64.Decls.va_lemma_upd_update", "FStar.Pervasives.Native.tuple3", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.Bignum.X64.va_lemma_Adcx_64", "Vale.Bignum.X64.va_code_Adcx_64" ]
[]
false
false
false
false
false
let va_wpProof_Adcx_64 dst src va_s0 va_k =
let va_sM, va_f0 = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_lemma_Mulx_64
val va_lemma_Mulx_64 : va_b0:va_code -> va_s0:va_state -> dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Mulx_64 dst_hi dst_lo src) va_s0 /\ va_is_dst_dst_opr64 dst_hi va_s0 /\ va_is_dst_dst_opr64 dst_lo va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ bmi2_enabled /\ dst_hi =!= dst_lo)) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst_hi == Vale.Bignum.Defs.mul_hi (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_eval_dst_opr64 va_sM dst_lo == Vale.Bignum.Defs.mul_lo (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_state_eq va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst_lo va_sM (va_update_operand_dst_opr64 dst_hi va_sM va_s0)))))
val va_lemma_Mulx_64 : va_b0:va_code -> va_s0:va_state -> dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Mulx_64 dst_hi dst_lo src) va_s0 /\ va_is_dst_dst_opr64 dst_hi va_s0 /\ va_is_dst_dst_opr64 dst_lo va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ bmi2_enabled /\ dst_hi =!= dst_lo)) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst_hi == Vale.Bignum.Defs.mul_hi (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_eval_dst_opr64 va_sM dst_lo == Vale.Bignum.Defs.mul_lo (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_state_eq va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst_lo va_sM (va_update_operand_dst_opr64 dst_hi va_sM va_s0)))))
let va_lemma_Mulx_64 va_b0 va_s0 dst_hi dst_lo src = va_reveal_opaque (`%va_code_Mulx_64) (va_code_Mulx_64 dst_hi dst_lo src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_mul_hi_all (); Vale.Bignum.Defs.reveal_mul_lo_all (); let (va_s4, va_fc4) = va_lemma_Mulx64 (va_hd va_b1) va_s0 dst_hi dst_lo src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 126, "start_col": 0, "start_line": 116 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64 [@ "opaque_to_smt"] let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Mulx_64 dst_hi dst_lo src = (va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ()))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
Prims.Ghost
[]
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Mulx64", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_mul_lo_all", "Vale.Bignum.Defs.reveal_mul_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Mulx_64" ]
[]
false
false
false
false
false
let va_lemma_Mulx_64 va_b0 va_s0 dst_hi dst_lo src =
va_reveal_opaque (`%va_code_Mulx_64) (va_code_Mulx_64 dst_hi dst_lo src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_mul_hi_all (); Vale.Bignum.Defs.reveal_mul_lo_all (); let va_s4, va_fc4 = va_lemma_Mulx64 (va_hd va_b1) va_s0 dst_hi dst_lo src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_lemma_Adcx_64
val va_lemma_Adcx_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adcx_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_cf (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0)) /\ update_cf (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0))) /\ maintain_of (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
val va_lemma_Adcx_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adcx_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_cf (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0)) /\ update_cf (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0))) /\ maintain_of (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 56, "start_col": 0, "start_line": 46 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ()))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
Prims.Ghost
[]
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Adcx64Wrap", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Adcx_64" ]
[]
false
false
false
false
false
let va_lemma_Adcx_64 va_b0 va_s0 dst src =
va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let va_s4, va_fc4 = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.lemma_cdf_list_976
val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15)
val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15)
let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 65, "end_line": 211, "start_col": 0, "start_line": 199 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} ->
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_976} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_976 i) < Prims.pow2 15)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_976", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
true
false
true
false
false
let lemma_cdf_list_976 i =
assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_lemma_Adox_64
val va_lemma_Adox_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adox_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_of (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0)) /\ update_of (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0))) /\ maintain_cf (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
val va_lemma_Adox_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adox_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_of (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0)) /\ update_of (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0))) /\ maintain_cf (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 91, "start_col": 0, "start_line": 81 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ()))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
Prims.Ghost
[]
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Adox64Wrap", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Adox_64" ]
[]
false
false
false
false
false
let va_lemma_Adox_64 va_b0 va_s0 dst src =
va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let va_s4, va_fc4 = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.va_wpProof_Adox_64
val va_wpProof_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adox_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adox_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
val va_wpProof_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adox_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adox_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 22, "end_line": 102, "start_col": 0, "start_line": 95 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> va_s0: Vale.X64.Decls.va_state -> va_k: (_: Vale.X64.Decls.va_state -> _: Prims.unit -> Type0) -> Prims.Ghost ((Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel) * Prims.unit)
Prims.Ghost
[]
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_state", "Prims.unit", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple3", "Vale.X64.QuickCode.va_lemma_norm_mods", "Prims.Cons", "Vale.X64.QuickCode.mod_t", "Vale.X64.QuickCode.va_Mod_flags", "Vale.X64.QuickCode.va_mod_dst_opr64", "Prims.Nil", "Prims._assert", "Vale.X64.Decls.va_state_eq", "Vale.X64.Decls.va_update_flags", "Vale.X64.Decls.va_update_ok", "Vale.X64.Decls.va_update_operand_dst_opr64", "Vale.X64.Decls.va_lemma_upd_update", "FStar.Pervasives.Native.tuple3", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.Bignum.X64.va_lemma_Adox_64", "Vale.Bignum.X64.va_code_Adox_64" ]
[]
false
false
false
false
false
let va_wpProof_Adox_64 dst src va_s0 va_k =
let va_sM, va_f0 = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
false
Vale.Bignum.X64.fst
Vale.Bignum.X64.lemma_add_hi_lo64
val lemma_add_hi_lo64 : dummy:int -> Lemma (requires true) (ensures (forall (a:nat64) (b:nat64) (c:nat1) . {:pattern(add_lo a b c); (add_hi a b c)}Vale.Bignum.Defs.add_lo a b c + va_mul_nat pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c))
val lemma_add_hi_lo64 : dummy:int -> Lemma (requires true) (ensures (forall (a:nat64) (b:nat64) (c:nat1) . {:pattern(add_lo a b c); (add_hi a b c)}Vale.Bignum.Defs.add_lo a b c + va_mul_nat pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c))
let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); ()
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 4, "end_line": 33, "start_col": 0, "start_line": 30 }
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
dummy: Prims.int -> FStar.Pervasives.Lemma (requires true) (ensures forall (a: Vale.Def.Words_s.nat64) (b: Vale.Def.Words_s.nat64) (c: Vale.Def.Words_s.nat1). {:pattern Vale.Bignum.Defs.add_lo a b c; Vale.Bignum.Defs.add_hi a b c} Vale.Bignum.Defs.add_lo a b c + Vale.X64.Decls.va_mul_nat Vale.Def.Words_s.pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Prims.int", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all" ]
[]
true
false
true
false
false
let lemma_add_hi_lo64 dummy =
Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); ()
false
Spec.K256.fst
Spec.K256.point_double_c
val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid
val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid
let point_double_c p = KL.to_aff_point_double_lemma p; point_double p
