effect
stringclasses
48 values
original_source_type
stringlengths
0
23k
opens_and_abbrevs
listlengths
2
92
isa_cross_project_example
bool
1 class
source_definition
stringlengths
9
57.9k
partial_definition
stringlengths
7
23.3k
is_div
bool
2 classes
is_type
null
is_proof
bool
2 classes
completed_definiton
stringlengths
1
250k
dependencies
dict
effect_flags
sequencelengths
0
2
ideal_premises
sequencelengths
0
236
mutual_with
sequencelengths
0
11
file_context
stringlengths
0
407k
interleaved
bool
1 class
is_simply_typed
bool
2 classes
file_name
stringlengths
5
48
vconfig
dict
is_simple_lemma
null
source_type
stringlengths
10
23k
proof_features
sequencelengths
0
1
name
stringlengths
8
95
source
dict
verbose_type
stringlengths
1
7.42k
source_range
dict
Prims.Tot
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let labeled_expand_max_length_info (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v (Hash.max_input_length a) - Spec.Hash.Definitions.hash_length a - 2 - size_label_version - size_suite_id - size_local_label - 1 - Spec.Hash.Definitions.block_length a)
let labeled_expand_max_length_info (a: hash_algorithm) (size_suite_id size_local_label: size_nat) =
false
null
false
match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v (Hash.max_input_length a) - Spec.Hash.Definitions.hash_length a - 2 - size_label_version - size_suite_id - size_local_label - 1 - Spec.Hash.Definitions.block_length a)
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[ "Spec.Agile.HPKE.hash_algorithm", "Lib.IntTypes.size_nat", "FStar.Pervasives.Native.None", "Prims.int", "Spec.Hash.Definitions.hash_alg", "FStar.Pervasives.Native.Some", "Prims.op_Subtraction", "FStar.Pervasives.Native.__proj__Some__item__v", "Prims.pos", "Spec.Hash.Definitions.max_input_length", "Spec.Hash.Definitions.hash_length", "Spec.Agile.HPKE.size_label_version", "Spec.Hash.Definitions.block_length", "FStar.Pervasives.Native.option" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs) inline_for_extraction let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1 // Need the additional byte for representation inline_for_extraction let size_dh_serialized (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 inline_for_extraction let size_kem_kdf (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kem_key (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kdf (cs:ciphersuite): size_nat = Hash.hash_length (hash_of_cs cs) let max_seq (cs:ciphersuite): nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> pow2 (8*(size_aead_nonce cs)) - 1 inline_for_extraction let size_suite_id_kem: size_nat = size_label_KEM + 2 inline_for_extraction let size_suite_id_hpke: size_nat = size_label_HPKE + 6 inline_for_extraction let size_mode_identifier: size_nat = 1 let size_ks_ctx (cs:ciphersuite): size_nat = size_mode_identifier + 2*(size_kdf cs) let labeled_extract_ikm_length_pred (a:hash_algorithm) (ikm_length:nat) = HKDF.extract_ikm_length_pred a (size_label_version + ikm_length) let labeled_expand_info_length_pred (a:hash_algorithm) (info_length:nat) = HKDF.expand_info_length_pred a (2 + size_label_version + info_length) let pow2_61_1 : _:unit{pow2 61 - 1 == 2305843009213693951} = assert_norm(pow2 61 - 1 == 2305843009213693951) let pow2_125_1 : _:unit{pow2 125 - 1 == 42535295865117307932921825928971026431} = assert_norm(pow2 125 - 1 == 42535295865117307932921825928971026431) let labeled_extract_max_length_ikm (a:hash_algorithm) (size_suite_id:size_nat) (size_local_label:size_nat) = match a with | Hash.SHA3_256 -> None | _ -> Some (Some?.v(Hash.max_input_length a) - size_label_version - size_suite_id - size_local_label - Spec.Hash.Definitions.block_length a)
false
true
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val labeled_expand_max_length_info : a: Spec.Agile.HPKE.hash_algorithm -> size_suite_id: Lib.IntTypes.size_nat -> size_local_label: Lib.IntTypes.size_nat -> FStar.Pervasives.Native.option Prims.int
[]
Spec.Agile.HPKE.labeled_expand_max_length_info
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Agile.HPKE.hash_algorithm -> size_suite_id: Lib.IntTypes.size_nat -> size_local_label: Lib.IntTypes.size_nat -> FStar.Pervasives.Native.option Prims.int
{ "end_col": 190, "end_line": 333, "start_col": 2, "start_line": 331 }
Prims.Tot
val size_label_sk:size_nat
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let size_label_sk: size_nat = 2
val size_label_sk:size_nat let size_label_sk:size_nat =
false
null
false
2
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk"
false
false
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val size_label_sk:size_nat
[]
Spec.Agile.HPKE.size_label_sk
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
n: Prims.nat{n <= Prims.pow2 32 - 1}
{ "end_col": 31, "end_line": 247, "start_col": 30, "start_line": 247 }
Prims.Tot
val label_candidate_list:l: list uint8 {List.Tot.length l == size_label_candidate}
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l
val label_candidate_list:l: list uint8 {List.Tot.length l == size_label_candidate} let label_candidate_list:l: list uint8 {List.Tot.length l == size_label_candidate} =
false
null
false
[@@ inline_let ]let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm (List.Tot.length l == size_label_candidate); l
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[ "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.eq2", "Prims.nat", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Agile.HPKE.size_label_candidate", "Prims.list", "Prims.Cons", "Lib.IntTypes.u8", "Prims.Nil" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9
false
false
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val label_candidate_list:l: list uint8 {List.Tot.length l == size_label_candidate}
[]
Spec.Agile.HPKE.label_candidate_list
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
l: Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) {FStar.List.Tot.Base.length l == Spec.Agile.HPKE.size_label_candidate}
{ "end_col": 3, "end_line": 241, "start_col": 2, "start_line": 238 }
Prims.Tot
val size_mode_identifier:size_nat
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let size_mode_identifier: size_nat = 1
val size_mode_identifier:size_nat let size_mode_identifier:size_nat =
false
null
false
1
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs) inline_for_extraction let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1 // Need the additional byte for representation inline_for_extraction let size_dh_serialized (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 inline_for_extraction let size_kem_kdf (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kem_key (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kdf (cs:ciphersuite): size_nat = Hash.hash_length (hash_of_cs cs) let max_seq (cs:ciphersuite): nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> pow2 (8*(size_aead_nonce cs)) - 1 inline_for_extraction let size_suite_id_kem: size_nat = size_label_KEM + 2 inline_for_extraction let size_suite_id_hpke: size_nat = size_label_HPKE + 6
false
false
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val size_mode_identifier:size_nat
[]
Spec.Agile.HPKE.size_mode_identifier
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
n: Prims.nat{n <= Prims.pow2 32 - 1}
{ "end_col": 38, "end_line": 312, "start_col": 37, "start_line": 312 }
Prims.Tot
val size_aead_tag (cs: ciphersuite) : size_nat
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs)
val size_aead_tag (cs: ciphersuite) : size_nat let size_aead_tag (cs: ciphersuite) : size_nat =
false
null
false
match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs)
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.aead_of_cs", "Spec.Agile.AEAD.alg", "Spec.Agile.AEAD.tag_length", "Spec.Agile.HPKE.aead_alg_of", "Lib.IntTypes.size_nat" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction
false
true
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val size_aead_tag (cs: ciphersuite) : size_nat
[]
Spec.Agile.HPKE.size_aead_tag
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> Lib.IntTypes.size_nat
{ "end_col": 46, "end_line": 276, "start_col": 2, "start_line": 274 }
Prims.Tot
val size_dh_public (cs: ciphersuite) : size_nat
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1
val size_dh_public (cs: ciphersuite) : size_nat let size_dh_public (cs: ciphersuite) : size_nat =
false
null
false
match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.kem_dh_of_cs", "Spec.Agile.DH.size_public", "Spec.Agile.DH.DH_Curve25519", "Prims.op_Addition", "Spec.Agile.DH.DH_P256", "Lib.IntTypes.size_nat" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs)
false
true
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val size_dh_public (cs: ciphersuite) : size_nat
[]
Spec.Agile.HPKE.size_dh_public
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> Lib.IntTypes.size_nat
{ "end_col": 47, "end_line": 284, "start_col": 48, "start_line": 282 }
Prims.Tot
val size_ks_ctx (cs: ciphersuite) : size_nat
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let size_ks_ctx (cs:ciphersuite): size_nat = size_mode_identifier + 2*(size_kdf cs)
val size_ks_ctx (cs: ciphersuite) : size_nat let size_ks_ctx (cs: ciphersuite) : size_nat =
false
null
false
size_mode_identifier + 2 * (size_kdf cs)
{ "checked_file": "Spec.Agile.HPKE.fsti.checked", "dependencies": [ "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Agile.HPKE.fsti" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Prims.op_Addition", "Spec.Agile.HPKE.size_mode_identifier", "FStar.Mul.op_Star", "Spec.Agile.HPKE.size_kdf", "Lib.IntTypes.size_nat" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" type mode = | Base | PSK | Auth | AuthPSK let is_valid_kem = function | DH.DH_Curve25519, Hash.SHA2_256 | DH.DH_P256, Hash.SHA2_256 -> true | _,_ -> false noeq type aead = | Seal: alg:AEAD.alg -> aead | ExportOnly let is_valid_aead = function | Seal AEAD.AES128_GCM | Seal AEAD.AES256_GCM | Seal AEAD.CHACHA20_POLY1305 | ExportOnly -> true | _ -> false let is_valid_hash = function | Hash.SHA2_256 | Hash.SHA2_384 | Hash.SHA2_512 -> true | _ -> false let hash_algorithm = a:Hash.hash_alg{is_valid_hash a} let is_valid_ciphersuite (cs:DH.algorithm & hash_algorithm & aead & Hash.hash_alg) : bool = let kem_dh, kem_hash, aead, hash = cs in (is_valid_kem (kem_dh, kem_hash)) && (is_valid_aead aead) && (is_valid_hash hash) let ciphersuite = cs:(DH.algorithm & hash_algorithm & aead & Hash.hash_alg){is_valid_ciphersuite cs} inline_for_extraction let kem_dh_of_cs (cs:ciphersuite) : DH.algorithm = let (c,_,_,_) = cs in c inline_for_extraction let kem_hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,h,_,_) = cs in h inline_for_extraction let aead_of_cs (cs:ciphersuite) : aead = let (_,_,a,_) = cs in a inline_for_extraction let hash_of_cs (cs:ciphersuite) : hash_algorithm = let (_,_,_,h) = cs in h let is_valid_not_export_only_ciphersuite (cs:ciphersuite) : bool = match aead_of_cs cs with | ExportOnly -> false | Seal _ -> true let ciphersuite_not_export_only = cs:ciphersuite{is_valid_not_export_only_ciphersuite cs} inline_for_extraction let aead_alg_of (cs:ciphersuite_not_export_only) = match aead_of_cs cs with | Seal alg -> alg /// Constants for HPKE labels /// /// The code for the following constants was generated /// with the script make_hpke_constants.py. Ultimately, /// this should be rewritten in Meta-F*. The idea is to /// write a tactic `mk_label` that inspects a string /// character by character, and generates the proper /// definition. It could be used as follows: /// %splice [label_version] (mk_label "HPKE-v1") /// Inspiration can be taken from Test.Lowstarize.fst. // generated: "HPKE-v1" inline_for_extraction let size_label_version: size_nat = 7 let label_version_list : l:list uint8{List.Tot.length l == size_label_version} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45; u8 0x2d; u8 0x76; u8 0x31] in assert_norm(List.Tot.length l == size_label_version); l let label_version : lbytes size_label_version = createL label_version_list // generated: "eae_prk" inline_for_extraction let size_label_eae_prk: size_nat = 7 let label_eae_prk_list : l:list uint8{List.Tot.length l == size_label_eae_prk} = [@inline_let] let l = [u8 0x65; u8 0x61; u8 0x65; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_eae_prk); l let label_eae_prk : lbytes size_label_eae_prk = createL label_eae_prk_list // generated: "KEM" inline_for_extraction let size_label_KEM: size_nat = 3 let label_KEM_list : l:list uint8{List.Tot.length l == size_label_KEM} = [@inline_let] let l = [u8 0x4b; u8 0x45; u8 0x4d] in assert_norm(List.Tot.length l == size_label_KEM); l let label_KEM : lbytes size_label_KEM = createL label_KEM_list // generated: "HPKE" inline_for_extraction let size_label_HPKE: size_nat = 4 let label_HPKE_list : l:list uint8{List.Tot.length l == size_label_HPKE} = [@inline_let] let l = [u8 0x48; u8 0x50; u8 0x4b; u8 0x45] in assert_norm(List.Tot.length l == size_label_HPKE); l let label_HPKE : lbytes size_label_HPKE = createL label_HPKE_list // generated: "shared_secret" inline_for_extraction let size_label_shared_secret: size_nat = 13 let label_shared_secret_list : l:list uint8{List.Tot.length l == size_label_shared_secret} = [@inline_let] let l = [u8 0x73; u8 0x68; u8 0x61; u8 0x72; u8 0x65; u8 0x64; u8 0x5f; u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_shared_secret); l let label_shared_secret : lbytes size_label_shared_secret = createL label_shared_secret_list // generated: "psk_id_hash" inline_for_extraction let size_label_psk_id_hash: size_nat = 11 let label_psk_id_hash_list : l:list uint8{List.Tot.length l == size_label_psk_id_hash} = [@inline_let] let l = [u8 0x70; u8 0x73; u8 0x6b; u8 0x5f; u8 0x69; u8 0x64; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_psk_id_hash); l let label_psk_id_hash : lbytes size_label_psk_id_hash = createL label_psk_id_hash_list // generated: "info_hash" inline_for_extraction let size_label_info_hash: size_nat = 9 let label_info_hash_list : l:list uint8{List.Tot.length l == size_label_info_hash} = [@inline_let] let l = [u8 0x69; u8 0x6e; u8 0x66; u8 0x6f; u8 0x5f; u8 0x68; u8 0x61; u8 0x73; u8 0x68] in assert_norm(List.Tot.length l == size_label_info_hash); l let label_info_hash : lbytes size_label_info_hash = createL label_info_hash_list // generated: "secret" inline_for_extraction let size_label_secret: size_nat = 6 let label_secret_list : l:list uint8{List.Tot.length l == size_label_secret} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63; u8 0x72; u8 0x65; u8 0x74] in assert_norm(List.Tot.length l == size_label_secret); l let label_secret : lbytes size_label_secret = createL label_secret_list // generated: "key" inline_for_extraction let size_label_key: size_nat = 3 let label_key_list : l:list uint8{List.Tot.length l == size_label_key} = [@inline_let] let l = [u8 0x6b; u8 0x65; u8 0x79] in assert_norm(List.Tot.length l == size_label_key); l let label_key : lbytes size_label_key = createL label_key_list // generated: "base_nonce" inline_for_extraction let size_label_base_nonce: size_nat = 10 let label_base_nonce_list : l:list uint8{List.Tot.length l == size_label_base_nonce} = [@inline_let] let l = [u8 0x62; u8 0x61; u8 0x73; u8 0x65; u8 0x5f; u8 0x6e; u8 0x6f; u8 0x6e; u8 0x63; u8 0x65] in assert_norm(List.Tot.length l == size_label_base_nonce); l let label_base_nonce : lbytes size_label_base_nonce = createL label_base_nonce_list // generated: "exp" inline_for_extraction let size_label_exp: size_nat = 3 let label_exp_list : l:list uint8{List.Tot.length l == size_label_exp} = [@inline_let] let l = [u8 0x65; u8 0x78; u8 0x70] in assert_norm(List.Tot.length l == size_label_exp); l let label_exp : lbytes size_label_exp = createL label_exp_list // generated: "sec" inline_for_extraction let size_label_sec: size_nat = 3 let label_sec_list : l:list uint8{List.Tot.length l == size_label_sec} = [@inline_let] let l = [u8 0x73; u8 0x65; u8 0x63] in assert_norm(List.Tot.length l == size_label_sec); l let label_sec : lbytes size_label_sec = createL label_sec_list // generated: "dkp_prk" inline_for_extraction let size_label_dkp_prk: size_nat = 7 let label_dkp_prk_list : l:list uint8{List.Tot.length l == size_label_dkp_prk} = [@inline_let] let l = [u8 0x64; u8 0x6b; u8 0x70; u8 0x5f; u8 0x70; u8 0x72; u8 0x6b] in assert_norm(List.Tot.length l == size_label_dkp_prk); l let label_dkp_prk : lbytes size_label_dkp_prk = createL label_dkp_prk_list // generated: "candidate" inline_for_extraction let size_label_candidate: size_nat = 9 let label_candidate_list : l:list uint8{List.Tot.length l == size_label_candidate} = [@inline_let] let l = [u8 0x63; u8 0x61; u8 0x6e; u8 0x64; u8 0x69; u8 0x64; u8 0x61; u8 0x74; u8 0x65] in assert_norm(List.Tot.length l == size_label_candidate); l let label_candidate : lbytes size_label_candidate = createL label_candidate_list // generated: "sk" inline_for_extraction let size_label_sk: size_nat = 2 let label_sk_list : l:list uint8{List.Tot.length l == size_label_sk} = [@inline_let] let l = [u8 0x73; u8 0x6b] in assert_norm(List.Tot.length l == size_label_sk); l let label_sk : lbytes size_label_sk = createL label_sk_list /// /// Constants sizes /// inline_for_extraction let size_aead_nonce (cs:ciphersuite): size_nat = assert_norm (8 * 12 <= pow2 64 - 1); match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> 12 inline_for_extraction let size_aead_key (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.key_length (aead_alg_of cs) inline_for_extraction let size_aead_tag (cs:ciphersuite): size_nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> AEAD.tag_length (aead_alg_of cs) inline_for_extraction let size_dh_key (cs:ciphersuite): size_nat = DH.size_key (kem_dh_of_cs cs) inline_for_extraction let size_dh_public (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 + 1 // Need the additional byte for representation inline_for_extraction let size_dh_serialized (cs:ciphersuite): size_nat = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> DH.size_public DH.DH_Curve25519 | DH.DH_P256 -> DH.size_public DH.DH_P256 inline_for_extraction let size_kem_kdf (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kem_key (cs:ciphersuite): size_nat = Hash.hash_length (kem_hash_of_cs cs) inline_for_extraction let size_kdf (cs:ciphersuite): size_nat = Hash.hash_length (hash_of_cs cs) let max_seq (cs:ciphersuite): nat = match aead_of_cs cs with | ExportOnly -> 0 | Seal _ -> pow2 (8*(size_aead_nonce cs)) - 1 inline_for_extraction let size_suite_id_kem: size_nat = size_label_KEM + 2 inline_for_extraction let size_suite_id_hpke: size_nat = size_label_HPKE + 6 inline_for_extraction let size_mode_identifier: size_nat = 1
false
true
Spec.Agile.HPKE.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 1, "max_fuel": 0, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 20, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val size_ks_ctx (cs: ciphersuite) : size_nat
[]
Spec.Agile.HPKE.size_ks_ctx
{ "file_name": "specs/Spec.Agile.HPKE.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> Lib.IntTypes.size_nat
{ "end_col": 83, "end_line": 314, "start_col": 45, "start_line": 314 }
Prims.Tot
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k
let pow_point (k: nat) (p: S.aff_point_c) =
false
null
false
LE.pow S.mk_ed25519_comm_monoid p k
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Prims.nat", "Spec.Ed25519.aff_point_c", "Lib.Exponentiation.Definition.pow", "Spec.Ed25519.mk_ed25519_comm_monoid" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pow_point : k: Prims.nat -> p: Spec.Ed25519.aff_point_c -> Spec.Ed25519.aff_point_c
[]
Hacl.Ed25519.PrecompTable.pow_point
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
k: Prims.nat -> p: Spec.Ed25519.aff_point_c -> Spec.Ed25519.aff_point_c
{ "end_col": 37, "end_line": 52, "start_col": 2, "start_line": 52 }
Prims.Tot
val g_pow2_64:S.aff_point
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let g_pow2_64 : S.aff_point = pow_point (pow2 64) g_aff
val g_pow2_64:S.aff_point let g_pow2_64:S.aff_point =
false
null
false
pow_point (pow2 64) g_aff
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Hacl.Ed25519.PrecompTable.pow_point", "Prims.pow2", "Hacl.Ed25519.PrecompTable.g_aff" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k //---------------- noextract let g_aff : S.aff_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g // [pow2 64]G
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val g_pow2_64:S.aff_point
[]
Hacl.Ed25519.PrecompTable.g_pow2_64
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Ed25519.PointOps.aff_point
{ "end_col": 55, "end_line": 63, "start_col": 30, "start_line": 63 }
Prims.Tot
val g_c:S.ext_point_c
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g
val g_c:S.ext_point_c let g_c:S.ext_point_c =
false
null
false
Spec.Ed25519.Lemmas.g_is_on_curve (); S.g
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Spec.Ed25519.PointOps.g", "Prims.unit", "Spec.Ed25519.Lemmas.g_is_on_curve" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val g_c:S.ext_point_c
[]
Hacl.Ed25519.PrecompTable.g_c
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Ed25519.ext_point_c
{ "end_col": 5, "end_line": 47, "start_col": 2, "start_line": 46 }
Prims.Tot
val g_pow2_192:S.aff_point
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let g_pow2_192 : S.aff_point = pow_point (pow2 192) g_aff
val g_pow2_192:S.aff_point let g_pow2_192:S.aff_point =
false
null
false
pow_point (pow2 192) g_aff
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Hacl.Ed25519.PrecompTable.pow_point", "Prims.pow2", "Hacl.Ed25519.PrecompTable.g_aff" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k //---------------- noextract let g_aff : S.aff_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g // [pow2 64]G noextract let g_pow2_64 : S.aff_point = pow_point (pow2 64) g_aff // [pow2 128]G noextract let g_pow2_128 : S.aff_point = pow_point (pow2 128) g_aff // [pow2 192]G
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val g_pow2_192:S.aff_point
[]
Hacl.Ed25519.PrecompTable.g_pow2_192
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Ed25519.PointOps.aff_point
{ "end_col": 57, "end_line": 71, "start_col": 31, "start_line": 71 }
Prims.Tot
val g_pow2_128:S.aff_point
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let g_pow2_128 : S.aff_point = pow_point (pow2 128) g_aff
val g_pow2_128:S.aff_point let g_pow2_128:S.aff_point =
false
null
false
pow_point (pow2 128) g_aff
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Hacl.Ed25519.PrecompTable.pow_point", "Prims.pow2", "Hacl.Ed25519.PrecompTable.g_aff" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k //---------------- noextract let g_aff : S.aff_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g // [pow2 64]G noextract let g_pow2_64 : S.aff_point = pow_point (pow2 64) g_aff // [pow2 128]G
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val g_pow2_128:S.aff_point
[]
Hacl.Ed25519.PrecompTable.g_pow2_128
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Ed25519.PointOps.aff_point
{ "end_col": 57, "end_line": 67, "start_col": 31, "start_line": 67 }
Prims.Tot
val g_aff:S.aff_point_c
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let g_aff : S.aff_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g
val g_aff:S.aff_point_c let g_aff:S.aff_point_c =
false
null
false
Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Spec.Ed25519.PointOps.to_aff_point", "Spec.Ed25519.PointOps.g", "Prims.unit", "Spec.Ed25519.Lemmas.g_is_on_curve" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k //---------------- noextract
false
true
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val g_aff:S.aff_point_c
[]
Hacl.Ed25519.PrecompTable.g_aff
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Ed25519.aff_point_c
{ "end_col": 20, "end_line": 59, "start_col": 2, "start_line": 58 }
Prims.Tot
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let precomp_table_acc_inv (p:S.aff_point_c) (table_len:nat{table_len * 20 <= max_size_t}) (table:LSeq.lseq uint64 (table_len * 20)) (j:nat{j < table_len}) = Math.Lemmas.lemma_mult_lt_right 20 j table_len; Math.Lemmas.lemma_mult_le_right 20 (j + 1) table_len; let bj = LSeq.sub table (j * 20) 20 in F51.linv bj /\ refl bj == pow_point j p
let precomp_table_acc_inv (p: S.aff_point_c) (table_len: nat{table_len * 20 <= max_size_t}) (table: LSeq.lseq uint64 (table_len * 20)) (j: nat{j < table_len}) =
false
null
false
Math.Lemmas.lemma_mult_lt_right 20 j table_len; Math.Lemmas.lemma_mult_le_right 20 (j + 1) table_len; let bj = LSeq.sub table (j * 20) 20 in F51.linv bj /\ refl bj == pow_point j p
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Spec.Ed25519.aff_point_c", "Prims.nat", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Lib.IntTypes.max_size_t", "Lib.Sequence.lseq", "Lib.IntTypes.uint64", "Prims.op_LessThan", "Prims.l_and", "Hacl.Impl.Ed25519.Field51.linv", "Prims.eq2", "Hacl.Impl.Ed25519.Group.refl", "Hacl.Ed25519.PrecompTable.pow_point", "Lib.IntTypes.int_t", "Lib.IntTypes.U64", "Lib.IntTypes.SEC", "FStar.Seq.Base.seq", "Lib.Sequence.to_seq", "FStar.Seq.Base.slice", "Prims.op_Multiply", "Prims.op_Addition", "Prims.l_Forall", "Prims.l_or", "FStar.Seq.Base.index", "Lib.Sequence.index", "Lib.Sequence.sub", "Prims.unit", "FStar.Math.Lemmas.lemma_mult_le_right", "FStar.Math.Lemmas.lemma_mult_lt_right", "Prims.logical" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; } inline_for_extraction noextract let g_c : S.ext_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.g inline_for_extraction noextract let pow_point (k:nat) (p:S.aff_point_c) = LE.pow S.mk_ed25519_comm_monoid p k //---------------- noextract let g_aff : S.aff_point_c = Spec.Ed25519.Lemmas.g_is_on_curve (); S.to_aff_point S.g // [pow2 64]G noextract let g_pow2_64 : S.aff_point = pow_point (pow2 64) g_aff // [pow2 128]G noextract let g_pow2_128 : S.aff_point = pow_point (pow2 128) g_aff // [pow2 192]G noextract let g_pow2_192 : S.aff_point = pow_point (pow2 192) g_aff inline_for_extraction noextract val ext_g_pow2_64_lseq : LSeq.lseq uint64 20 inline_for_extraction noextract val ext_g_pow2_128_lseq : LSeq.lseq uint64 20 inline_for_extraction noextract val ext_g_pow2_192_lseq : LSeq.lseq uint64 20 val ext_g_pow2_64_lseq_lemma: unit -> Lemma (F51.linv ext_g_pow2_64_lseq /\ refl ext_g_pow2_64_lseq == g_pow2_64) val ext_g_pow2_128_lseq_lemma: unit -> Lemma (F51.linv ext_g_pow2_128_lseq /\ refl ext_g_pow2_128_lseq == g_pow2_128) val ext_g_pow2_192_lseq_lemma: unit -> Lemma (F51.linv ext_g_pow2_192_lseq /\ refl ext_g_pow2_192_lseq == g_pow2_192) inline_for_extraction val mk_ext_g_pow2_64: unit -> StackInline (lbuffer uint64 20ul) (requires fun _ -> True) (ensures fun h0 b h1 -> live h1 b /\ stack_allocated b h0 h1 ext_g_pow2_64_lseq) inline_for_extraction val mk_ext_g_pow2_128: unit -> StackInline (lbuffer uint64 20ul) (requires fun _ -> True) (ensures fun h0 b h1 -> live h1 b /\ stack_allocated b h0 h1 ext_g_pow2_128_lseq) inline_for_extraction val mk_ext_g_pow2_192: unit -> StackInline (lbuffer uint64 20ul) (requires fun _ -> True) (ensures fun h0 b h1 -> live h1 b /\ stack_allocated b h0 h1 ext_g_pow2_192_lseq) //---------------- unfold let precomp_table_acc_inv (p:S.aff_point_c) (table_len:nat{table_len * 20 <= max_size_t}) (table:LSeq.lseq uint64 (table_len * 20)) (j:nat{j < table_len})
false
false
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val precomp_table_acc_inv : p: Spec.Ed25519.aff_point_c -> table_len: Prims.nat{table_len * 20 <= Lib.IntTypes.max_size_t} -> table: Lib.Sequence.lseq Lib.IntTypes.uint64 (table_len * 20) -> j: Prims.nat{j < table_len} -> Prims.logical
[]
Hacl.Ed25519.PrecompTable.precomp_table_acc_inv
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
p: Spec.Ed25519.aff_point_c -> table_len: Prims.nat{table_len * 20 <= Lib.IntTypes.max_size_t} -> table: Lib.Sequence.lseq Lib.IntTypes.uint64 (table_len * 20) -> j: Prims.nat{j < table_len} -> Prims.logical
{ "end_col": 41, "end_line": 118, "start_col": 2, "start_line": 115 }
Prims.Tot
val mk_ed25519_precomp_base_table:SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul
[ { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Curve25519", "short_module": "SC" }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.Ed25519.PrecompTable", "short_module": "SPTE" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable256", "short_module": "SPT256" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "LM" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Impl.Ed25519.Group", "short_module": null }, { "abbrev": true, "full_module": "Spec.Ed25519", "short_module": "S" }, { "abbrev": true, "full_module": "Hacl.Spec.PrecompBaseTable", "short_module": "SPT" }, { "abbrev": true, "full_module": "Hacl.Impl.Exponentiation", "short_module": "BE" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation.Definition", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.Sequence", "short_module": "LSeq" }, { "abbrev": true, "full_module": "Hacl.Impl.Ed25519.Field51", "short_module": "F51" }, { "abbrev": false, "full_module": "Hacl.Bignum25519", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.All", "short_module": null }, { "abbrev": true, "full_module": "FStar.HyperStack.ST", "short_module": "ST" }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Ed25519", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let mk_ed25519_precomp_base_table: SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul = { SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl; }
val mk_ed25519_precomp_base_table:SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul let mk_ed25519_precomp_base_table:SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul =
false
null
false
{ SPT.concr_ops = S.mk_ed25519_concrete_ops; SPT.to_cm = mk_to_ed25519_comm_monoid; SPT.to_list = ext_point_to_list; SPT.lemma_refl = lemma_refl }