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 56, "start_col": 0, "start_line": 54 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Spec.Exponentiation.sqr_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.point_double", "Prims.unit", "Spec.K256.Lemmas.to_aff_point_double_lemma" ]
[]
false
false
false
true
false
let point_double_c p =
KL.to_aff_point_double_lemma p; point_double p
false
Spec.K256.fst
Spec.K256.mk_k256_abelian_group
val mk_k256_abelian_group:LE.abelian_group aff_point
val mk_k256_abelian_group:LE.abelian_group aff_point
let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; }
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 1, "end_line": 35, "start_col": 0, "start_line": 31 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; }
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Lib.Exponentiation.Definition.abelian_group Spec.K256.PointOps.aff_point
Prims.Tot
[ "total" ]
[]
[ "Lib.Exponentiation.Definition.Mkabelian_group", "Spec.K256.PointOps.aff_point", "Spec.K256.mk_k256_comm_monoid", "Spec.K256.PointOps.aff_point_negate", "Spec.K256.Lemmas.aff_point_negate_lemma" ]
[]
false
false
false
true
false
let mk_k256_abelian_group:LE.abelian_group aff_point =
{ LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma }
false
Spec.K256.fst
Spec.K256.point_at_inf_c
val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid
val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid
let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 14, "end_line": 46, "start_col": 0, "start_line": 44 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; }
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Spec.Exponentiation.one_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
Prims.Tot
[ "total" ]
[]
[ "Prims.unit", "Spec.K256.PointOps.point_at_inf", "Spec.K256.Lemmas.to_aff_point_at_infinity_lemma", "Spec.K256.PointOps.proj_point" ]
[]
false
false
false
true
false
let point_at_inf_c _ =
KL.to_aff_point_at_infinity_lemma (); point_at_inf
false
Spec.Frodo.Params.fst
Spec.Frodo.Params.lemma_cdf_list_640
val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15)
val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15)
let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15)
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 65, "end_line": 194, "start_col": 0, "start_line": 180 }
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} ->
{ "checked_file": "/", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_640} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_640 i) < Prims.pow2 15)
FStar.Pervasives.Lemma
[ "lemma" ]
[]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_640", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
true
false
true
false
false
let lemma_cdf_list_640 i =
assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15)
false
Spec.K256.fst
Spec.K256.mk_k256_comm_monoid
val mk_k256_comm_monoid:LE.comm_monoid aff_point
val mk_k256_comm_monoid:LE.comm_monoid aff_point
let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; }
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 1, "end_line": 29, "start_col": 0, "start_line": 23 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *)
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Lib.Exponentiation.Definition.comm_monoid Spec.K256.PointOps.aff_point
Prims.Tot
[ "total" ]
[]
[ "Lib.Exponentiation.Definition.Mkcomm_monoid", "Spec.K256.PointOps.aff_point", "Spec.K256.PointOps.aff_point_at_inf", "Spec.K256.PointOps.aff_point_add", "Spec.K256.Lemmas.aff_point_at_inf_lemma", "Spec.K256.Lemmas.aff_point_add_assoc_lemma", "Spec.K256.Lemmas.aff_point_add_comm_lemma" ]
[]
false
false
false
true
false
let mk_k256_comm_monoid:LE.comm_monoid aff_point =
{ LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma }
false
BinomialQueue.fsti
BinomialQueue.ms_cons
val ms_cons : x: BinomialQueue.key_t -> ms: BinomialQueue.ms -> BinomialQueue.ms
let ms_cons (x:key_t) (ms:ms) = ms_append (ms_singleton x) ms
{ "file_name": "examples/data_structures/BinomialQueue.fsti", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 31, "end_line": 75, "start_col": 0, "start_line": 74 }
(* Copyright 2022 Microsoft Research Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Authors: Aseem Rastogi *) module BinomialQueue /// This module provides an implementation for priority queues /// using binomial queues that maintain a forest of power-of-2 heaps. /// /// See https://www.cs.princeton.edu/~appel/BQ.pdf /// for background on binomial queues. /// /// The module provides functional correctness specifications for /// the priority queue operations using a multiset as the logical /// representation. /// /// See the following for a Coq outline for the same: /// https://softwarefoundations.cis.upenn.edu/vfa-current/Binom.html module S = FStar.Set /// Fixing the key type to nat, /// should be possible to parameterize over it and a comparison function type key_t = nat /// The priority queue interface val priq : Type0 val empty : priq val insert : key_t -> priq -> priq val delete_max : priq -> option (key_t & priq) val merge : priq -> priq -> priq /// The multiset type and associated functioms noeq type ms = { ms_count : key_t -> nat; ms_elems : S.set key_t; } let ms_empty : ms = { ms_count = (fun _ -> 0); ms_elems = S.empty; } let ms_singleton (x:key_t) : ms = { ms_count = (fun x' -> if x' = x then 1 else 0); ms_elems = S.singleton x; } let ms_append (ms1 ms2:ms) : ms = { ms_count = (fun x -> ms1.ms_count x + ms2.ms_count x); ms_elems = S.union ms1.ms_elems ms2.ms_elems; }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Set.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "BinomialQueue.fsti" }
[ { "abbrev": true, "full_module": "FStar.List.Tot", "short_module": "L" }, { "abbrev": true, "full_module": "FStar.Set", "short_module": "S" }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
x: BinomialQueue.key_t -> ms: BinomialQueue.ms -> BinomialQueue.ms
Prims.Tot
[ "total" ]
[]
[ "BinomialQueue.key_t", "BinomialQueue.ms", "BinomialQueue.ms_append", "BinomialQueue.ms_singleton" ]
[]
false
false
false
true
false
let ms_cons (x: key_t) (ms: ms) =
ms_append (ms_singleton x) ms
false
Spec.K256.fst
Spec.K256.point_add_c
val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid
val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid
let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 15, "end_line": 51, "start_col": 0, "start_line": 49 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Spec.Exponentiation.mul_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.point_add", "Prims.unit", "Spec.K256.Lemmas.to_aff_point_add_lemma" ]
[]
false
false
false
true
false
let point_add_c p q =
KL.to_aff_point_add_lemma p q; point_add p q
false
BinomialQueue.fsti
BinomialQueue.ms_empty
val ms_empty:ms
val ms_empty:ms
let ms_empty : ms = { ms_count = (fun _ -> 0); ms_elems = S.empty; }
{ "file_name": "examples/data_structures/BinomialQueue.fsti", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 1, "end_line": 62, "start_col": 0, "start_line": 59 }
(* Copyright 2022 Microsoft Research Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Authors: Aseem Rastogi *) module BinomialQueue /// This module provides an implementation for priority queues /// using binomial queues that maintain a forest of power-of-2 heaps. /// /// See https://www.cs.princeton.edu/~appel/BQ.pdf /// for background on binomial queues. /// /// The module provides functional correctness specifications for /// the priority queue operations using a multiset as the logical /// representation. /// /// See the following for a Coq outline for the same: /// https://softwarefoundations.cis.upenn.edu/vfa-current/Binom.html module S = FStar.Set /// Fixing the key type to nat, /// should be possible to parameterize over it and a comparison function type key_t = nat /// The priority queue interface val priq : Type0 val empty : priq val insert : key_t -> priq -> priq val delete_max : priq -> option (key_t & priq) val merge : priq -> priq -> priq /// The multiset type and associated functioms noeq type ms = { ms_count : key_t -> nat; ms_elems : S.set key_t; }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Set.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "BinomialQueue.fsti" }
[ { "abbrev": true, "full_module": "FStar.List.Tot", "short_module": "L" }, { "abbrev": true, "full_module": "FStar.Set", "short_module": "S" }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
BinomialQueue.ms
Prims.Tot
[ "total" ]
[]
[ "BinomialQueue.Mkms", "BinomialQueue.key_t", "Prims.nat", "FStar.Set.empty" ]
[]
false
false
false
true
false
let ms_empty:ms =
{ ms_count = (fun _ -> 0); ms_elems = S.empty }
false
Spec.K256.fst
Spec.K256.point_mul
val point_mul (a: qelem) (p: proj_point) : proj_point
val point_mul (a: qelem) (p: proj_point) : proj_point
let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 42, "end_line": 71, "start_col": 0, "start_line": 70 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a: Spec.K256.PointOps.qelem -> p: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.Exponentiation.exp_fw", "Spec.K256.mk_k256_concrete_ops" ]
[]
false
false
false
true
false
let point_mul (a: qelem) (p: proj_point) : proj_point =
SE.exp_fw mk_k256_concrete_ops p 256 a 4