{ "checked_file": "Hacl.Ed25519.PrecompTable.fsti.checked", "dependencies": [ "Spec.Exponentiation.fsti.checked", "Spec.Ed25519.Lemmas.fsti.checked", "Spec.Ed25519.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.Definition.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.PrecompBaseTable.fsti.checked", "Hacl.Impl.Exponentiation.fsti.checked", "Hacl.Impl.Ed25519.Group.fst.checked", "Hacl.Impl.Ed25519.Field51.fst.checked", "Hacl.Bignum25519.fsti.checked", "FStar.UInt32.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.All.fst.checked" ], "interface_file": false, "source_file": "Hacl.Ed25519.PrecompTable.fsti" }
[ "total" ]
[ "Hacl.Spec.PrecompBaseTable.Mkmk_precomp_base_table", "Spec.Ed25519.ext_point_c", "Lib.IntTypes.U64", "FStar.UInt32.uint_to_t", "Spec.Ed25519.mk_ed25519_concrete_ops", "Hacl.Impl.Ed25519.Group.mk_to_ed25519_comm_monoid", "Hacl.Ed25519.PrecompTable.ext_point_to_list", "Hacl.Ed25519.PrecompTable.lemma_refl" ]
[]
module Hacl.Ed25519.PrecompTable module ST = FStar.HyperStack.ST open FStar.HyperStack.All open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum25519 module F51 = Hacl.Impl.Ed25519.Field51 module LSeq = Lib.Sequence module LE = Lib.Exponentiation.Definition module SE = Spec.Exponentiation module BE = Hacl.Impl.Exponentiation module SPT = Hacl.Spec.PrecompBaseTable module S = Spec.Ed25519 include Hacl.Impl.Ed25519.Group #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract val ext_point_to_list: p:S.ext_point_c -> x:list uint64{FStar.List.Tot.length x = 20 /\ mk_to_ed25519_comm_monoid.BE.linv (Seq.seq_of_list x)} val lemma_refl: x:S.ext_point_c -> Lemma (S.mk_ed25519_concrete_ops.SE.to.SE.refl x == mk_to_ed25519_comm_monoid.BE.refl (Seq.seq_of_list (ext_point_to_list x))) inline_for_extraction noextract
false
false
Hacl.Ed25519.PrecompTable.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val mk_ed25519_precomp_base_table:SPT.mk_precomp_base_table S.ext_point_c U64 20ul 0ul
[]
Hacl.Ed25519.PrecompTable.mk_ed25519_precomp_base_table
{ "file_name": "code/ed25519/Hacl.Ed25519.PrecompTable.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Hacl.Spec.PrecompBaseTable.mk_precomp_base_table Spec.Ed25519.ext_point_c Lib.IntTypes.U64 (FStar.UInt32.uint_to_t 20 <: FStar.UInt32.t) (FStar.UInt32.uint_to_t 0 <: FStar.UInt32.t)
{ "end_col": 30, "end_line": 40, "start_col": 2, "start_line": 37 }
Prims.Tot
[ { "abbrev": true, "full_module": "Hacl.Spec.Bignum.ModInvLimb", "short_module": "S" }, { "abbrev": false, "full_module": "Hacl.Bignum.Definitions", "short_module": null }, { "abbrev": false, "full_module": "Lib.Buffer", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack.ST", "short_module": null }, { "abbrev": false, "full_module": "FStar.HyperStack", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Hacl.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let mod_inv_limb_st (t:limb_t) = n0:limb t -> Stack (limb t) (requires fun h -> True) (ensures fun h0 r h1 -> modifies0 h0 h1 /\ r == S.mod_inv_limb n0)
let mod_inv_limb_st (t: limb_t) =
false
null
false
n0: limb t -> Stack (limb t) (requires fun h -> True) (ensures fun h0 r h1 -> modifies0 h0 h1 /\ r == S.mod_inv_limb n0)
{ "checked_file": "Hacl.Bignum.ModInvLimb.fsti.checked", "dependencies": [ "prims.fst.checked", "Lib.IntTypes.fsti.checked", "Lib.Buffer.fsti.checked", "Hacl.Spec.Bignum.ModInvLimb.fsti.checked", "Hacl.Bignum.Definitions.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.HyperStack.ST.fsti.checked", "FStar.HyperStack.fst.checked" ], "interface_file": false, "source_file": "Hacl.Bignum.ModInvLimb.fsti" }
[ "total" ]
[ "Hacl.Bignum.Definitions.limb_t", "Hacl.Bignum.Definitions.limb", "FStar.Monotonic.HyperStack.mem", "Prims.l_True", "Prims.l_and", "Lib.Buffer.modifies0", "Prims.eq2", "Hacl.Spec.Bignum.Definitions.limb", "Hacl.Spec.Bignum.ModInvLimb.mod_inv_limb" ]
[]
module Hacl.Bignum.ModInvLimb open FStar.HyperStack open FStar.HyperStack.ST open FStar.Mul open Lib.IntTypes open Lib.Buffer open Hacl.Bignum.Definitions module S = Hacl.Spec.Bignum.ModInvLimb #reset-options "--z3rlimit 50 --fuel 0 --ifuel 0" inline_for_extraction noextract
false
true
Hacl.Bignum.ModInvLimb.fsti
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val mod_inv_limb_st : t: Hacl.Bignum.Definitions.limb_t -> Type0
[]
Hacl.Bignum.ModInvLimb.mod_inv_limb_st
{ "file_name": "code/bignum/Hacl.Bignum.ModInvLimb.fsti", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
t: Hacl.Bignum.Definitions.limb_t -> Type0
{ "end_col": 27, "end_line": 23, "start_col": 2, "start_line": 19 }
Prims.Tot
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let bytes_seed_a = 16
let bytes_seed_a =
false
null
false
16
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val bytes_seed_a : Prims.int
[]
Spec.Frodo.Params.bytes_seed_a
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Prims.int
{ "end_col": 21, "end_line": 59, "start_col": 19, "start_line": 59 }
Prims.Tot
val bytes_pkhash (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a
val bytes_pkhash (a: frodo_alg) : size_pos let bytes_pkhash (a: frodo_alg) : size_pos =
false
null
false
crypto_bytes a
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Spec.Frodo.Params.crypto_bytes", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val bytes_pkhash (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.bytes_pkhash
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 16, "end_line": 62, "start_col": 2, "start_line": 62 }
Prims.Tot
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let params_nbar = 8
let params_nbar =
false
null
false
8
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val params_nbar : Prims.int
[]
Spec.Frodo.Params.params_nbar
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Prims.int
{ "end_col": 19, "end_line": 58, "start_col": 18, "start_line": 58 }
Prims.Tot
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen
let frodo_shake_st =
false
null
false
inputByteLen: nat -> input: bytes{length input == inputByteLen} -> outputByteLen: size_nat -> lbytes outputByteLen
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Prims.nat", "Lib.ByteSequence.bytes", "Prims.eq2", "Lib.Sequence.length", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val frodo_shake_st : Type0
[]
Spec.Frodo.Params.frodo_shake_st
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Type0
{ "end_col": 25, "end_line": 114, "start_col": 4, "start_line": 111 }
Prims.Tot
val frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes
val frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st let frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st =
false
null
false
match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_gen_a", "Spec.Frodo.Gen.frodo_gen_matrix_shake", "Spec.Frodo.Gen.frodo_gen_matrix_aes", "Spec.Frodo.Params.frodo_gen_matrix_st" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val frodo_gen_matrix (a: frodo_gen_a) : frodo_gen_matrix_st
[]
Spec.Frodo.Params.frodo_gen_matrix
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_gen_a -> Spec.Frodo.Params.frodo_gen_matrix_st
{ "end_col": 49, "end_line": 135, "start_col": 2, "start_line": 133 }
Prims.Tot
val frodo_shake (a: frodo_alg) : frodo_shake_st
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256
val frodo_shake (a: frodo_alg) : frodo_shake_st let frodo_shake (a: frodo_alg) : frodo_shake_st =
false
null
false
match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Spec.SHA3.shake128", "Spec.SHA3.shake256", "Spec.Frodo.Params.frodo_shake_st" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val frodo_shake (a: frodo_alg) : frodo_shake_st
[]
Spec.Frodo.Params.frodo_shake
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Spec.Frodo.Params.frodo_shake_st
{ "end_col": 46, "end_line": 121, "start_col": 2, "start_line": 119 }
Prims.Tot
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n
let frodo_gen_matrix_st =
false
null
false
n: size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed: lbytes 16 -> matrix n n
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Lib.IntTypes.size_nat", "Prims.l_and", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Lib.IntTypes.max_size_t", "Lib.IntTypes.maxint", "Lib.IntTypes.U16", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Lib.ByteSequence.lbytes", "Spec.Matrix.matrix" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val frodo_gen_matrix_st : Type0
[]
Spec.Frodo.Params.frodo_gen_matrix_st
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Type0
{ "end_col": 15, "end_line": 128, "start_col": 4, "start_line": 126 }
Prims.Tot
val crypto_ciphertextbytes (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a
val crypto_ciphertextbytes (a: frodo_alg) : size_pos let crypto_ciphertextbytes (a: frodo_alg) : size_pos =
false
null
false
ct1bytes_len a + ct2bytes_len a
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.ct1bytes_len", "Spec.Frodo.Params.ct2bytes_len", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val crypto_ciphertextbytes (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.crypto_ciphertextbytes
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 33, "end_line": 86, "start_col": 2, "start_line": 86 }
Prims.Tot
val cdf_list_640:list uint16
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
val cdf_list_640:list uint16 let cdf_list_640:list uint16 =
false
null
false
[ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *)
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_list_640:list uint16
[]
Spec.Frodo.Params.cdf_list_640
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
{ "end_col": 59, "end_line": 141, "start_col": 2, "start_line": 140 }
Prims.Tot
val params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8}
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4
val params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8} let params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8} =
false
null
false
match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.l_and", "Prims.b2t", "Prims.op_LessThan", "Spec.Frodo.Params.params_logq", "Prims.op_LessThanOrEqual" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val params_extracted_bits (a: frodo_alg) : x: size_pos{x < params_logq a /\ x <= 8}
[]
Spec.Frodo.Params.params_extracted_bits
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x < Spec.Frodo.Params.params_logq a /\ x <= 8}
{ "end_col": 18, "end_line": 47, "start_col": 2, "start_line": 44 }
Prims.Tot
val cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a)
val cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a) let cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a) =
false
null
false
createL (cdf_list a)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.Sequence.createL", "Lib.IntTypes.uint16", "Spec.Frodo.Params.cdf_list", "Lib.Sequence.lseq", "Spec.Frodo.Params.cdf_table_len" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_table (a: frodo_alg) : lseq uint16 (cdf_table_len a)
[]
Spec.Frodo.Params.cdf_table
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.Sequence.lseq Lib.IntTypes.uint16 (Spec.Frodo.Params.cdf_table_len a)
{ "end_col": 22, "end_line": 175, "start_col": 2, "start_line": 175 }
Prims.Tot
val params_logq (a: frodo_alg) : x: size_pos{x <= 16}
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16
val params_logq (a: frodo_alg) : x: size_pos{x <= 16} let params_logq (a: frodo_alg) : x: size_pos{x <= 16} =
false
null
false
match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val params_logq (a: frodo_alg) : x: size_pos{x <= 16}
[]
Spec.Frodo.Params.params_logq
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x <= 16}
{ "end_col": 30, "end_line": 39, "start_col": 2, "start_line": 37 }
Prims.Tot
val crypto_secretkeybytes (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
val crypto_secretkeybytes (a: frodo_alg) : size_pos let crypto_secretkeybytes (a: frodo_alg) : size_pos =
false
null
false
crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.crypto_bytes", "Spec.Frodo.Params.crypto_publickeybytes", "Spec.Frodo.Params.secretmatrixbytes_len", "Spec.Frodo.Params.bytes_pkhash", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val crypto_secretkeybytes (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.crypto_secretkeybytes
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 85, "end_line": 83, "start_col": 2, "start_line": 83 }
Prims.Tot
val ct2bytes_len (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8)
val ct2bytes_len (a: frodo_alg) : size_pos let ct2bytes_len (a: frodo_alg) : size_pos =
false
null
false
params_logq a * (params_nbar * params_nbar / 8)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8)
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ct2bytes_len (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.ct2bytes_len
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 49, "end_line": 77, "start_col": 2, "start_line": 77 }
Prims.Tot
val secretmatrixbytes_len (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar
val secretmatrixbytes_len (a: frodo_alg) : size_pos let secretmatrixbytes_len (a: frodo_alg) : size_pos =
false
null
false
(2 * params_n a) * params_nbar
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_n", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8)
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secretmatrixbytes_len (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.secretmatrixbytes_len
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 30, "end_line": 71, "start_col": 2, "start_line": 71 }
Prims.Tot
val cdf_table_len (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7
val cdf_table_len (a: frodo_alg) : size_pos let cdf_table_len (a: frodo_alg) : size_pos =
false
null
false
match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_table_len (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.cdf_table_len
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 18, "end_line": 156, "start_col": 2, "start_line": 153 }
Prims.Tot
val crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32}
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
val crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32} let crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32} =
false
null
false
match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val crypto_bytes (a: frodo_alg) : x: size_pos{x <= 32}
[]
Spec.Frodo.Params.crypto_bytes
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x <= 32}
{ "end_col": 19, "end_line": 55, "start_col": 2, "start_line": 52 }
FStar.Pervasives.Lemma
val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16
val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a =
false
null
true
assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "lemma" ]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Math.Lemmas.pow2_plus", "Prims.unit", "FStar.Math.Lemmas.lemma_mult_lt_sqr", "Spec.Frodo.Params.params_n", "Lib.IntTypes.maxint", "Lib.IntTypes.U16", "Prims._assert", "Prims.b2t", "Prims.op_LessThanOrEqual" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16)
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16)
[]
Spec.Frodo.Params.params_n_sqr