false
BinomialQueue.fsti
BinomialQueue.ms_singleton
val ms_singleton (x: key_t) : ms
val ms_singleton (x: key_t) : ms
let ms_singleton (x:key_t) : ms = { ms_count = (fun x' -> if x' = x then 1 else 0); ms_elems = S.singleton x; }
{ "file_name": "examples/data_structures/BinomialQueue.fsti", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 1, "end_line": 67, "start_col": 0, "start_line": 64 }
(* Copyright 2022 Microsoft Research Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Authors: Aseem Rastogi *) module BinomialQueue /// This module provides an implementation for priority queues /// using binomial queues that maintain a forest of power-of-2 heaps. /// /// See https://www.cs.princeton.edu/~appel/BQ.pdf /// for background on binomial queues. /// /// The module provides functional correctness specifications for /// the priority queue operations using a multiset as the logical /// representation. /// /// See the following for a Coq outline for the same: /// https://softwarefoundations.cis.upenn.edu/vfa-current/Binom.html module S = FStar.Set /// Fixing the key type to nat, /// should be possible to parameterize over it and a comparison function type key_t = nat /// The priority queue interface val priq : Type0 val empty : priq val insert : key_t -> priq -> priq val delete_max : priq -> option (key_t & priq) val merge : priq -> priq -> priq /// The multiset type and associated functioms noeq type ms = { ms_count : key_t -> nat; ms_elems : S.set key_t; } let ms_empty : ms = { ms_count = (fun _ -> 0); ms_elems = S.empty; }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Set.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "BinomialQueue.fsti" }
[ { "abbrev": true, "full_module": "FStar.List.Tot", "short_module": "L" }, { "abbrev": true, "full_module": "FStar.Set", "short_module": "S" }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
x: BinomialQueue.key_t -> BinomialQueue.ms
Prims.Tot
[ "total" ]
[]
[ "BinomialQueue.key_t", "BinomialQueue.Mkms", "Prims.op_Equality", "Prims.bool", "Prims.nat", "FStar.Set.singleton", "BinomialQueue.ms" ]
[]
false
false
false
true
false
let ms_singleton (x: key_t) : ms =
{ ms_count = (fun x' -> if x' = x then 1 else 0); ms_elems = S.singleton x }
false
BinomialQueue.fsti
BinomialQueue.permutation
val permutation : ms1: BinomialQueue.ms -> ms2: BinomialQueue.ms -> Prims.logical
let permutation (ms1 ms2:ms) = S.equal ms1.ms_elems ms2.ms_elems /\ (forall (x:key_t).{:pattern ms1.ms_count x \/ ms2.ms_count x} ms1.ms_count x == ms2.ms_count x)
{ "file_name": "examples/data_structures/BinomialQueue.fsti", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 48, "end_line": 84, "start_col": 0, "start_line": 81 }
(* Copyright 2022 Microsoft Research Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Authors: Aseem Rastogi *) module BinomialQueue /// This module provides an implementation for priority queues /// using binomial queues that maintain a forest of power-of-2 heaps. /// /// See https://www.cs.princeton.edu/~appel/BQ.pdf /// for background on binomial queues. /// /// The module provides functional correctness specifications for /// the priority queue operations using a multiset as the logical /// representation. /// /// See the following for a Coq outline for the same: /// https://softwarefoundations.cis.upenn.edu/vfa-current/Binom.html module S = FStar.Set /// Fixing the key type to nat, /// should be possible to parameterize over it and a comparison function type key_t = nat /// The priority queue interface val priq : Type0 val empty : priq val insert : key_t -> priq -> priq val delete_max : priq -> option (key_t & priq) val merge : priq -> priq -> priq /// The multiset type and associated functioms noeq type ms = { ms_count : key_t -> nat; ms_elems : S.set key_t; } let ms_empty : ms = { ms_count = (fun _ -> 0); ms_elems = S.empty; } let ms_singleton (x:key_t) : ms = { ms_count = (fun x' -> if x' = x then 1 else 0); ms_elems = S.singleton x; } let ms_append (ms1 ms2:ms) : ms = { ms_count = (fun x -> ms1.ms_count x + ms2.ms_count x); ms_elems = S.union ms1.ms_elems ms2.ms_elems; } let ms_cons (x:key_t) (ms:ms) = ms_append (ms_singleton x) ms /// ms1 and ms2 are in the permutation relation if: /// - their element sets are equal /// - their count functions are pointwise equal
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Set.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "BinomialQueue.fsti" }
[ { "abbrev": true, "full_module": "FStar.List.Tot", "short_module": "L" }, { "abbrev": true, "full_module": "FStar.Set", "short_module": "S" }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
ms1: BinomialQueue.ms -> ms2: BinomialQueue.ms -> Prims.logical
Prims.Tot
[ "total" ]
[]
[ "BinomialQueue.ms", "Prims.l_and", "FStar.Set.equal", "BinomialQueue.key_t", "BinomialQueue.__proj__Mkms__item__ms_elems", "Prims.l_Forall", "Prims.eq2", "Prims.nat", "BinomialQueue.__proj__Mkms__item__ms_count", "Prims.logical" ]
[]
false
false
false
true
true
let permutation (ms1 ms2: ms) =
S.equal ms1.ms_elems ms2.ms_elems /\ (forall (x: key_t). {:pattern ms1.ms_count x\/ms2.ms_count x} ms1.ms_count x == ms2.ms_count x)
false
FStar.Tactics.V2.SyntaxCoercions.fst
FStar.Tactics.V2.SyntaxCoercions.namedv_to_term
val namedv_to_term (x: namedv) : Tot term
val namedv_to_term (x: namedv) : Tot term
let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x)
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 17, "end_line": 9, "start_col": 0, "start_line": 8 }
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fsti.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
x: FStar.Tactics.NamedView.namedv -> FStar.Tactics.NamedView.term
Prims.Tot
[ "total" ]
[]
[ "FStar.Tactics.NamedView.namedv", "FStar.Tactics.NamedView.pack", "FStar.Tactics.NamedView.Tv_Var", "FStar.Tactics.NamedView.term" ]
[]
false
false
false
true
false
let namedv_to_term (x: namedv) : Tot term =
pack (Tv_Var x)
false
BinomialQueue.fsti
BinomialQueue.ms_append
val ms_append (ms1 ms2: ms) : ms
val ms_append (ms1 ms2: ms) : ms
let ms_append (ms1 ms2:ms) : ms = { ms_count = (fun x -> ms1.ms_count x + ms2.ms_count x); ms_elems = S.union ms1.ms_elems ms2.ms_elems; }
{ "file_name": "examples/data_structures/BinomialQueue.fsti", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 1, "end_line": 72, "start_col": 0, "start_line": 69 }
(* Copyright 2022 Microsoft Research Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Authors: Aseem Rastogi *) module BinomialQueue /// This module provides an implementation for priority queues /// using binomial queues that maintain a forest of power-of-2 heaps. /// /// See https://www.cs.princeton.edu/~appel/BQ.pdf /// for background on binomial queues. /// /// The module provides functional correctness specifications for /// the priority queue operations using a multiset as the logical /// representation. /// /// See the following for a Coq outline for the same: /// https://softwarefoundations.cis.upenn.edu/vfa-current/Binom.html module S = FStar.Set /// Fixing the key type to nat, /// should be possible to parameterize over it and a comparison function type key_t = nat /// The priority queue interface val priq : Type0 val empty : priq val insert : key_t -> priq -> priq val delete_max : priq -> option (key_t & priq) val merge : priq -> priq -> priq /// The multiset type and associated functioms noeq type ms = { ms_count : key_t -> nat; ms_elems : S.set key_t; } let ms_empty : ms = { ms_count = (fun _ -> 0); ms_elems = S.empty; } let ms_singleton (x:key_t) : ms = { ms_count = (fun x' -> if x' = x then 1 else 0); ms_elems = S.singleton x; }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Set.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "BinomialQueue.fsti" }
[ { "abbrev": true, "full_module": "FStar.List.Tot", "short_module": "L" }, { "abbrev": true, "full_module": "FStar.Set", "short_module": "S" }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
ms1: BinomialQueue.ms -> ms2: BinomialQueue.ms -> BinomialQueue.ms
Prims.Tot
[ "total" ]
[]
[ "BinomialQueue.ms", "BinomialQueue.Mkms", "BinomialQueue.key_t", "Prims.op_Addition", "BinomialQueue.__proj__Mkms__item__ms_count", "Prims.nat", "FStar.Set.union", "BinomialQueue.__proj__Mkms__item__ms_elems" ]
[]
false
false
false
true
false
let ms_append (ms1 ms2: ms) : ms =
{ ms_count = (fun x -> ms1.ms_count x + ms2.ms_count x); ms_elems = S.union ms1.ms_elems ms2.ms_elems }
false
FStar.Tactics.V2.SyntaxCoercions.fst
FStar.Tactics.V2.SyntaxCoercions.binder_to_namedv
val binder_to_namedv (b: binder) : Tot namedv
val binder_to_namedv (b: binder) : Tot namedv
let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; }
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 3, "end_line": 17, "start_col": 0, "start_line": 12 }
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x)
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fsti.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
b: FStar.Tactics.NamedView.binder -> FStar.Tactics.NamedView.namedv
Prims.Tot
[ "total" ]
[]