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> FStar.Pervasives.Lemma (ensures Spec.Frodo.Params.params_n a * Spec.Frodo.Params.params_n a <= Lib.IntTypes.max_size_t /\ Spec.Frodo.Params.params_n a <= Lib.IntTypes.maxint Lib.IntTypes.U16)
{ "end_col": 29, "end_line": 106, "start_col": 2, "start_line": 104 }
Prims.Tot
val params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344}
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344
val params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344} let params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344} =
false
null
false
match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_pos", "Prims.l_and", "Prims.b2t", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Prims.op_LessThanOrEqual" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val params_n (a: frodo_alg) : x: size_pos{x % 8 = 0 /\ x <= 1344}
[]
Spec.Frodo.Params.params_n
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> x: Lib.IntTypes.size_pos{x % 8 = 0 /\ x <= 1344}
{ "end_col": 21, "end_line": 32, "start_col": 2, "start_line": 28 }
Prims.Tot
val cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a}
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344
val cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a} let cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a} =
false
null
false
match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Spec.Frodo.Params.cdf_list_640", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_Equality", "Prims.int", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_976", "Spec.Frodo.Params.cdf_list_1344", "Prims.list", "Lib.IntTypes.uint16", "Prims.eq2", "Prims.l_or", "Prims.op_GreaterThanOrEqual", "Prims.l_and", "Prims.op_GreaterThan", "Prims.op_LessThanOrEqual", "Lib.IntTypes.max_size_t", "Spec.Frodo.Params.cdf_table_len" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_list (a: frodo_alg) : x: list uint16 {List.Tot.length x == cdf_table_len a}
[]
Spec.Frodo.Params.cdf_list
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> x: Prims.list Lib.IntTypes.uint16 {FStar.List.Tot.Base.length x == Spec.Frodo.Params.cdf_table_len a}
{ "end_col": 17, "end_line": 170, "start_col": 2, "start_line": 161 }
Prims.Tot
val publicmatrixbytes_len (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8)
val publicmatrixbytes_len (a: frodo_alg) : size_pos let publicmatrixbytes_len (a: frodo_alg) : size_pos =
false
null
false
params_logq a * (params_n a * params_nbar / 8)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_n", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val publicmatrixbytes_len (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.publicmatrixbytes_len
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 48, "end_line": 68, "start_col": 2, "start_line": 68 }
Prims.Tot
val bytes_mu (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8
val bytes_mu (a: frodo_alg) : size_pos let bytes_mu (a: frodo_alg) : size_pos =
false
null
false
(params_extracted_bits a * params_nbar) * params_nbar / 8
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Division", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_extracted_bits", "Spec.Frodo.Params.params_nbar", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val bytes_mu (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.bytes_mu
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 57, "end_line": 65, "start_col": 2, "start_line": 65 }
Prims.Tot
val crypto_publickeybytes (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a
val crypto_publickeybytes (a: frodo_alg) : size_pos let crypto_publickeybytes (a: frodo_alg) : size_pos =
false
null
false
bytes_seed_a + publicmatrixbytes_len a
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "Prims.op_Addition", "Spec.Frodo.Params.bytes_seed_a", "Spec.Frodo.Params.publicmatrixbytes_len", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8)
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val crypto_publickeybytes (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.crypto_publickeybytes
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 40, "end_line": 80, "start_col": 2, "start_line": 80 }
Prims.Tot
val ct1bytes_len (a: frodo_alg) : size_pos
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8)
val ct1bytes_len (a: frodo_alg) : size_pos let ct1bytes_len (a: frodo_alg) : size_pos =
false
null
false
params_logq a * (params_nbar * params_n a / 8)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Spec.Frodo.Params.frodo_alg", "FStar.Mul.op_Star", "Spec.Frodo.Params.params_logq", "Prims.op_Division", "Spec.Frodo.Params.params_nbar", "Spec.Frodo.Params.params_n", "Lib.IntTypes.size_pos" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ct1bytes_len (a: frodo_alg) : size_pos
[]
Spec.Frodo.Params.ct1bytes_len
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> Lib.IntTypes.size_pos
{ "end_col": 48, "end_line": 74, "start_col": 2, "start_line": 74 }
Prims.Tot
val cdf_list_1344:list uint16
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ]
val cdf_list_1344:list uint16 let cdf_list_1344:list uint16 =
false
null
false
[u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767]
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_list_1344:list uint16
[]
Spec.Frodo.Params.cdf_list_1344
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
{ "end_col": 80, "end_line": 148, "start_col": 2, "start_line": 148 }
Prims.Tot
val cdf_list_976:list uint16
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
val cdf_list_976:list uint16 let cdf_list_976:list uint16 =
false
null
false
[ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ]
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "total" ]
[ "Prims.Cons", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Lib.IntTypes.u16", "Prims.Nil" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ]
false
true
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val cdf_list_976:list uint16
[]
Spec.Frodo.Params.cdf_list_976
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Prims.list (Lib.IntTypes.int_t Lib.IntTypes.U16 Lib.IntTypes.SEC)
{ "end_col": 37, "end_line": 145, "start_col": 2, "start_line": 144 }
FStar.Pervasives.Lemma
val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let lemma_cdf_list a i = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); lemma_cdf_list_640 i | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); lemma_cdf_list_976 i | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); lemma_cdf_list_1344 i
val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15) let lemma_cdf_list a i =
false
null
true
match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); lemma_cdf_list_640 i | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); lemma_cdf_list_976 i | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); lemma_cdf_list_1344 i
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "lemma" ]
[ "Spec.Frodo.Params.frodo_alg", "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "Spec.Frodo.Params.cdf_table_len", "Spec.Frodo.Params.lemma_cdf_list_640", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.op_Equality", "Prims.int", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_640", "Spec.Frodo.Params.lemma_cdf_list_976", "Spec.Frodo.Params.cdf_list_976", "Spec.Frodo.Params.lemma_cdf_list_1344", "Spec.Frodo.Params.cdf_list_1344" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15) let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15) val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15) let lemma_cdf_list_1344 i = assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15) val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val lemma_cdf_list: a:frodo_alg -> i:size_nat{i < cdf_table_len a} -> Lemma (uint_v (List.Tot.index (cdf_list a) i) < pow2 15)
[]
Spec.Frodo.Params.lemma_cdf_list
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.Frodo.Params.frodo_alg -> i: Lib.IntTypes.size_nat{i < Spec.Frodo.Params.cdf_table_len a} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index (Spec.Frodo.Params.cdf_list a) i) < Prims.pow2 15)
{ "end_col": 25, "end_line": 240, "start_col": 2, "start_line": 231 }
FStar.Pervasives.Lemma
val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let lemma_cdf_list_1344 i = assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15)
val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15) let lemma_cdf_list_1344 i =
false
null
true
assert_norm (List.Tot.length cdf_list_1344 = 7); assert_norm (uint_v (List.Tot.index cdf_list_1344 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_1344 6) < pow2 15)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "lemma" ]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_1344", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15) let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15) val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15)
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val lemma_cdf_list_1344: i:size_nat{i < List.Tot.length cdf_list_1344} -> Lemma (uint_v (List.Tot.index cdf_list_1344 i) < pow2 15)
[]
Spec.Frodo.Params.lemma_cdf_list_1344
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_1344} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_1344 i) < Prims.pow2 15)
{ "end_col": 65, "end_line": 224, "start_col": 2, "start_line": 217 }
FStar.Pervasives.Lemma
val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let lemma_cdf_list_976 i = assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15)
val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15) let lemma_cdf_list_976 i =
false
null
true
assert_norm (List.Tot.length cdf_list_976 = 11); assert_norm (uint_v (List.Tot.index cdf_list_976 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_976 10) < pow2 15)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "lemma" ]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_976", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15) val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15)
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val lemma_cdf_list_976: i:size_nat{i < List.Tot.length cdf_list_976} -> Lemma (uint_v (List.Tot.index cdf_list_976 i) < pow2 15)
[]
Spec.Frodo.Params.lemma_cdf_list_976
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_976} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_976 i) < Prims.pow2 15)
{ "end_col": 65, "end_line": 211, "start_col": 2, "start_line": 200 }
FStar.Pervasives.Lemma
val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15)
[ { "abbrev": false, "full_module": "Spec.Matrix", "short_module": null }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "Spec.Frodo", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let lemma_cdf_list_640 i = assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15)
val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15) let lemma_cdf_list_640 i =
false
null
true
assert_norm (List.Tot.length cdf_list_640 = 13); assert_norm (uint_v (List.Tot.index cdf_list_640 0) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 1) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 2) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 3) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 4) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 5) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 6) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 7) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 8) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 9) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 10) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 11) < pow2 15); assert_norm (uint_v (List.Tot.index cdf_list_640 12) < pow2 15)
{ "checked_file": "Spec.Frodo.Params.fst.checked", "dependencies": [ "Spec.SHA3.fst.checked", "Spec.Matrix.fst.checked", "Spec.Frodo.Gen.fst.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked", "FStar.Math.Lemmas.fst.checked", "FStar.List.Tot.fst.checked" ], "interface_file": false, "source_file": "Spec.Frodo.Params.fst" }
[ "lemma" ]
[ "Lib.IntTypes.size_nat", "Prims.b2t", "Prims.op_LessThan", "FStar.List.Tot.Base.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U16", "Lib.IntTypes.SEC", "Spec.Frodo.Params.cdf_list_640", "FStar.Pervasives.assert_norm", "Lib.IntTypes.uint_v", "FStar.List.Tot.Base.index", "Prims.pow2", "Prims.unit", "Prims.op_Equality", "Prims.int" ]
[]
module Spec.Frodo.Params open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence open Spec.Matrix #set-options "--z3rlimit 50 --fuel 0 --ifuel 0" type frodo_alg = | Frodo64 (* this variant is used only for testing purposes *) | Frodo640 | Frodo976 | Frodo1344 type frodo_gen_a = | SHAKE128 | AES128 let _: squash (inversion frodo_alg) = allow_inversion frodo_alg let _: squash (inversion frodo_gen_a) = allow_inversion frodo_gen_a inline_for_extraction let params_n (a:frodo_alg) : x:size_pos{x % 8 = 0 /\ x <= 1344} = match a with | Frodo64 -> 64 | Frodo640 -> 640 | Frodo976 -> 976 | Frodo1344 -> 1344 inline_for_extraction let params_logq (a:frodo_alg) : x:size_pos{x <= 16} = match a with | Frodo64 | Frodo640 -> 15 | Frodo976 | Frodo1344 -> 16 inline_for_extraction let params_extracted_bits (a:frodo_alg) : x:size_pos{x < params_logq a /\ x <= 8} = match a with | Frodo64 | Frodo640 -> 2 | Frodo976 -> 3 | Frodo1344 -> 4 inline_for_extraction let crypto_bytes (a:frodo_alg) : x:size_pos{x <= 32} = match a with | Frodo64 | Frodo640 -> 16 | Frodo976 -> 24 | Frodo1344 -> 32 let params_nbar = 8 let bytes_seed_a = 16 let bytes_pkhash (a:frodo_alg) : size_pos = crypto_bytes a let bytes_mu (a:frodo_alg) : size_pos = params_extracted_bits a * params_nbar * params_nbar / 8 let publicmatrixbytes_len (a:frodo_alg) : size_pos = params_logq a * (params_n a * params_nbar / 8) let secretmatrixbytes_len (a:frodo_alg) : size_pos = 2 * params_n a * params_nbar let ct1bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_n a / 8) let ct2bytes_len (a:frodo_alg) : size_pos = params_logq a * (params_nbar * params_nbar / 8) let crypto_publickeybytes (a:frodo_alg) : size_pos = bytes_seed_a + publicmatrixbytes_len a let crypto_secretkeybytes (a:frodo_alg) : size_pos = crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a let crypto_ciphertextbytes (a:frodo_alg) : size_pos = ct1bytes_len a + ct2bytes_len a val expand_crypto_publickeybytes: a:frodo_alg -> Lemma (crypto_publickeybytes a == bytes_seed_a + publicmatrixbytes_len a) let expand_crypto_publickeybytes a = () val expand_crypto_secretkeybytes: a:frodo_alg -> Lemma (crypto_secretkeybytes a == crypto_bytes a + crypto_publickeybytes a + secretmatrixbytes_len a + bytes_pkhash a) let expand_crypto_secretkeybytes a = () val expand_crypto_ciphertextbytes: a:frodo_alg -> Lemma (crypto_ciphertextbytes a == ct1bytes_len a + ct2bytes_len a) let expand_crypto_ciphertextbytes a = () val params_n_sqr: a:frodo_alg -> Lemma (params_n a * params_n a <= max_size_t /\ params_n a <= maxint U16) let params_n_sqr a = assert (params_n a <= maxint U16); Math.Lemmas.lemma_mult_lt_sqr (params_n a) (params_n a) (maxint U16); Math.Lemmas.pow2_plus 16 16 inline_for_extraction noextract let frodo_shake_st = inputByteLen:nat -> input:bytes{length input == inputByteLen} -> outputByteLen:size_nat -> lbytes outputByteLen inline_for_extraction let frodo_shake (a:frodo_alg) : frodo_shake_st = match a with | Frodo64 | Frodo640 -> Spec.SHA3.shake128 | Frodo976 | Frodo1344 -> Spec.SHA3.shake256 inline_for_extraction noextract let frodo_gen_matrix_st = n:size_nat{n * n <= max_size_t /\ n <= maxint U16 /\ n % 4 = 0} -> seed:lbytes 16 -> matrix n n inline_for_extraction let frodo_gen_matrix (a:frodo_gen_a) : frodo_gen_matrix_st = match a with | SHAKE128 -> Spec.Frodo.Gen.frodo_gen_matrix_shake | AES128 -> Spec.Frodo.Gen.frodo_gen_matrix_aes (** CDF tables *) unfold let cdf_list_640: list uint16 = [ u16 4643; u16 13363; u16 20579; u16 25843; u16 29227; u16 31145; u16 32103; u16 32525; u16 32689; u16 32745; u16 32762; u16 32766; u16 32767 ] unfold let cdf_list_976: list uint16 = [ u16 5638; u16 15915; u16 23689; u16 28571; u16 31116; u16 32217; u16 32613; u16 32731; u16 32760; u16 32766; u16 32767 ] unfold let cdf_list_1344: list uint16 = [ u16 9142; u16 23462; u16 30338; u16 32361; u16 32725; u16 32765; u16 32767 ] inline_for_extraction let cdf_table_len (a:frodo_alg) : size_pos = match a with | Frodo64 | Frodo640 -> 13 | Frodo976 -> 11 | Frodo1344 -> 7 inline_for_extraction let cdf_list (a:frodo_alg) : x:list uint16{List.Tot.length x == cdf_table_len a} = match a with | Frodo64 | Frodo640 -> assert_norm (List.Tot.length cdf_list_640 = 13); cdf_list_640 | Frodo976 -> assert_norm (List.Tot.length cdf_list_976 = 11); cdf_list_976 | Frodo1344 -> assert_norm (List.Tot.length cdf_list_1344 = 7); cdf_list_1344 inline_for_extraction let cdf_table (a:frodo_alg) : lseq uint16 (cdf_table_len a) = createL (cdf_list a) val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15)
false
false
Spec.Frodo.Params.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 50, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val lemma_cdf_list_640: i:size_nat{i < List.Tot.length cdf_list_640} -> Lemma (uint_v (List.Tot.index cdf_list_640 i) < pow2 15)
[]
Spec.Frodo.Params.lemma_cdf_list_640
{ "file_name": "specs/frodo/Spec.Frodo.Params.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
i: Lib.IntTypes.size_nat{i < FStar.List.Tot.Base.length Spec.Frodo.Params.cdf_list_640} -> FStar.Pervasives.Lemma (ensures Lib.IntTypes.uint_v (FStar.List.Tot.Base.index Spec.Frodo.Params.cdf_list_640 i) < Prims.pow2 15)
{ "end_col": 65, "end_line": 194, "start_col": 2, "start_line": 181 }
Prims.Tot
val flag_of (f:flags_t) : nat1
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let flag_of f = bool_to_nat1 (overflow f)
val flag_of (f:flags_t) : nat1 let flag_of f =
false
null
false
bool_to_nat1 (overflow f)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.Bignum.X64.flags_t", "Vale.Bignum.X64.bool_to_nat1", "Vale.X64.Decls.overflow", "Vale.Def.Words_s.nat1" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val flag_of (f:flags_t) : nat1
[]
Vale.Bignum.X64.flag_of
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
f: Vale.Bignum.X64.flags_t -> Vale.Def.Words_s.nat1
{ "end_col": 41, "end_line": 22, "start_col": 16, "start_line": 22 }
Prims.Tot
val flag_cf (f:flags_t) : nat1
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let flag_cf f = bool_to_nat1 (cf f)
val flag_cf (f:flags_t) : nat1 let flag_cf f =
false
null
false
bool_to_nat1 (cf f)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.Bignum.X64.flags_t", "Vale.Bignum.X64.bool_to_nat1", "Vale.X64.Decls.cf", "Vale.Def.Words_s.nat1" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val flag_cf (f:flags_t) : nat1
[]
Vale.Bignum.X64.flag_cf
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
f: Vale.Bignum.X64.flags_t -> Vale.Def.Words_s.nat1
{ "end_col": 35, "end_line": 21, "start_col": 16, "start_line": 21 }
Prims.Tot
val va_code_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ())))
val va_code_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code let va_code_Adcx_64 dst src =
false
null
false
(va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ())))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Adcx64Wrap", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_code_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[]
Vale.Bignum.X64.va_code_Adcx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
{ "end_col": 65, "end_line": 39, "start_col": 2, "start_line": 39 }
Prims.Tot
val va_code_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ())))
val va_code_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code let va_code_Adox_64 dst src =
false
null
false
(va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ())))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Adox64Wrap", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_code_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[]
Vale.Bignum.X64.va_code_Adox_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
{ "end_col": 65, "end_line": 74, "start_col": 2, "start_line": 74 }
Prims.Tot
val va_codegen_success_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_codegen_success_Mulx_64 dst_hi dst_lo src = (va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ()))
val va_codegen_success_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool let va_codegen_success_Mulx_64 dst_hi dst_lo src =
false
null
false
(va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ()))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Mulx64", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64 [@ "opaque_to_smt"] let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ()))) [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_codegen_success_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[]
Vale.Bignum.X64.va_codegen_success_Mulx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
{ "end_col": 76, "end_line": 113, "start_col": 2, "start_line": 113 }
Prims.Tot
val bool_to_nat1 (b: bool) : nat1
[ { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0
val bool_to_nat1 (b: bool) : nat1 let bool_to_nat1 (b: bool) : nat1 =
false
null
false
if b then 1 else 0
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Prims.bool", "Vale.Def.Words_s.nat1" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val bool_to_nat1 (b: bool) : nat1
[]
Vale.Bignum.X64.bool_to_nat1
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
b: Prims.bool -> Vale.Def.Words_s.nat1
{ "end_col": 53, "end_line": 20, "start_col": 35, "start_line": 20 }
Prims.Tot
val va_codegen_success_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ()))
val va_codegen_success_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool let va_codegen_success_Adox_64 dst src =
false
null
false
(va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ()))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Adox64Wrap", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_codegen_success_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[]
Vale.Bignum.X64.va_codegen_success_Adox_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
{ "end_col": 70, "end_line": 78, "start_col": 2, "start_line": 78 }
Prims.Tot
val va_codegen_success_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ()))
val va_codegen_success_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool let va_codegen_success_Adcx_64 dst src =
false
null
false
(va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ()))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_pbool_and", "Vale.X64.InsBasic.va_codegen_success_Adcx64Wrap", "Vale.X64.Decls.va_ttrue", "Vale.X64.Decls.va_pbool" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_codegen_success_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_pbool
[]
Vale.Bignum.X64.va_codegen_success_Adcx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_pbool
{ "end_col": 70, "end_line": 43, "start_col": 2, "start_line": 43 }
Prims.Tot
val va_code_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ())))
val va_code_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code let va_code_Mulx_64 dst_hi dst_lo src =
false
null
false
(va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ())))
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "total" ]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_Block", "Vale.X64.Decls.va_CCons", "Vale.X64.InsBasic.va_code_Mulx64", "Vale.X64.Decls.va_CNil", "Vale.X64.Decls.va_code" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64 [@ "opaque_to_smt"]
false
true
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_code_Mulx_64 : dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Tot va_code
[]
Vale.Bignum.X64.va_code_Mulx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Vale.X64.Decls.va_code
{ "end_col": 71, "end_line": 109, "start_col": 2, "start_line": 109 }
FStar.Pervasives.Lemma
val lemma_add_hi_lo64 : dummy:int -> Lemma (requires true) (ensures (forall (a:nat64) (b:nat64) (c:nat1) . {:pattern(add_lo a b c); (add_hi a b c)}Vale.Bignum.Defs.add_lo a b c + va_mul_nat pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); ()
val lemma_add_hi_lo64 : dummy:int -> Lemma (requires true) (ensures (forall (a:nat64) (b:nat64) (c:nat1) . {:pattern(add_lo a b c); (add_hi a b c)}Vale.Bignum.Defs.add_lo a b c + va_mul_nat pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c)) let lemma_add_hi_lo64 dummy =
false
null
true
Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); ()
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[ "lemma" ]
[ "Prims.int", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val lemma_add_hi_lo64 : dummy:int -> Lemma (requires true) (ensures (forall (a:nat64) (b:nat64) (c:nat1) . {:pattern(add_lo a b c); (add_hi a b c)}Vale.Bignum.Defs.add_lo a b c + va_mul_nat pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c))
[]
Vale.Bignum.X64.lemma_add_hi_lo64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dummy: Prims.int -> FStar.Pervasives.Lemma (requires true) (ensures forall (a: Vale.Def.Words_s.nat64) (b: Vale.Def.Words_s.nat64) (c: Vale.Def.Words_s.nat1). {:pattern Vale.Bignum.Defs.add_lo a b c; Vale.Bignum.Defs.add_hi a b c} Vale.Bignum.Defs.add_lo a b c + Vale.X64.Decls.va_mul_nat Vale.Def.Words_s.pow2_64 (Vale.Bignum.Defs.add_hi a b c) == a + b + c)
{ "end_col": 4, "end_line": 33, "start_col": 2, "start_line": 31 }
Prims.Ghost
val va_wpProof_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adox_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adox_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
val va_wpProof_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adox_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adox_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g)))) let va_wpProof_Adox_64 dst src va_s0 va_k =
false
null
false
let va_sM, va_f0 = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_state", "Prims.unit", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple3", "Vale.X64.QuickCode.va_lemma_norm_mods", "Prims.Cons", "Vale.X64.QuickCode.mod_t", "Vale.X64.QuickCode.va_Mod_flags", "Vale.X64.QuickCode.va_mod_dst_opr64", "Prims.Nil", "Prims._assert", "Vale.X64.Decls.va_state_eq", "Vale.X64.Decls.va_update_flags", "Vale.X64.Decls.va_update_ok", "Vale.X64.Decls.va_update_operand_dst_opr64", "Vale.X64.Decls.va_lemma_upd_update", "FStar.Pervasives.Native.tuple3", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.Bignum.X64.va_lemma_Adox_64", "Vale.Bignum.X64.va_code_Adox_64" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_wpProof_Adox_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adox_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adox_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
[]
Vale.Bignum.X64.va_wpProof_Adox_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> va_s0: Vale.X64.Decls.va_state -> va_k: (_: Vale.X64.Decls.va_state -> _: Prims.unit -> Type0) -> Prims.Ghost ((Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel) * Prims.unit)
{ "end_col": 22, "end_line": 102, "start_col": 43, "start_line": 95 }
Prims.Ghost
val va_lemma_Mulx_64 : va_b0:va_code -> va_s0:va_state -> dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Mulx_64 dst_hi dst_lo src) va_s0 /\ va_is_dst_dst_opr64 dst_hi va_s0 /\ va_is_dst_dst_opr64 dst_lo va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ bmi2_enabled /\ dst_hi =!= dst_lo)) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst_hi == Vale.Bignum.Defs.mul_hi (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_eval_dst_opr64 va_sM dst_lo == Vale.Bignum.Defs.mul_lo (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_state_eq va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst_lo va_sM (va_update_operand_dst_opr64 dst_hi va_sM va_s0)))))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_lemma_Mulx_64 va_b0 va_s0 dst_hi dst_lo src = va_reveal_opaque (`%va_code_Mulx_64) (va_code_Mulx_64 dst_hi dst_lo src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_mul_hi_all (); Vale.Bignum.Defs.reveal_mul_lo_all (); let (va_s4, va_fc4) = va_lemma_Mulx64 (va_hd va_b1) va_s0 dst_hi dst_lo src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
val va_lemma_Mulx_64 : va_b0:va_code -> va_s0:va_state -> dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Mulx_64 dst_hi dst_lo src) va_s0 /\ va_is_dst_dst_opr64 dst_hi va_s0 /\ va_is_dst_dst_opr64 dst_lo va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ bmi2_enabled /\ dst_hi =!= dst_lo)) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst_hi == Vale.Bignum.Defs.mul_hi (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_eval_dst_opr64 va_sM dst_lo == Vale.Bignum.Defs.mul_lo (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_state_eq va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst_lo va_sM (va_update_operand_dst_opr64 dst_hi va_sM va_s0))))) let va_lemma_Mulx_64 va_b0 va_s0 dst_hi dst_lo src =
false
null
false
va_reveal_opaque (`%va_code_Mulx_64) (va_code_Mulx_64 dst_hi dst_lo src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_mul_hi_all (); Vale.Bignum.Defs.reveal_mul_lo_all (); let va_s4, va_fc4 = va_lemma_Mulx64 (va_hd va_b1) va_s0 dst_hi dst_lo src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Mulx64", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_mul_lo_all", "Vale.Bignum.Defs.reveal_mul_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Mulx_64" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adox_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adox_64 (va_code_Adox_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Mulx_64 [@ "opaque_to_smt"] let va_code_Mulx_64 dst_hi dst_lo src = (va_Block (va_CCons (va_code_Mulx64 dst_hi dst_lo src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Mulx_64 dst_hi dst_lo src = (va_pbool_and (va_codegen_success_Mulx64 dst_hi dst_lo src) (va_ttrue ())) [@"opaque_to_smt"]