[ "FStar.Tactics.NamedView.binder", "FStar.Stubs.Reflection.V2.Data.Mknamedv_view", "FStar.Tactics.NamedView.__proj__Mkbinder__item__uniq", "FStar.Sealed.seal", "FStar.Stubs.Reflection.Types.typ", "FStar.Tactics.NamedView.__proj__Mkbinder__item__sort", "FStar.Tactics.NamedView.__proj__Mkbinder__item__ppname", "FStar.Tactics.NamedView.namedv" ]
[]
false
false
false
true
false
let binder_to_namedv (b: binder) : Tot namedv =
{ ppname = b.ppname; uniq = b.uniq; sort = seal b.sort }
false
Spec.K256.fst
Spec.K256.point_mul_double
val point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point
val point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point
let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 57, "end_line": 75, "start_col": 0, "start_line": 74 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
a1: Spec.K256.PointOps.qelem -> p1: Spec.K256.PointOps.proj_point -> a2: Spec.K256.PointOps.qelem -> p2: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
Prims.Tot
[ "total" ]
[]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.Exponentiation.exp_double_fw", "Spec.K256.mk_k256_concrete_ops" ]
[]
false
false
false
true
false
let point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point =
SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
false
FStar.Tactics.V2.SyntaxCoercions.fst
FStar.Tactics.V2.SyntaxCoercions.binder_to_term
val binder_to_term (b: binder) : Tot term
val binder_to_term (b: binder) : Tot term
let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b))
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 36, "end_line": 21, "start_col": 0, "start_line": 20 }
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fsti.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
b: FStar.Tactics.NamedView.binder -> FStar.Tactics.NamedView.term
Prims.Tot
[ "total" ]
[]
[ "FStar.Tactics.NamedView.binder", "FStar.Tactics.NamedView.pack", "FStar.Tactics.NamedView.Tv_Var", "FStar.Tactics.V2.SyntaxCoercions.binder_to_namedv", "FStar.Tactics.NamedView.term" ]
[]
false
false
false
true
false
let binder_to_term (b: binder) : Tot term =
pack (Tv_Var (binder_to_namedv b))
false
FStar.Tactics.V2.SyntaxCoercions.fst
FStar.Tactics.V2.SyntaxCoercions.binding_to_namedv
val binding_to_namedv (b: binding) : Tot namedv
val binding_to_namedv (b: binding) : Tot namedv
let binding_to_namedv (b : binding) : Tot namedv = { ppname = b.ppname; sort = seal b.sort; uniq = b.uniq }
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 3, "end_line": 29, "start_col": 0, "start_line": 24 }
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; } [@@coercion] let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b))
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fsti.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
b: FStar.Tactics.NamedView.binding -> FStar.Tactics.NamedView.namedv
Prims.Tot
[ "total" ]
[]
[ "FStar.Tactics.NamedView.binding", "FStar.Stubs.Reflection.V2.Data.Mknamedv_view", "FStar.Stubs.Reflection.V2.Data.__proj__Mkbinding__item__uniq", "FStar.Sealed.seal", "FStar.Stubs.Reflection.Types.typ", "FStar.Stubs.Reflection.V2.Data.__proj__Mkbinding__item__sort", "FStar.Stubs.Reflection.V2.Data.__proj__Mkbinding__item__ppname", "FStar.Tactics.NamedView.namedv" ]
[]
false
false
false
true
false
let binding_to_namedv (b: binding) : Tot namedv =
{ ppname = b.ppname; sort = seal b.sort; uniq = b.uniq }
false
FStar.Tactics.V2.SyntaxCoercions.fst
FStar.Tactics.V2.SyntaxCoercions.binding_to_term
val binding_to_term (x: binding) : Tot term
val binding_to_term (x: binding) : Tot term
let binding_to_term (x : binding) : Tot term = namedv_to_term (binding_to_namedv x)
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "10183ea187da8e8c426b799df6c825e24c0767d3", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
{ "end_col": 38, "end_line": 33, "start_col": 0, "start_line": 32 }
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; } [@@coercion] let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b)) [@@coercion] let binding_to_namedv (b : binding) : Tot namedv = { ppname = b.ppname; sort = seal b.sort; uniq = b.uniq }
{ "checked_file": "/", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fsti.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
x: FStar.Tactics.NamedView.binding -> FStar.Tactics.NamedView.term
Prims.Tot
[ "total" ]
[]
[ "FStar.Tactics.NamedView.binding", "FStar.Tactics.V2.SyntaxCoercions.namedv_to_term", "FStar.Tactics.V2.SyntaxCoercions.binding_to_namedv", "FStar.Tactics.NamedView.term" ]
[]
false
false
false
true
false
let binding_to_term (x: binding) : Tot term =
namedv_to_term (binding_to_namedv x)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.pow2_35_less_than_pow2_61
val pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1}
val pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1}
let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 118, "end_line": 16, "start_col": 0, "start_line": 16 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
_: Prims.unit{Prims.pow2 32 * Prims.pow2 3 <= Prims.pow2 61 - 1}
Prims.Tot
[ "total" ]
[]
[ "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Prims.pow2", "Prims.op_Subtraction" ]
[]
false
false
false
false
false
let pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1} =
assert_norm (pow2 32 * pow2 3 <= pow2 61 - 1)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.pow2_35_less_than_pow2_125
val pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1}
val pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1}
let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 121, "end_line": 17, "start_col": 0, "start_line": 17 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
_: Prims.unit{Prims.pow2 32 * Prims.pow2 3 <= Prims.pow2 125 - 1}
Prims.Tot
[ "total" ]
[]
[ "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Prims.pow2", "Prims.op_Subtraction" ]
[]
false
false
false
false
false
let pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1} =
assert_norm (pow2 32 * pow2 3 <= pow2 125 - 1)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.pow2_61
val pow2_61:_: unit{pow2 61 == 2305843009213693952}
val pow2_61:_: unit{pow2 61 == 2305843009213693952}
let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 98, "end_line": 15, "start_col": 0, "start_line": 15 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
_: Prims.unit{Prims.pow2 61 == 2305843009213693952}
Prims.Tot
[ "total" ]
[]
[ "FStar.Pervasives.assert_norm", "Prims.eq2", "Prims.int", "Prims.pow2" ]
[]
false
false
false
false
false
let pow2_61:_: unit{pow2 61 == 2305843009213693952} =
assert_norm (pow2 61 == 2305843009213693952)
false
Spec.K256.fst
Spec.K256.ecdsa_sign_hashed_msg
val ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
val ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 71, "end_line": 106, "start_col": 0, "start_line": 86 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msgHash: Lib.ByteSequence.lbytes 32 -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Prims.op_AmpAmp", "FStar.Pervasives.Native.None", "Prims.bool", "Spec.K256.PointOps.felem", "Prims.op_BarBar", "Prims.op_Equality", "Prims.int", "FStar.Pervasives.Native.Some", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "FStar.Pervasives.Native.option", "Lib.Sequence.seq", "Lib.IntTypes.int_t", "Prims.l_and", "Prims.eq2", "Prims.nat", "Lib.Sequence.length", "Prims.l_or", "Prims.b2t", "Prims.op_LessThan", "Prims.pow2", "Prims.op_Multiply", "Lib.ByteSequence.nat_from_intseq_be", "Lib.ByteSequence.nat_to_bytes_be", "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.op_Star_Hat", "Spec.K256.PointOps.op_Plus_Hat", "Spec.K256.PointOps.qinv", "Prims.op_Modulus", "Spec.K256.PointOps.q", "Spec.K256.PointOps.op_Slash_Percent", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_g", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
false
false
false
false
false
let ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) =
let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb)
false
Spec.K256.fst
Spec.K256.pk_uncompressed_from_raw
val pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65
val pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65
let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 32, "end_line": 190, "start_col": 0, "start_line": 189 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64)
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
pk: Lib.ByteSequence.lbytes 64 -> Lib.ByteSequence.lbytes 65
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.create", "Lib.IntTypes.u8" ]
[]
false
false
false
false
false
let pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65 =
concat (create 1 (u8 0x04)) pk
false
Spec.K256.fst
Spec.K256.validate_public_key
val validate_public_key (pk: lbytes 64) : bool
val validate_public_key (pk: lbytes 64) : bool
let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk)
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 23, "end_line": 184, "start_col": 0, "start_line": 183 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
pk: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.load_point", "Prims.bool" ]
[]
false
false
false
false
false
let validate_public_key (pk: lbytes 64) : bool =
Some? (load_point pk)
false
Spec.K256.fst
Spec.K256.ecdsa_verify_sha256
val ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
val ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 54, "end_line": 153, "start_col": 0, "start_line": 151 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.ecdsa_verify_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "Prims.bool" ]
[]
false
false
false
false
false
let ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool =
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature
false
Spec.K256.fst
Spec.K256.ecdsa_sign_sha256
val ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
val ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 49, "end_line": 148, "start_col": 0, "start_line": 146 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32)
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.ecdsa_sign_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "FStar.Pervasives.Native.option" ]
[]
false
false
false
false
false
let ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) =
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
false
Spec.K256.fst
Spec.K256.ecdh
val ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64)
val ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64)
let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 11, "end_line": 174, "start_col": 0, "start_line": 167 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
their_public_key: Lib.ByteSequence.lbytes 64 -> private_key: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_AmpAmp", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "FStar.Pervasives.Native.Some", "Spec.K256.PointOps.point_store", "Spec.K256.point_mul", "FStar.Pervasives.Native.__proj__Some__item__v", "Prims.bool", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_LessThan", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_from_bytes_be", "Spec.K256.PointOps.load_point" ]
[]
false
false
false
false
false
let ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64) =
let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None
false
Spec.K256.fst
Spec.K256.ecdsa_verify_hashed_msg
val ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
val ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 5, "end_line": 130, "start_col": 0, "start_line": 109 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msgHash: Lib.ByteSequence.lbytes 32 -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Prims.op_AmpAmp", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "Prims.bool", "Spec.K256.PointOps.felem", "Spec.K256.PointOps.is_proj_point_at_inf", "FStar.Pervasives.Native.Mktuple3", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Spec.K256.PointOps.q", "Spec.K256.PointOps.op_Slash_Percent", "Spec.K256.point_mul_double_g", "FStar.Pervasives.Native.__proj__Some__item__v", "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.op_Star_Hat", "Spec.K256.PointOps.qinv", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThan", "Prims.pow2", "Lib.ByteSequence.nat_from_bytes_be", "Lib.IntTypes.SEC", "Prims.nat", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.Sequence.sub", "Lib.IntTypes.uint_t", "FStar.Pervasives.Native.option", "Spec.K256.PointOps.load_point" ]
[]
false
false
false
false
false
let ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool =
let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else (assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else let x = _X /% _Z in x % q = r)
false
Vale.Stdcalls.X64.Fadd.fst
Vale.Stdcalls.X64.Fadd.add_scalar_e
val add_scalar_e : normal lowstar_add1_t
val add_scalar_e : normal lowstar_add1_t
let add_scalar_e //: normal lowstar_add1_t = as_normal_t #lowstar_add1_t lowstar_add1
{ "file_name": "vale/code/arch/x64/interop/Vale.Stdcalls.X64.Fadd.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 44, "end_line": 39, "start_col": 0, "start_line": 38 }
module Vale.Stdcalls.X64.Fadd open FStar.Mul #reset-options "--z3rlimit 50" let z3rlimit_hack x = () open FStar.HyperStack.ST module HS = FStar.HyperStack module B = LowStar.Buffer module DV = LowStar.BufferView.Down module UV = LowStar.BufferView.Up open Vale.Def.Types_s open Vale.Interop.Base module IX64 = Vale.Interop.X64 module VSig = Vale.AsLowStar.ValeSig module LSig = Vale.AsLowStar.LowStarSig module ME = Vale.X64.Memory module V = Vale.X64.Decls module IA = Vale.Interop.Assumptions module W = Vale.AsLowStar.Wrapper open Vale.X64.MemoryAdapters module VS = Vale.X64.State module MS = Vale.X64.Machine_s module FU = Vale.Curve25519.X64.FastUtil module FH = Vale.Curve25519.X64.FastHybrid module FW = Vale.Curve25519.X64.FastWide (* And here's the fadd wrapper itself *) let lowstar_add1 : lowstar_add1_t = assert_norm (List.length dom + List.length ([]<:list arg) <= 4); IX64.wrap_weak_stdcall code_add1 dom (W.mk_prediction code_add1 dom [] (add1_lemma code_add1 IA.win))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.MemoryAdapters.fsti.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.Decls.fsti.checked", "Vale.Interop.X64.fsti.checked", "Vale.Interop.Base.fst.checked", "Vale.Interop.Assumptions.fst.checked", "Vale.Def.Types_s.fst.checked", "Vale.Curve25519.X64.FastWide.fsti.checked", "Vale.Curve25519.X64.FastUtil.fsti.checked", "Vale.Curve25519.X64.FastHybrid.fsti.checked", "Vale.AsLowStar.Wrapper.fsti.checked", "Vale.AsLowStar.ValeSig.fst.checked", "Vale.AsLowStar.LowStarSig.fst.checked", "prims.fst.checked", "LowStar.BufferView.Up.fsti.checked", "LowStar.BufferView.Down.fsti.checked", "LowStar.Buffer.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.fst.checked" ], "interface_file": true, "source_file": "Vale.Stdcalls.X64.Fadd.fst" }
[ { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastWide", "short_module": "FW" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastHybrid", "short_module": "FH" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastUtil", "short_module": "FU" }, { "abbrev": true, "full_module": "Vale.X64.Machine_s", "short_module": "MS" }, { "abbrev": true, "full_module": "Vale.X64.State", "short_module": "VS" }, { "abbrev": false, "full_module": "Vale.X64.MemoryAdapters", "short_module": null }, { "abbrev": true, "full_module": "Vale.AsLowStar.Wrapper", "short_module": "W" }, { "abbrev": true, "full_module": "Vale.Interop.Assumptions", "short_module": "IA" }, { "abbrev": true, "full_module": "Vale.X64.Decls", "short_module": "V" }, { "abbrev": true, "full_module": "Vale.X64.Memory", "short_module": "ME" }, { "abbrev": true, "full_module": "Vale.AsLowStar.LowStarSig", "short_module": "LSig" }, { "abbrev": true, "full_module": "Vale.AsLowStar.ValeSig", "short_module": "VSig" }, { "abbrev": true, "full_module": "Vale.Interop.X64", "short_module": "IX64" }, { "abbrev": false, "full_module": "Vale.Interop.Base", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": true, "full_module": "LowStar.BufferView.Up", "short_module": "UV" }, { "abbrev": true, "full_module": "LowStar.BufferView.Down", "short_module": "DV" }, { "abbrev": true, "full_module": "LowStar.Buffer", "short_module": "B" }, { "abbrev": true, "full_module": "FStar.HyperStack", "short_module": "HS" }, { "abbrev": false, "full_module": "FStar.HyperStack.ST", "short_module": null }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastWide", "short_module": "FW" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastHybrid", "short_module": "FH" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastUtil", "short_module": "FU" }, { "abbrev": true, "full_module": "Vale.X64.Machine_s", "short_module": "MS" }, { "abbrev": true, "full_module": "Vale.X64.State", "short_module": "VS" }, { "abbrev": false, "full_module": "Vale.X64.MemoryAdapters", "short_module": null }, { "abbrev": true, "full_module": "Vale.AsLowStar.Wrapper", "short_module": "W" }, { "abbrev": true, "full_module": "Vale.Interop.Assumptions", "short_module": "IA" }, { "abbrev": true, "full_module": "Vale.X64.Decls", "short_module": "V" }, { "abbrev": true, "full_module": "Vale.X64.Memory", "short_module": "ME" }, { "abbrev": true, "full_module": "Vale.AsLowStar.LowStarSig", "short_module": "LSig" }, { "abbrev": true, "full_module": "Vale.AsLowStar.ValeSig", "short_module": "VSig" }, { "abbrev": true, "full_module": "Vale.Interop.X64", "short_module": "IX64" }, { "abbrev": false, "full_module": "Vale.Interop.Base", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": true, "full_module": "LowStar.BufferView.Up", "short_module": "UV" }, { "abbrev": true, "full_module": "LowStar.BufferView.Down", "short_module": "DV" }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack", "short_module": "HS" }, { "abbrev": true, "full_module": "LowStar.Buffer", "short_module": "B" }, { "abbrev": false, "full_module": "FStar.HyperStack.ST", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Stdcalls.X64", "short_module": null }, { "abbrev": false, "full_module": "Vale.Stdcalls.X64", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Vale.Interop.Base.normal Vale.Stdcalls.X64.Fadd.lowstar_add1_t
Prims.Tot
[ "total" ]
[]
[ "Vale.Stdcalls.X64.Fadd.as_normal_t", "Vale.Stdcalls.X64.Fadd.lowstar_add1_t", "Vale.Stdcalls.X64.Fadd.lowstar_add1" ]
[]
false
false
false
true
false
let add_scalar_e =
as_normal_t #lowstar_add1_t lowstar_add1
false
Spec.K256.fst
Spec.K256.pk_uncompressed_to_raw
val pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64)
val pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64)
let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64)
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 83, "end_line": 187, "start_col": 0, "start_line": 186 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk)
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
pk: Lib.ByteSequence.lbytes 65 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_disEquality", "FStar.UInt8.t", "Lib.RawIntTypes.u8_to_UInt8", "Lib.Sequence.op_String_Access", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "FStar.UInt8.__uint_to_t", "FStar.Pervasives.Native.None", "Prims.bool", "FStar.Pervasives.Native.Some", "Lib.Sequence.sub", "FStar.Pervasives.Native.option" ]
[]
false
false
false
false
false
let pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64) =
if Lib.RawIntTypes.u8_to_UInt8 pk.[ 0 ] <> 0x04uy then None else Some (sub pk 1 64)
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_verify_sha256
val secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
val secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
let secp256k1_ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_verify_hashed_msg msgHash public_key signature
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 64, "end_line": 252, "start_col": 0, "start_line": 250 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce let secp256k1_ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_verify_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "Prims.bool" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool =
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_verify_hashed_msg msgHash public_key signature
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_sign_sha256
val secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
val secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 59, "end_line": 242, "start_col": 0, "start_line": 240 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_sign_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "FStar.Pervasives.Native.option" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) =
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
false
Spec.K256.fst
Spec.K256.secret_to_public
val secret_to_public (private_key: lbytes 32) : option (lbytes 64)
val secret_to_public (private_key: lbytes 32) : option (lbytes 64)
let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 11, "end_line": 164, "start_col": 0, "start_line": 158 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
private_key: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.Some", "Spec.K256.PointOps.point_store", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_g", "Prims.bool", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_AmpAmp", "Prims.op_LessThan", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
false
false
false
false
false
let secret_to_public (private_key: lbytes 32) : option (lbytes 64) =
let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_verify_hashed_msg
val secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
val secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
let secp256k1_ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 59, "end_line": 247, "start_col": 0, "start_line": 245 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msgHash: Lib.ByteSequence.lbytes 32 -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Spec.K256.secp256k1_ecdsa_is_signature_normalized", "Prims.bool", "Spec.K256.ecdsa_verify_hashed_msg" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool =
if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
false
Spec.K256.fst
Spec.K256.pk_compressed_from_raw
val pk_compressed_from_raw (pk: lbytes 64) : lbytes 33
val pk_compressed_from_raw (pk: lbytes 64) : lbytes 33
let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 28, "end_line": 204, "start_col": 0, "start_line": 199 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
pk: Lib.ByteSequence.lbytes 64 -> Lib.ByteSequence.lbytes 33
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.create", "Lib.IntTypes.int_t", "Lib.IntTypes.u8", "Prims.bool", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Lib.ByteSequence.nat_from_bytes_be", "Lib.Sequence.lseq", "Prims.l_and", "Prims.eq2", "FStar.Seq.Base.seq", "Lib.Sequence.to_seq", "FStar.Seq.Base.slice", "Prims.op_Addition", "Prims.l_Forall", "Prims.nat", "Prims.b2t", "Prims.op_LessThan", "Prims.l_or", "FStar.Seq.Base.index", "Lib.Sequence.index", "Lib.Sequence.sub" ]
[]
false
false
false
false
false
let pk_compressed_from_raw (pk: lbytes 64) : lbytes 33 =
let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x
false
Spec.K256.fst
Spec.K256.pk_compressed_to_raw
val pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64)
val pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64)
let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 196, "start_col": 0, "start_line": 192 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
pk: Lib.ByteSequence.lbytes 33 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Spec.K256.PointOps.aff_point_decompress", "Spec.K256.PointOps.felem", "FStar.Pervasives.Native.Some", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_to_bytes_be", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Prims.l_and", "Prims.eq2", "FStar.Seq.Base.seq", "Lib.Sequence.to_seq", "FStar.Seq.Base.slice", "Prims.op_Addition", "Prims.l_Forall", "Prims.nat", "Prims.b2t", "Prims.op_LessThan", "Prims.l_or", "FStar.Seq.Base.index", "Lib.Sequence.index", "Lib.Sequence.sub" ]
[]
false
false
false
false
false
let pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64) =
let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_is_signature_normalized
val secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool
val secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool
let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 23, "end_line": 230, "start_col": 0, "start_line": 228 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Prims.op_AmpAmp", "Prims.op_LessThan", "Prims.op_LessThanOrEqual", "Prims.op_Division", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.sub", "Lib.ByteSequence.nat_from_bytes_be", "Lib.IntTypes.uint_t", "Prims.bool" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool =
let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_signature_normalize
val secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64)
val secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64)
let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 11, "end_line": 225, "start_col": 0, "start_line": 217 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive).
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
signature: Lib.ByteSequence.lbytes 64 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.Some", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Prims.l_and", "Prims.eq2", "Lib.Sequence.sub", "Lib.ByteSequence.nat_to_bytes_be", "Prims.l_Forall", "Prims.nat", "Prims.l_or", "Prims.b2t", "Prims.op_LessThanOrEqual", "Prims.op_LessThan", "Prims.op_Addition", "FStar.Seq.Base.index", "Lib.Sequence.to_seq", "Lib.Sequence.index", "Lib.Sequence.update_sub", "Lib.IntTypes.uint_t", "Prims.pow2", "Prims.op_Multiply", "Prims.op_Division", "Spec.K256.PointOps.q", "Prims.bool", "Prims.op_Modulus", "Prims.op_Subtraction", "FStar.Mul.op_Star", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_AmpAmp", "Lib.Sequence.length", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64) =
let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt else None
false
Spec.K256.fst
Spec.K256.secp256k1_ecdsa_sign_hashed_msg
val secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
val secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
{ "file_name": "specs/Spec.K256.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 16, "end_line": 237, "start_col": 0, "start_line": 233 }
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
{ "checked_file": "/", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
msgHash: Lib.ByteSequence.lbytes 32 -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_signature_normalize", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.K256.ecdsa_sign_hashed_msg" ]
[]
false
false
false
false
false
let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) =
let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
false
Vale.Stdcalls.X64.Fadd.fst
Vale.Stdcalls.X64.Fadd.fadd_e
val fadd_e : normal lowstar_fadd_t
val fadd_e : normal lowstar_fadd_t
let fadd_e //: normal lowstar_add1_t = as_normal_t #lowstar_fadd_t lowstar_fadd
{ "file_name": "vale/code/arch/x64/interop/Vale.Stdcalls.X64.Fadd.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 42, "end_line": 50, "start_col": 0, "start_line": 49 }