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_lemma_Mulx_64 : va_b0:va_code -> va_s0:va_state -> dst_hi:va_operand_dst_opr64 -> dst_lo:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Mulx_64 dst_hi dst_lo src) va_s0 /\ va_is_dst_dst_opr64 dst_hi va_s0 /\ va_is_dst_dst_opr64 dst_lo va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ bmi2_enabled /\ dst_hi =!= dst_lo)) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst_hi == Vale.Bignum.Defs.mul_hi (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_eval_dst_opr64 va_sM dst_lo == Vale.Bignum.Defs.mul_lo (va_get_reg64 rRdx va_s0) (va_eval_opr64 va_s0 src) /\ va_state_eq va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst_lo va_sM (va_update_operand_dst_opr64 dst_hi va_sM va_s0)))))
[]
Vale.Bignum.X64.va_lemma_Mulx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst_hi: Vale.X64.Decls.va_operand_dst_opr64 -> dst_lo: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
{ "end_col": 16, "end_line": 126, "start_col": 2, "start_line": 117 }
Prims.Ghost
val va_wpProof_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adcx_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adcx_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
val va_wpProof_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adcx_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adcx_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g)))) let va_wpProof_Adcx_64 dst src va_s0 va_k =
false
null
false
let va_sM, va_f0 = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[]
[ "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_state", "Prims.unit", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple3", "Vale.X64.QuickCode.va_lemma_norm_mods", "Prims.Cons", "Vale.X64.QuickCode.mod_t", "Vale.X64.QuickCode.va_Mod_flags", "Vale.X64.QuickCode.va_mod_dst_opr64", "Prims.Nil", "Prims._assert", "Vale.X64.Decls.va_state_eq", "Vale.X64.Decls.va_update_flags", "Vale.X64.Decls.va_update_ok", "Vale.X64.Decls.va_update_operand_dst_opr64", "Vale.X64.Decls.va_lemma_upd_update", "FStar.Pervasives.Native.tuple3", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.Bignum.X64.va_lemma_Adcx_64", "Vale.Bignum.X64.va_code_Adcx_64" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_wpProof_Adcx_64 : dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> va_s0:va_state -> va_k:(va_state -> unit -> Type0) -> Ghost (va_state & va_fuel & unit) (requires (va_t_require va_s0 /\ va_wp_Adcx_64 dst src va_s0 va_k)) (ensures (fun (va_sM, va_f0, va_g) -> va_t_ensure (va_code_Adcx_64 dst src) ([va_Mod_flags; va_mod_dst_opr64 dst]) va_s0 va_k ((va_sM, va_f0, va_g))))
[]
Vale.Bignum.X64.va_wpProof_Adcx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> va_s0: Vale.X64.Decls.va_state -> va_k: (_: Vale.X64.Decls.va_state -> _: Prims.unit -> Type0) -> Prims.Ghost ((Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel) * Prims.unit)
{ "end_col": 22, "end_line": 67, "start_col": 43, "start_line": 60 }
Prims.Ghost
val va_lemma_Adcx_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adcx_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_cf (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0)) /\ update_cf (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0))) /\ maintain_of (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
val va_lemma_Adcx_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adcx_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_cf (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0)) /\ update_cf (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0))) /\ maintain_of (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0))))) let va_lemma_Adcx_64 va_b0 va_s0 dst src =
false
null
false
va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let va_s4, va_fc4 = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Adcx64Wrap", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Adcx_64" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"]
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_lemma_Adcx_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adcx_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_cf (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0)) /\ update_cf (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_cf (va_get_flags va_s0))) /\ maintain_of (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
[]
Vale.Bignum.X64.va_lemma_Adcx_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
{ "end_col": 16, "end_line": 56, "start_col": 2, "start_line": 47 }
Prims.Ghost
val va_lemma_Adox_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adox_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_of (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0)) /\ update_of (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0))) /\ maintain_cf (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
[ { "abbrev": false, "full_module": "FStar.Seq", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum.Defs", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.CPU_Features_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCodes", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.QuickCode", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsStack", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsMem", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.InsBasic", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Decls", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.State", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Stack_i", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Memory", "short_module": null }, { "abbrev": false, "full_module": "Vale.X64.Machine_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Arch.Types", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Types_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Def.Words_s", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "Vale.Bignum", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let va_lemma_Adox_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
val va_lemma_Adox_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adox_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_of (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0)) /\ update_of (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0))) /\ maintain_cf (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0))))) let va_lemma_Adox_64 va_b0 va_s0 dst src =
false
null
false
va_reveal_opaque (`%va_code_Adox_64) (va_code_Adox_64 dst src); let va_old_s:va_state = va_s0 in let va_b1:va_codes = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let va_s4, va_fc4 = va_lemma_Adox64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let va_sM, va_f4 = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM)
{ "checked_file": "Vale.Bignum.X64.fst.checked", "dependencies": [ "Vale.X64.State.fsti.checked", "Vale.X64.Stack_i.fsti.checked", "Vale.X64.QuickCodes.fsti.checked", "Vale.X64.QuickCode.fst.checked", "Vale.X64.Memory.fsti.checked", "Vale.X64.Machine_s.fst.checked", "Vale.X64.InsStack.fsti.checked", "Vale.X64.InsMem.fsti.checked", "Vale.X64.InsBasic.fsti.checked", "Vale.X64.Decls.fsti.checked", "Vale.X64.CPU_Features_s.fst.checked", "Vale.Def.Words_s.fsti.checked", "Vale.Def.Types_s.fst.checked", "Vale.Bignum.Defs.fsti.checked", "Vale.Arch.Types.fsti.checked", "prims.fst.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Vale.Bignum.X64.fst" }
[]
[ "Vale.X64.Decls.va_code", "Vale.X64.Decls.va_state", "Vale.X64.Decls.va_operand_dst_opr64", "Vale.X64.Decls.va_operand_opr64", "Vale.X64.Decls.va_fuel", "FStar.Pervasives.Native.Mktuple2", "Vale.X64.Decls.va_lemma_merge_total", "FStar.Pervasives.Native.tuple2", "Vale.X64.State.vale_state", "Vale.X64.Decls.va_lemma_empty_total", "Prims.list", "Vale.X64.Machine_s.precode", "Vale.X64.Decls.ins", "Vale.X64.Decls.ocmp", "Vale.X64.Decls.va_tl", "Vale.X64.InsBasic.va_lemma_Adox64Wrap", "Vale.X64.Decls.va_hd", "Prims.unit", "Vale.Bignum.Defs.reveal_add_lo_all", "Vale.Bignum.Defs.reveal_add_hi_all", "Vale.X64.Decls.va_get_block", "Vale.X64.Decls.va_reveal_opaque", "Vale.Bignum.X64.va_code_Adox_64" ]
[]
module Vale.Bignum.X64 open Vale.Def.Words_s open Vale.Def.Types_s open Vale.Arch.Types open Vale.X64.Machine_s open Vale.X64.Memory open Vale.X64.Stack_i open Vale.X64.State open Vale.X64.Decls open Vale.X64.InsBasic open Vale.X64.InsMem open Vale.X64.InsStack open Vale.X64.QuickCode open Vale.X64.QuickCodes open Vale.X64.CPU_Features_s open Vale.Bignum.Defs open FStar.Mul open FStar.Seq open Vale.Def.Words_s let bool_to_nat1 (b:bool) : nat1 = if b then 1 else 0 let flag_cf f = bool_to_nat1 (cf f) let flag_of f = bool_to_nat1 (overflow f) //-- reveal_flags let reveal_flags f = () //-- //-- lemma_add_hi_lo64 let lemma_add_hi_lo64 dummy = Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); () //-- //-- Adcx_64 [@ "opaque_to_smt"] let va_code_Adcx_64 dst src = (va_Block (va_CCons (va_code_Adcx64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adcx_64 dst src = (va_pbool_and (va_codegen_success_Adcx64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"] let va_lemma_Adcx_64 va_b0 va_s0 dst src = va_reveal_opaque (`%va_code_Adcx_64) (va_code_Adcx_64 dst src); let (va_old_s:va_state) = va_s0 in let (va_b1:va_codes) = va_get_block va_b0 in Vale.Bignum.Defs.reveal_add_hi_all (); Vale.Bignum.Defs.reveal_add_lo_all (); let (va_s4, va_fc4) = va_lemma_Adcx64Wrap (va_hd va_b1) va_s0 dst src in let va_b4 = va_tl va_b1 in let (va_sM, va_f4) = va_lemma_empty_total va_s4 va_b4 in let va_fM = va_lemma_merge_total va_b1 va_s0 va_fc4 va_s4 va_f4 va_sM in (va_sM, va_fM) [@"opaque_to_smt"] let va_wpProof_Adcx_64 dst src va_s0 va_k = let (va_sM, va_f0) = va_lemma_Adcx_64 (va_code_Adcx_64 dst src) va_s0 dst src in va_lemma_upd_update va_sM; assert (va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))); va_lemma_norm_mods ([va_Mod_flags; va_mod_dst_opr64 dst]) va_sM va_s0; let va_g = () in (va_sM, va_f0, va_g) //-- //-- Adox_64 [@ "opaque_to_smt"] let va_code_Adox_64 dst src = (va_Block (va_CCons (va_code_Adox64Wrap dst src) (va_CNil ()))) [@ "opaque_to_smt"] let va_codegen_success_Adox_64 dst src = (va_pbool_and (va_codegen_success_Adox64Wrap dst src) (va_ttrue ())) [@"opaque_to_smt"]
false
false
Vale.Bignum.X64.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 0, "max_fuel": 1, "max_ifuel": 1, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": true, "smtencoding_l_arith_repr": "native", "smtencoding_nl_arith_repr": "wrapped", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [ "smt.arith.nl=false", "smt.QI.EAGER_THRESHOLD=100", "smt.CASE_SPLIT=3" ], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val va_lemma_Adox_64 : va_b0:va_code -> va_s0:va_state -> dst:va_operand_dst_opr64 -> src:va_operand_opr64 -> Ghost (va_state & va_fuel) (requires (va_require_total va_b0 (va_code_Adox_64 dst src) va_s0 /\ va_is_dst_dst_opr64 dst va_s0 /\ va_is_src_opr64 src va_s0 /\ va_get_ok va_s0 /\ adx_enabled /\ Vale.X64.Decls.valid_of (va_get_flags va_s0))) (ensures (fun (va_sM, va_fM) -> va_ensure_total va_b0 va_s0 va_sM va_fM /\ va_get_ok va_sM /\ va_eval_dst_opr64 va_sM dst == Vale.Bignum.Defs.add_lo (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0)) /\ update_of (va_get_flags va_sM) (Vale.Bignum.Defs.add_hi (va_eval_dst_opr64 va_s0 dst) (va_eval_opr64 va_s0 src) (flag_of (va_get_flags va_s0))) /\ maintain_cf (va_get_flags va_sM) (va_get_flags va_s0) /\ va_state_eq va_sM (va_update_flags va_sM (va_update_ok va_sM (va_update_operand_dst_opr64 dst va_sM va_s0)))))
[]
Vale.Bignum.X64.va_lemma_Adox_64
{ "file_name": "obj/Vale.Bignum.X64.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
va_b0: Vale.X64.Decls.va_code -> va_s0: Vale.X64.Decls.va_state -> dst: Vale.X64.Decls.va_operand_dst_opr64 -> src: Vale.X64.Decls.va_operand_opr64 -> Prims.Ghost (Vale.X64.Decls.va_state * Vale.X64.Decls.va_fuel)
{ "end_col": 16, "end_line": 91, "start_col": 2, "start_line": 82 }
Prims.Tot
val point_mul_g (a: qelem) : proj_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_mul_g (a:qelem) : proj_point = point_mul a g
val point_mul_g (a: qelem) : proj_point let point_mul_g (a: qelem) : proj_point =
false
null
false
point_mul a g
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.qelem", "Spec.K256.point_mul", "Spec.K256.PointOps.g", "Spec.K256.PointOps.proj_point" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_mul_g (a: qelem) : proj_point
[]
Spec.K256.point_mul_g
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.K256.PointOps.qelem -> Spec.K256.PointOps.proj_point
{ "end_col": 54, "end_line": 78, "start_col": 41, "start_line": 78 }
Prims.Tot
val point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p
val point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point let point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point =
false
null
false
point_mul_double a1 g a2 p
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_double", "Spec.K256.PointOps.g" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_mul_double_g (a1 a2: qelem) (p: proj_point) : proj_point
[]
Spec.K256.point_mul_double_g
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a1: Spec.K256.PointOps.qelem -> a2: Spec.K256.PointOps.qelem -> p: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
{ "end_col": 28, "end_line": 82, "start_col": 2, "start_line": 82 }
Prims.Tot
val aff_point_mul (a: nat) (p: aff_point) : aff_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a
val aff_point_mul (a: nat) (p: aff_point) : aff_point let aff_point_mul (a: nat) (p: aff_point) : aff_point =
false
null
false
LE.pow mk_k256_comm_monoid p a
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Prims.nat", "Spec.K256.PointOps.aff_point", "Lib.Exponentiation.Definition.pow", "Spec.K256.mk_k256_comm_monoid" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val aff_point_mul (a: nat) (p: aff_point) : aff_point
[]
Spec.K256.aff_point_mul
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Prims.nat -> p: Spec.K256.PointOps.aff_point -> Spec.K256.PointOps.aff_point
{ "end_col": 32, "end_line": 67, "start_col": 2, "start_line": 67 }
Prims.Tot
val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q
val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q =
false
null
false
KL.to_aff_point_add_lemma p q; point_add p q
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.point_add", "Prims.unit", "Spec.K256.Lemmas.to_aff_point_add_lemma" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid
[]
Spec.K256.point_add_c
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Exponentiation.mul_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
{ "end_col": 15, "end_line": 51, "start_col": 2, "start_line": 50 }
Prims.Tot
val mk_k256_comm_monoid:LE.comm_monoid aff_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; }
val mk_k256_comm_monoid:LE.comm_monoid aff_point let mk_k256_comm_monoid:LE.comm_monoid aff_point =
false
null
false
{ LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma }
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.Exponentiation.Definition.Mkcomm_monoid", "Spec.K256.PointOps.aff_point", "Spec.K256.PointOps.aff_point_at_inf", "Spec.K256.PointOps.aff_point_add", "Spec.K256.Lemmas.aff_point_at_inf_lemma", "Spec.K256.Lemmas.aff_point_add_assoc_lemma", "Spec.K256.Lemmas.aff_point_add_comm_lemma" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *)
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val mk_k256_comm_monoid:LE.comm_monoid aff_point
[]
Spec.K256.mk_k256_comm_monoid
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Lib.Exponentiation.Definition.comm_monoid Spec.K256.PointOps.aff_point
{ "end_col": 50, "end_line": 28, "start_col": 2, "start_line": 24 }
Prims.Tot
val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_double_c p = KL.to_aff_point_double_lemma p; point_double p
val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p =
false
null
false
KL.to_aff_point_double_lemma p; point_double p
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.point_double", "Prims.unit", "Spec.K256.Lemmas.to_aff_point_double_lemma" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid
[]
Spec.K256.point_double_c
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Exponentiation.sqr_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
{ "end_col": 16, "end_line": 56, "start_col": 2, "start_line": 55 }
Prims.Tot
val point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
val point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point let point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point =
false
null
false
SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.Exponentiation.exp_double_fw", "Spec.K256.mk_k256_concrete_ops" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_mul_double (a1: qelem) (p1: proj_point) (a2: qelem) (p2: proj_point) : proj_point
[]
Spec.K256.point_mul_double
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a1: Spec.K256.PointOps.qelem -> p1: Spec.K256.PointOps.proj_point -> a2: Spec.K256.PointOps.qelem -> p2: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
{ "end_col": 57, "end_line": 75, "start_col": 2, "start_line": 75 }
Prims.Tot
val mk_k256_abelian_group:LE.abelian_group aff_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; }
val mk_k256_abelian_group:LE.abelian_group aff_point let mk_k256_abelian_group:LE.abelian_group aff_point =
false
null
false
{ LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma }
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.Exponentiation.Definition.Mkabelian_group", "Spec.K256.PointOps.aff_point", "Spec.K256.mk_k256_comm_monoid", "Spec.K256.PointOps.aff_point_negate", "Spec.K256.Lemmas.aff_point_negate_lemma" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; }
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val mk_k256_abelian_group:LE.abelian_group aff_point
[]
Spec.K256.mk_k256_abelian_group
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Lib.Exponentiation.Definition.abelian_group Spec.K256.PointOps.aff_point
{ "end_col": 47, "end_line": 34, "start_col": 2, "start_line": 32 }
Prims.Tot
val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf
val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ =
false
null
false
KL.to_aff_point_at_infinity_lemma (); point_at_inf
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Prims.unit", "Spec.K256.PointOps.point_at_inf", "Spec.K256.Lemmas.to_aff_point_at_infinity_lemma", "Spec.K256.PointOps.proj_point" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid
[]
Spec.K256.point_at_inf_c
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Spec.Exponentiation.one_st Spec.K256.PointOps.proj_point Spec.K256.mk_to_k256_comm_monoid
{ "end_col": 14, "end_line": 46, "start_col": 2, "start_line": 45 }
Prims.Tot
val point_mul (a: qelem) (p: proj_point) : proj_point
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4
val point_mul (a: qelem) (p: proj_point) : proj_point let point_mul (a: qelem) (p: proj_point) : proj_point =
false
null
false
SE.exp_fw mk_k256_concrete_ops p 256 a 4
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.proj_point", "Spec.Exponentiation.exp_fw", "Spec.K256.mk_k256_concrete_ops" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P
false
true
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val point_mul (a: qelem) (p: proj_point) : proj_point
[]
Spec.K256.point_mul
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
a: Spec.K256.PointOps.qelem -> p: Spec.K256.PointOps.proj_point -> Spec.K256.PointOps.proj_point
{ "end_col": 42, "end_line": 71, "start_col": 2, "start_line": 71 }
Prims.Tot
val secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
val secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool let secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool =
false
null
false
if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Spec.K256.secp256k1_ecdsa_is_signature_normalized", "Prims.bool", "Spec.K256.ecdsa_verify_hashed_msg" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
[]
Spec.K256.secp256k1_ecdsa_verify_hashed_msg
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msgHash: Lib.ByteSequence.lbytes 32 -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 59, "end_line": 247, "start_col": 2, "start_line": 246 }
Prims.Tot
val validate_public_key (pk: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk)
val validate_public_key (pk: lbytes 64) : bool let validate_public_key (pk: lbytes 64) : bool =
false
null
false
Some? (load_point pk)
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "Spec.K256.PointOps.load_point", "Prims.bool" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val validate_public_key (pk: lbytes 64) : bool
[]
Spec.K256.validate_public_key
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
pk: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 23, "end_line": 184, "start_col": 2, "start_line": 184 }
Prims.Tot
val ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature
val ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool let ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool =
false
null
false
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.ecdsa_verify_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "Prims.bool" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
[]
Spec.K256.ecdsa_verify_sha256
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 54, "end_line": 153, "start_col": 105, "start_line": 151 }
Prims.Tot
val secret_to_public (private_key: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
val secret_to_public (private_key: lbytes 32) : option (lbytes 64) let secret_to_public (private_key: lbytes 32) : option (lbytes 64) =
false
null
false
let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.Some", "Spec.K256.PointOps.point_store", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_g", "Prims.bool", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_AmpAmp", "Prims.op_LessThan", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secret_to_public (private_key: lbytes 32) : option (lbytes 64)
[]
Spec.K256.secret_to_public
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
private_key: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 11, "end_line": 164, "start_col": 67, "start_line": 158 }
Prims.Tot
val ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None
val ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64) let ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64) =
false
null
false
let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_AmpAmp", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "FStar.Pervasives.Native.Some", "Spec.K256.PointOps.point_store", "Spec.K256.point_mul", "FStar.Pervasives.Native.__proj__Some__item__v", "Prims.bool", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_LessThan", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_from_bytes_be", "Spec.K256.PointOps.load_point" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ecdh (their_public_key: lbytes 64) (private_key: lbytes 32) : option (lbytes 64)
[]
Spec.K256.ecdh
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
their_public_key: Lib.ByteSequence.lbytes 64 -> private_key: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 11, "end_line": 174, "start_col": 84, "start_line": 167 }
Prims.Tot
val ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
val ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) let ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) =
false
null
false
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.ecdsa_sign_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "FStar.Pervasives.Native.option" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32)
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
[]
Spec.K256.ecdsa_sign_sha256
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 49, "end_line": 148, "start_col": 114, "start_line": 146 }
Prims.Tot
val secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_verify_hashed_msg msgHash public_key signature
val secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool let secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool =
false
null
false
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_verify_hashed_msg msgHash public_key signature
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_verify_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "Prims.bool" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce let secp256k1_ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = if not (secp256k1_ecdsa_is_signature_normalized signature) then false else ecdsa_verify_hashed_msg msgHash public_key signature
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_verify_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (public_key signature: lbytes 64) : bool
[]
Spec.K256.secp256k1_ecdsa_verify_sha256
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 64, "end_line": 252, "start_col": 115, "start_line": 250 }
Prims.Tot
val pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
val pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64) let pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64) =
false
null
false
let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Spec.K256.PointOps.aff_point_decompress", "Spec.K256.PointOps.felem", "FStar.Pervasives.Native.Some", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.ByteSequence.nat_to_bytes_be", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Prims.l_and", "Prims.eq2", "FStar.Seq.Base.seq", "Lib.Sequence.to_seq", "FStar.Seq.Base.slice", "Prims.op_Addition", "Prims.l_Forall", "Prims.nat", "Prims.b2t", "Prims.op_LessThan", "Prims.l_or", "FStar.Seq.Base.index", "Lib.Sequence.index", "Lib.Sequence.sub" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pk_compressed_to_raw (pk: lbytes 33) : option (lbytes 64)
[]
Spec.K256.pk_compressed_to_raw
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
pk: Lib.ByteSequence.lbytes 33 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 16, "end_line": 196, "start_col": 62, "start_line": 192 }
Prims.Tot
val secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
val secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) let secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64) =
false
null
false
let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in secp256k1_ecdsa_sign_hashed_msg msgHash private_key nonce
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.IntTypes.size_nat", "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_sign_hashed_msg", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.Hash.Definitions.hash_length'", "Spec.Hash.Definitions.SHA2_256", "Spec.Agile.Hash.hash", "FStar.Pervasives.Native.option" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2 let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_sign_sha256 (msg_len: size_nat) (msg: lbytes msg_len) (private_key nonce: lbytes 32) : option (lbytes 64)
[]
Spec.K256.secp256k1_ecdsa_sign_sha256
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msg_len: Lib.IntTypes.size_nat -> msg: Lib.ByteSequence.lbytes msg_len -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 59, "end_line": 242, "start_col": 124, "start_line": 240 }
Prims.Tot
val pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk
val pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65 let pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65 =
false
null
false
concat (create 1 (u8 0x04)) pk
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.create", "Lib.IntTypes.u8" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64)
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pk_uncompressed_from_raw (pk: lbytes 64) : lbytes 65
[]
Spec.K256.pk_uncompressed_from_raw
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
pk: Lib.ByteSequence.lbytes 64 -> Lib.ByteSequence.lbytes 65
{ "end_col": 32, "end_line": 190, "start_col": 2, "start_line": 190 }
Prims.Tot
val secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
val secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) let secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) =
false
null
false
let signature = ecdsa_sign_hashed_msg msgHash private_key nonce in match signature with | Some x -> secp256k1_ecdsa_signature_normalize x | None -> None
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Spec.K256.secp256k1_ecdsa_signature_normalize", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Spec.K256.ecdsa_sign_hashed_msg" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
[]
Spec.K256.secp256k1_ecdsa_sign_hashed_msg
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msgHash: Lib.ByteSequence.lbytes 32 -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 16, "end_line": 237, "start_col": 96, "start_line": 233 }
Prims.Tot
val pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64)
val pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64) let pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64) =
false
null
false
if Lib.RawIntTypes.u8_to_UInt8 pk.[ 0 ] <> 0x04uy then None else Some (sub pk 1 64)
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_disEquality", "FStar.UInt8.t", "Lib.RawIntTypes.u8_to_UInt8", "Lib.Sequence.op_String_Access", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "FStar.UInt8.__uint_to_t", "FStar.Pervasives.Native.None", "Prims.bool", "FStar.Pervasives.Native.Some", "Lib.Sequence.sub", "FStar.Pervasives.Native.option" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk)
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pk_uncompressed_to_raw (pk: lbytes 65) : option (lbytes 64)
[]
Spec.K256.pk_uncompressed_to_raw
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
pk: Lib.ByteSequence.lbytes 65 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 83, "end_line": 187, "start_col": 2, "start_line": 187 }
Prims.Tot
val ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end
val ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool let ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool =
false
null
false
let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else (assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else let x = _X /% _Z in x % q = r)