module Vale.Stdcalls.X64.Fadd open FStar.Mul #reset-options "--z3rlimit 50" let z3rlimit_hack x = () open FStar.HyperStack.ST module HS = FStar.HyperStack module B = LowStar.Buffer module DV = LowStar.BufferView.Down module UV = LowStar.BufferView.Up open Vale.Def.Types_s open Vale.Interop.Base module IX64 = Vale.Interop.X64 module VSig = Vale.AsLowStar.ValeSig module LSig = Vale.AsLowStar.LowStarSig module ME = Vale.X64.Memory module V = Vale.X64.Decls module IA = Vale.Interop.Assumptions module W = Vale.AsLowStar.Wrapper open Vale.X64.MemoryAdapters module VS = Vale.X64.State module MS = Vale.X64.Machine_s module FU = Vale.Curve25519.X64.FastUtil module FH = Vale.Curve25519.X64.FastHybrid module FW = Vale.Curve25519.X64.FastWide (* And here's the fadd wrapper itself *) let lowstar_add1 : lowstar_add1_t = assert_norm (List.length dom + List.length ([]<:list arg) <= 4); IX64.wrap_weak_stdcall code_add1 dom (W.mk_prediction code_add1 dom [] (add1_lemma code_add1 IA.win)) let add_scalar_e //: normal lowstar_add1_t = as_normal_t #lowstar_add1_t lowstar_add1 (* And here's the fadd wrapper itself *) let lowstar_fadd : lowstar_fadd_t = assert_norm (List.length fadd_dom + List.length ([]<:list arg) <= 4); IX64.wrap_weak_stdcall code_Fadd fadd_dom (W.mk_prediction code_Fadd fadd_dom [] (fadd_lemma code_Fadd IA.win))
{ "checked_file": "/", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.MemoryAdapters.fsti.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.Decls.fsti.checked", "Vale.Interop.X64.fsti.checked", "Vale.Interop.Base.fst.checked", "Vale.Interop.Assumptions.fst.checked", "Vale.Def.Types_s.fst.checked", "Vale.Curve25519.X64.FastWide.fsti.checked", "Vale.Curve25519.X64.FastUtil.fsti.checked", "Vale.Curve25519.X64.FastHybrid.fsti.checked", "Vale.AsLowStar.Wrapper.fsti.checked", "Vale.AsLowStar.ValeSig.fst.checked", "Vale.AsLowStar.LowStarSig.fst.checked", "prims.fst.checked", "LowStar.BufferView.Up.fsti.checked", "LowStar.BufferView.Down.fsti.checked", "LowStar.Buffer.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.fst.checked" ], "interface_file": true, "source_file": "Vale.Stdcalls.X64.Fadd.fst" }
[ { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastWide", "short_module": "FW" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastHybrid", "short_module": "FH" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastUtil", "short_module": "FU" }, { "abbrev": true, "full_module": "Vale.X64.Machine_s", "short_module": "MS" }, { "abbrev": true, "full_module": "Vale.X64.State", "short_module": "VS" }, { "abbrev": false, "full_module": "Vale.X64.MemoryAdapters", "short_module": null }, { "abbrev": true, "full_module": "Vale.AsLowStar.Wrapper", "short_module": "W" }, { "abbrev": true, "full_module": "Vale.Interop.Assumptions", "short_module": "IA" }, { "abbrev": true, "full_module": "Vale.X64.Decls", "short_module": "V" }, { "abbrev": true, "full_module": "Vale.X64.Memory", "short_module": "ME" }, { "abbrev": true, "full_module": "Vale.AsLowStar.LowStarSig", "short_module": "LSig" }, { "abbrev": true, "full_module": "Vale.AsLowStar.ValeSig", "short_module": "VSig" }, { "abbrev": true, "full_module": "Vale.Interop.X64", "short_module": "IX64" }, { "abbrev": false, "full_module": "Vale.Interop.Base", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": true, "full_module": "LowStar.BufferView.Up", "short_module": "UV" }, { "abbrev": true, "full_module": "LowStar.BufferView.Down", "short_module": "DV" }, { "abbrev": true, "full_module": "LowStar.Buffer", "short_module": "B" }, { "abbrev": true, "full_module": "FStar.HyperStack", "short_module": "HS" }, { "abbrev": false, "full_module": "FStar.HyperStack.ST", "short_module": null }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastWide", "short_module": "FW" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastHybrid", "short_module": "FH" }, { "abbrev": true, "full_module": "Vale.Curve25519.X64.FastUtil", "short_module": "FU" }, { "abbrev": true, "full_module": "Vale.X64.Machine_s", "short_module": "MS" }, { "abbrev": true, "full_module": "Vale.X64.State", "short_module": "VS" }, { "abbrev": false, "full_module": "Vale.X64.MemoryAdapters", "short_module": null }, { "abbrev": true, "full_module": "Vale.AsLowStar.Wrapper", "short_module": "W" }, { "abbrev": true, "full_module": "Vale.Interop.Assumptions", "short_module": "IA" }, { "abbrev": true, "full_module": "Vale.X64.Decls", "short_module": "V" }, { "abbrev": true, "full_module": "Vale.X64.Memory", "short_module": "ME" }, { "abbrev": true, "full_module": "Vale.AsLowStar.LowStarSig", "short_module": "LSig" }, { "abbrev": true, "full_module": "Vale.AsLowStar.ValeSig", "short_module": "VSig" }, { "abbrev": true, "full_module": "Vale.Interop.X64", "short_module": "IX64" }, { "abbrev": false, "full_module": "Vale.Interop.Base", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": true, "full_module": "LowStar.BufferView.Up", "short_module": "UV" }, { "abbrev": true, "full_module": "LowStar.BufferView.Down", "short_module": "DV" }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack", "short_module": "HS" }, { "abbrev": true, "full_module": "LowStar.Buffer", "short_module": "B" }, { "abbrev": false, "full_module": "FStar.HyperStack.ST", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Stdcalls.X64", "short_module": null }, { "abbrev": false, "full_module": "Vale.Stdcalls.X64", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Vale.Interop.Base.normal Vale.Stdcalls.X64.Fadd.lowstar_fadd_t
Prims.Tot
[ "total" ]
[]
[ "Vale.Stdcalls.X64.Fadd.as_normal_t", "Vale.Stdcalls.X64.Fadd.lowstar_fadd_t", "Vale.Stdcalls.X64.Fadd.lowstar_fadd" ]
[]
false
false
false
true
false
let fadd_e =
as_normal_t #lowstar_fadd_t lowstar_fadd
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.encryption_context
val encryption_context (cs:ciphersuite) : Type0
val encryption_context (cs:ciphersuite) : Type0
let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 112, "end_line": 331, "start_col": 0, "start_line": 331 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> Type0
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "FStar.Pervasives.Native.tuple4", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.exporter_secret_s" ]
[]
false
false
false
true
true
let encryption_context (cs: ciphersuite) =
key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.suite_id_kem
val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem)
val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem)
let suite_id_kem cs = Seq.append label_KEM (id_kem cs)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 34, "end_line": 49, "start_col": 0, "start_line": 48 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> Lib.ByteSequence.lbytes Spec.Agile.HPKE.size_suite_id_kem
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "FStar.Seq.Base.append", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Agile.HPKE.label_KEM", "Spec.Agile.HPKE.id_kem", "Lib.ByteSequence.lbytes", "Spec.Agile.HPKE.size_suite_id_kem" ]
[]
false
false
false
true
false
let suite_id_kem cs =
Seq.append label_KEM (id_kem cs)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.extract_and_expand_ctx_pred
val extract_and_expand_ctx_pred : cs: Spec.Agile.HPKE.ciphersuite -> ctx_length: Prims.nat -> Prims.bool
let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 113, "end_line": 112, "start_col": 0, "start_line": 111 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> ctx_length: Prims.nat -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Prims.nat", "Spec.Agile.HPKE.labeled_expand_info_length_pred", "Spec.Agile.HPKE.kem_hash_of_cs", "Prims.op_Addition", "Spec.Agile.HPKE.size_suite_id_kem", "Spec.Agile.HPKE.size_label_shared_secret", "Prims.bool" ]
[]
false
false
false
true
false
let extract_and_expand_ctx_pred (cs: ciphersuite) (ctx_length: nat) =
labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.extract_and_expand_dh_pred
val extract_and_expand_dh_pred : cs: Spec.Agile.HPKE.ciphersuite -> dh_length: Prims.nat -> Prims.bool
let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 106, "end_line": 109, "start_col": 0, "start_line": 108 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> dh_length: Prims.nat -> Prims.bool
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Prims.nat", "Spec.Agile.HPKE.labeled_extract_ikm_length_pred", "Spec.Agile.HPKE.kem_hash_of_cs", "Prims.op_Addition", "Spec.Agile.HPKE.size_suite_id_kem", "Spec.Agile.HPKE.size_label_eae_prk", "Prims.bool" ]
[]
false
false
false
true
false
let extract_and_expand_dh_pred (cs: ciphersuite) (dh_length: nat) =
labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.default_psk_id
val default_psk_id : Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
let default_psk_id = lbytes_empty
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 33, "end_line": 307, "start_col": 0, "start_line": 307 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes_empty" ]
[]
false
false
false
false
false
let default_psk_id =
lbytes_empty
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.deserialize_public_key
val deserialize_public_key: cs:ciphersuite -> pk:key_dh_public_s cs -> Tot (DH.serialized_point (kem_dh_of_cs cs))
val deserialize_public_key: cs:ciphersuite -> pk:key_dh_public_s cs -> Tot (DH.serialized_point (kem_dh_of_cs cs))
let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 29, "end_line": 131, "start_col": 0, "start_line": 128 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> pk: Spec.Agile.HPKE.key_dh_public_s cs -> Spec.Agile.DH.serialized_point (Spec.Agile.HPKE.kem_dh_of_cs cs)
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.key_dh_public_s", "Spec.Agile.HPKE.kem_dh_of_cs", "Lib.Sequence.sub", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Agile.HPKE.size_dh_public", "Spec.Agile.DH.serialized_point" ]
[]
false
false
false
false
false
let deserialize_public_key cs pk =
match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk | DH.DH_P256 -> sub pk 1 64
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.id_of_mode
val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier)
val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier)
let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3)
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 30, "end_line": 61, "start_col": 0, "start_line": 56 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
m: Spec.Agile.HPKE.mode -> Lib.ByteSequence.lbytes Spec.Agile.HPKE.size_mode_identifier
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.mode", "Lib.Sequence.create", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.IntTypes.u8", "Lib.ByteSequence.lbytes", "Spec.Agile.HPKE.size_mode_identifier" ]
[]
false
false
false
true
false
let id_of_mode m =
match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3)
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.default_psk
val default_psk : Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
let default_psk = lbytes_empty
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 30, "end_line": 306, "start_col": 0, "start_line": 306 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
Prims.Tot
[ "total" ]
[]
[ "Lib.ByteSequence.lbytes_empty" ]
[]
false
false
false
false
false
let default_psk =
lbytes_empty
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.key_of_ctx
val key_of_ctx : cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.key_aead_s cs
let key_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let key, _, _, _ = ctx in key
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 31, "end_line": 388, "start_col": 0, "start_line": 387 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false // key and nonce are zero-length if AEAD is Export-Only let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs val key_schedule: cs:ciphersuite -> m:mode -> shared_secret:key_kem_s cs -> info:info_s cs -> opsk:option (psk_s cs & psk_id_s cs) -> Pure (encryption_context cs) (requires verify_psk_inputs cs m opsk) (ensures fun _ -> True) #set-options "--z3rlimit 500 --fuel 0 --ifuel 2" let key_schedule_core (cs:ciphersuite) (m:mode) (shared_secret:key_kem_s cs) (info:info_s cs) (opsk:option (psk_s cs & psk_id_s cs)) : (lbytes (size_ks_ctx cs) & exporter_secret_s cs & (lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) = let (psk, psk_id) = match opsk with | None -> (default_psk, default_psk_id) | Some (psk, psk_id) -> (psk, psk_id) in let psk_id_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_psk_id_hash psk_id in let info_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_info_hash info in let context = build_context cs m psk_id_hash info_hash in let secret = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) shared_secret label_secret psk in let exporter_secret = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_exp context (size_kdf cs) in context, exporter_secret, secret let key_schedule_end (cs:ciphersuite) (m:mode) (context:lbytes (size_ks_ctx cs)) (exporter_secret:exporter_secret_s cs) (secret:(lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) : encryption_context cs = if is_valid_not_export_only_ciphersuite cs then ( let key = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_key context (size_aead_key cs) in let base_nonce = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_base_nonce context (size_aead_nonce cs) in (key, base_nonce, 0, exporter_secret) ) else ( (* if AEAD is Export-Only, then skip computation of key and base_nonce *) assert (size_aead_key cs = 0); assert (size_aead_nonce cs = 0); (lbytes_empty, lbytes_empty, 0, exporter_secret)) let key_schedule cs m shared_secret info opsk = let context, exporter_secret, secret = key_schedule_core cs m shared_secret info opsk in key_schedule_end cs m context exporter_secret secret
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 2, "max_fuel": 0, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 500, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.key_aead_s cs
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.encryption_context", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.exporter_secret_s" ]
[]
false
false
false
false
false
let key_of_ctx (cs: ciphersuite) (ctx: encryption_context cs) =
let key, _, _, _ = ctx in key
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.prepare_dh
val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32)
val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32)
let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 29, "end_line": 173, "start_col": 0, "start_line": 171 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0)
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> dh: Spec.Agile.DH.serialized_point (Spec.Agile.HPKE.kem_dh_of_cs cs) -> Lib.ByteSequence.lbytes 32
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.DH.serialized_point", "Spec.Agile.HPKE.kem_dh_of_cs", "Spec.Agile.HPKE.serialize_public_key", "Lib.Sequence.sub", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Agile.DH.size_public", "Lib.ByteSequence.lbytes" ]
[]
false
false
false
false
false
let prepare_dh cs dh =
match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32
false
Spec.Agile.HPKE.fst
Spec.Agile.HPKE.exp_sec_of_ctx
val exp_sec_of_ctx : cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.exporter_secret_s cs
let exp_sec_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, _, _, exp_sec = ctx in exp_sec
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "eb1badfa34c70b0bbe0fe24fe0f49fb1295c7872", "git_url": "https://github.com/project-everest/hacl-star.git", "project_name": "hacl-star" }
{ "end_col": 39, "end_line": 397, "start_col": 0, "start_line": 396 }
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false // key and nonce are zero-length if AEAD is Export-Only let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs val key_schedule: cs:ciphersuite -> m:mode -> shared_secret:key_kem_s cs -> info:info_s cs -> opsk:option (psk_s cs & psk_id_s cs) -> Pure (encryption_context cs) (requires verify_psk_inputs cs m opsk) (ensures fun _ -> True) #set-options "--z3rlimit 500 --fuel 0 --ifuel 2" let key_schedule_core (cs:ciphersuite) (m:mode) (shared_secret:key_kem_s cs) (info:info_s cs) (opsk:option (psk_s cs & psk_id_s cs)) : (lbytes (size_ks_ctx cs) & exporter_secret_s cs & (lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) = let (psk, psk_id) = match opsk with | None -> (default_psk, default_psk_id) | Some (psk, psk_id) -> (psk, psk_id) in let psk_id_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_psk_id_hash psk_id in let info_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_info_hash info in let context = build_context cs m psk_id_hash info_hash in let secret = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) shared_secret label_secret psk in let exporter_secret = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_exp context (size_kdf cs) in context, exporter_secret, secret let key_schedule_end (cs:ciphersuite) (m:mode) (context:lbytes (size_ks_ctx cs)) (exporter_secret:exporter_secret_s cs) (secret:(lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) : encryption_context cs = if is_valid_not_export_only_ciphersuite cs then ( let key = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_key context (size_aead_key cs) in let base_nonce = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_base_nonce context (size_aead_nonce cs) in (key, base_nonce, 0, exporter_secret) ) else ( (* if AEAD is Export-Only, then skip computation of key and base_nonce *) assert (size_aead_key cs = 0); assert (size_aead_nonce cs = 0); (lbytes_empty, lbytes_empty, 0, exporter_secret)) let key_schedule cs m shared_secret info opsk = let context, exporter_secret, secret = key_schedule_core cs m shared_secret info opsk in key_schedule_end cs m context exporter_secret secret let key_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let key, _, _, _ = ctx in key let base_nonce_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, base_nonce, _, _ = ctx in base_nonce let seq_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, _, seq, _ = ctx in seq
{ "checked_file": "/", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 2, "max_fuel": 0, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 500, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
false
cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.exporter_secret_s cs
Prims.Tot
[ "total" ]
[]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.encryption_context", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.exporter_secret_s" ]
[]
false
false
false
false
false
let exp_sec_of_ctx (cs: ciphersuite) (ctx: encryption_context cs) =
let _, _, _, exp_sec = ctx in exp_sec
false