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Prims.op_AmpAmp", "FStar.Pervasives.Native.uu___is_Some", "Spec.K256.PointOps.proj_point", "Prims.bool", "Spec.K256.PointOps.felem", "Spec.K256.PointOps.is_proj_point_at_inf", "FStar.Pervasives.Native.Mktuple3", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Spec.K256.PointOps.q", "Spec.K256.PointOps.op_Slash_Percent", "Spec.K256.point_mul_double_g", "FStar.Pervasives.Native.__proj__Some__item__v", "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.op_Star_Hat", "Spec.K256.PointOps.qinv", "Prims.unit", "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThan", "Prims.pow2", "Lib.ByteSequence.nat_from_bytes_be", "Lib.IntTypes.SEC", "Prims.nat", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.Sequence.sub", "Lib.IntTypes.uint_t", "FStar.Pervasives.Native.option", "Spec.K256.PointOps.load_point" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ecdsa_verify_hashed_msg (msgHash: lbytes 32) (public_key signature: lbytes 64) : bool
[]
Spec.K256.ecdsa_verify_hashed_msg
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msgHash: Lib.ByteSequence.lbytes 32 -> public_key: Lib.ByteSequence.lbytes 64 -> signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 5, "end_line": 130, "start_col": 89, "start_line": 109 }
Prims.Tot
val pk_compressed_from_raw (pk: lbytes 64) : lbytes 33
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x
val pk_compressed_from_raw (pk: lbytes 64) : lbytes 33 let pk_compressed_from_raw (pk: lbytes 64) : lbytes 33 =
false
null
false
let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.create", "Lib.IntTypes.int_t", "Lib.IntTypes.u8", "Prims.bool", "Prims.op_Equality", "Prims.int", "Prims.op_Modulus", "Lib.ByteSequence.nat_from_bytes_be", "Lib.Sequence.lseq", "Prims.l_and", "Prims.eq2", "FStar.Seq.Base.seq", "Lib.Sequence.to_seq", "FStar.Seq.Base.slice", "Prims.op_Addition", "Prims.l_Forall", "Prims.nat", "Prims.b2t", "Prims.op_LessThan", "Prims.l_or", "FStar.Seq.Base.index", "Lib.Sequence.index", "Lib.Sequence.sub" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pk_compressed_from_raw (pk: lbytes 64) : lbytes 33
[]
Spec.K256.pk_compressed_from_raw
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
pk: Lib.ByteSequence.lbytes 64 -> Lib.ByteSequence.lbytes 33
{ "end_col": 28, "end_line": 204, "start_col": 55, "start_line": 199 }
Prims.Tot
val secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_is_signature_normalized (signature:lbytes 64) : bool = let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
val secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool let secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool =
false
null
false
let sn = nat_from_bytes_be (sub signature 32 32) in 0 < sn && sn <= q / 2
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_AmpAmp", "Prims.op_LessThan", "Prims.op_LessThanOrEqual", "Prims.op_Division", "Spec.K256.PointOps.q", "Prims.nat", "Prims.b2t", "Prims.pow2", "Prims.op_Multiply", "Lib.Sequence.length", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Lib.Sequence.sub", "Lib.ByteSequence.nat_from_bytes_be", "Lib.IntTypes.uint_t", "Prims.bool" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive). // If S is too high, simply replace it by S' = q - S. let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_is_signature_normalized (signature: lbytes 64) : bool
[]
Spec.K256.secp256k1_ecdsa_is_signature_normalized
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
signature: Lib.ByteSequence.lbytes 64 -> Prims.bool
{ "end_col": 23, "end_line": 230, "start_col": 74, "start_line": 228 }
Prims.Tot
val ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end
val ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) let ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64) =
false
null
false
let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb)
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "Prims.op_Negation", "Prims.op_AmpAmp", "FStar.Pervasives.Native.None", "Prims.bool", "Spec.K256.PointOps.felem", "Prims.op_BarBar", "Prims.op_Equality", "Prims.int", "FStar.Pervasives.Native.Some", "Lib.Sequence.concat", "Lib.IntTypes.uint_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "FStar.Pervasives.Native.option", "Lib.Sequence.seq", "Lib.IntTypes.int_t", "Prims.l_and", "Prims.eq2", "Prims.nat", "Lib.Sequence.length", "Prims.l_or", "Prims.b2t", "Prims.op_LessThan", "Prims.pow2", "Prims.op_Multiply", "Lib.ByteSequence.nat_from_intseq_be", "Lib.ByteSequence.nat_to_bytes_be", "Spec.K256.PointOps.qelem", "Spec.K256.PointOps.op_Star_Hat", "Spec.K256.PointOps.op_Plus_Hat", "Spec.K256.PointOps.qinv", "Prims.op_Modulus", "Spec.K256.PointOps.q", "Spec.K256.PointOps.op_Slash_Percent", "Spec.K256.PointOps.proj_point", "Spec.K256.point_mul_g", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val ecdsa_sign_hashed_msg (msgHash private_key nonce: lbytes 32) : option (lbytes 64)
[]
Spec.K256.ecdsa_sign_hashed_msg
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
msgHash: Lib.ByteSequence.lbytes 32 -> private_key: Lib.ByteSequence.lbytes 32 -> nonce: Lib.ByteSequence.lbytes 32 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 71, "end_line": 106, "start_col": 86, "start_line": 86 }
Prims.Tot
val secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64)
[ { "abbrev": false, "full_module": "Spec.K256.PointOps", "short_module": null }, { "abbrev": true, "full_module": "Spec.K256.Lemmas", "short_module": "KL" }, { "abbrev": true, "full_module": "Spec.Exponentiation", "short_module": "SE" }, { "abbrev": true, "full_module": "Lib.Exponentiation", "short_module": "LE" }, { "abbrev": true, "full_module": "Lib.NatMod", "short_module": "M" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "Spec", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let secp256k1_ecdsa_signature_normalize (signature:lbytes 64) : option (lbytes 64) = let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then begin let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt end else None
val secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64) let secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64) =
false
null
false
let sn = nat_from_bytes_be (sub signature 32 32) in let is_sn_valid = 0 < sn && sn < q in if is_sn_valid then let sn = if sn <= q / 2 then sn else (q - sn) % q in let sgnt = update_sub signature 32 32 (nat_to_bytes_be 32 sn) in Some sgnt else None
{ "checked_file": "Spec.K256.fst.checked", "dependencies": [ "Spec.K256.PointOps.fst.checked", "Spec.K256.Lemmas.fsti.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Exponentiation.fsti.checked", "Spec.Agile.Hash.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.NatMod.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.Exponentiation.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.UInt8.fsti.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": false, "source_file": "Spec.K256.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes", "FStar.Pervasives.Native.Some", "Lib.Sequence.lseq", "Lib.IntTypes.int_t", "Lib.IntTypes.U8", "Lib.IntTypes.SEC", "Prims.l_and", "Prims.eq2", "Lib.Sequence.sub", "Lib.ByteSequence.nat_to_bytes_be", "Prims.l_Forall", "Prims.nat", "Prims.l_or", "Prims.b2t", "Prims.op_LessThanOrEqual", "Prims.op_LessThan", "Prims.op_Addition", "FStar.Seq.Base.index", "Lib.Sequence.to_seq", "Lib.Sequence.index", "Lib.Sequence.update_sub", "Lib.IntTypes.uint_t", "Prims.pow2", "Prims.op_Multiply", "Prims.op_Division", "Spec.K256.PointOps.q", "Prims.bool", "Prims.op_Modulus", "Prims.op_Subtraction", "FStar.Mul.op_Star", "FStar.Pervasives.Native.None", "FStar.Pervasives.Native.option", "Prims.op_AmpAmp", "Lib.Sequence.length", "Lib.ByteSequence.nat_from_bytes_be" ]
[]
module Spec.K256 open FStar.Mul open Lib.IntTypes open Lib.Sequence open Lib.ByteSequence module M = Lib.NatMod module LE = Lib.Exponentiation module SE = Spec.Exponentiation module KL = Spec.K256.Lemmas include Spec.K256.PointOps #set-options "--z3rlimit 30 --fuel 0 --ifuel 0" (** K256: https://en.bitcoin.it/wiki/Secp256k1 ECDSA: https://en.bitcoin.it/wiki/Elliptic_Curve_Digital_Signature_Algorithm https://www.hyperelliptic.org/EFD/g1p/auto-shortw.html *) let mk_k256_comm_monoid : LE.comm_monoid aff_point = { LE.one = aff_point_at_inf; LE.mul = aff_point_add; LE.lemma_one = KL.aff_point_at_inf_lemma; LE.lemma_mul_assoc = KL.aff_point_add_assoc_lemma; LE.lemma_mul_comm = KL.aff_point_add_comm_lemma; } let mk_k256_abelian_group : LE.abelian_group aff_point = { LE.cm = mk_k256_comm_monoid; LE.inverse = aff_point_negate; LE.lemma_inverse = KL.aff_point_negate_lemma; } let mk_to_k256_comm_monoid : SE.to_comm_monoid proj_point = { SE.a_spec = aff_point; SE.comm_monoid = mk_k256_comm_monoid; SE.refl = to_aff_point; } val point_at_inf_c: SE.one_st proj_point mk_to_k256_comm_monoid let point_at_inf_c _ = KL.to_aff_point_at_infinity_lemma (); point_at_inf val point_add_c : SE.mul_st proj_point mk_to_k256_comm_monoid let point_add_c p q = KL.to_aff_point_add_lemma p q; point_add p q val point_double_c : SE.sqr_st proj_point mk_to_k256_comm_monoid let point_double_c p = KL.to_aff_point_double_lemma p; point_double p let mk_k256_concrete_ops : SE.concrete_ops proj_point = { SE.to = mk_to_k256_comm_monoid; SE.one = point_at_inf_c; SE.mul = point_add_c; SE.sqr = point_double_c; } // [a]P in affine coordinates let aff_point_mul (a:nat) (p:aff_point) : aff_point = LE.pow mk_k256_comm_monoid p a // [a]P let point_mul (a:qelem) (p:proj_point) : proj_point = SE.exp_fw mk_k256_concrete_ops p 256 a 4 // [a1]P1 + [a2]P2 let point_mul_double (a1:qelem) (p1:proj_point) (a2:qelem) (p2:proj_point) : proj_point = SE.exp_double_fw mk_k256_concrete_ops p1 256 a1 p2 a2 5 // [a]G let point_mul_g (a:qelem) : proj_point = point_mul a g // [a1]G + [a2]P let point_mul_double_g (a1:qelem) (a2:qelem) (p:proj_point) : proj_point = point_mul_double a1 g a2 p /// ECDSA with a prehashed message let ecdsa_sign_hashed_msg (msgHash private_key nonce:lbytes 32) : option (lbytes 64) = let k_q = nat_from_bytes_be nonce in let d_a = nat_from_bytes_be private_key in let z = nat_from_bytes_be msgHash % q in let is_privkey_valid = 0 < d_a && d_a < q in let is_nonce_valid = 0 < k_q && k_q < q in if not (is_privkey_valid && is_nonce_valid) then None else begin let _X, _Y, _Z = point_mul_g k_q in let x = _X /% _Z in let r = x % q in let kinv = qinv k_q in let s = kinv *^ (z +^ r *^ d_a) in let rb = nat_to_bytes_be 32 r in let sb = nat_to_bytes_be 32 s in if r = 0 || s = 0 then None else Some (concat #_ #32 #32 rb sb) end let ecdsa_verify_hashed_msg (msgHash:lbytes 32) (public_key signature:lbytes 64) : bool = let pk = load_point public_key in let r = nat_from_bytes_be (sub signature 0 32) in let s = nat_from_bytes_be (sub signature 32 32) in let z = nat_from_bytes_be msgHash % q in let is_r_valid = 0 < r && r < q in let is_s_valid = 0 < s && s < q in if not (Some? pk && is_r_valid && is_s_valid) then false else begin assert_norm (q < pow2 256); let sinv = qinv s in let u1 = z *^ sinv in let u2 = r *^ sinv in let _X, _Y, _Z = point_mul_double_g u1 u2 (Some?.v pk) in if is_proj_point_at_inf (_X, _Y, _Z) then false else begin let x = _X /% _Z in x % q = r end end (* _Z <> 0 q < prime < 2 * q let x = _X /% _Z in x % q = r <==> 1. x = r <==> _X = r *% _Z 2. x - q = r <==> _X = (r + q) *% _Z *) /// ECDSA using SHA2-256 let _: squash(Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) = assert_norm (Some?.v (Spec.Hash.Definitions.max_input_length Spec.Hash.Definitions.SHA2_256) > pow2 32) let ecdsa_sign_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (private_key nonce:lbytes 32) : option (lbytes 64) = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_sign_hashed_msg msgHash private_key nonce let ecdsa_verify_sha256 (msg_len:size_nat) (msg:lbytes msg_len) (public_key signature:lbytes 64) : bool = let msgHash = Spec.Agile.Hash.hash Spec.Hash.Definitions.SHA2_256 msg in ecdsa_verify_hashed_msg msgHash public_key signature /// ECDH over the secp256k1 elliptic curve let secret_to_public (private_key:lbytes 32) : option (lbytes 64) = let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if is_sk_valid then let pk = point_mul_g sk in Some (point_store pk) else None let ecdh (their_public_key:lbytes 64) (private_key:lbytes 32) : option (lbytes 64) = let pk = load_point their_public_key in let sk = nat_from_bytes_be private_key in let is_sk_valid = 0 < sk && sk < q in if Some? pk && is_sk_valid then let ss = point_mul sk (Some?.v pk) in Some (point_store ss) else None /// Parsing and Serializing public keys // raw = [ x; y ], 64 bytes // uncompressed = [ 0x04; x; y ], 65 bytes // compressed = [ 0x02 for even `y` and 0x03 for odd `y`; x ], 33 bytes let validate_public_key (pk:lbytes 64) : bool = Some? (load_point pk) let pk_uncompressed_to_raw (pk:lbytes 65) : option (lbytes 64) = if Lib.RawIntTypes.u8_to_UInt8 pk.[0] <> 0x04uy then None else Some (sub pk 1 64) let pk_uncompressed_from_raw (pk:lbytes 64) : lbytes 65 = concat (create 1 (u8 0x04)) pk let pk_compressed_to_raw (pk:lbytes 33) : option (lbytes 64) = let pk_x = sub pk 1 32 in match (aff_point_decompress pk) with | Some (x, y) -> Some (concat #_ #32 #32 pk_x (nat_to_bytes_be 32 y)) | None -> None let pk_compressed_from_raw (pk:lbytes 64) : lbytes 33 = let pk_x = sub pk 0 32 in let pk_y = sub pk 32 32 in let is_pk_y_odd = nat_from_bytes_be pk_y % 2 = 1 in // <==> pk_y % 2 = 1 let pk0 = if is_pk_y_odd then u8 0x03 else u8 0x02 in concat (create 1 pk0) pk_x /// Low-S normalization (** https://en.bitcoin.it/wiki/BIP_0062 https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/ https://eklitzke.org/bitcoin-transaction-malleability *) // The value S in signatures must be between 0x1 and q / 2 (inclusive).
false
false
Spec.K256.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 0, "max_fuel": 0, "max_ifuel": 0, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 30, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val secp256k1_ecdsa_signature_normalize (signature: lbytes 64) : option (lbytes 64)
[]
Spec.K256.secp256k1_ecdsa_signature_normalize
{ "file_name": "specs/Spec.K256.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
signature: Lib.ByteSequence.lbytes 64 -> FStar.Pervasives.Native.option (Lib.ByteSequence.lbytes 64)
{ "end_col": 11, "end_line": 225, "start_col": 84, "start_line": 217 }
Prims.Tot
val binding_to_namedv (b: binding) : Tot namedv
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let binding_to_namedv (b : binding) : Tot namedv = { ppname = b.ppname; sort = seal b.sort; uniq = b.uniq }
val binding_to_namedv (b: binding) : Tot namedv let binding_to_namedv (b: binding) : Tot namedv =
false
null
false
{ ppname = b.ppname; sort = seal b.sort; uniq = b.uniq }
{ "checked_file": "FStar.Tactics.V2.SyntaxCoercions.fst.checked", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fst.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ "total" ]
[ "FStar.Tactics.NamedView.binding", "FStar.Reflection.V2.Data.Mknamedv_view", "FStar.Reflection.V2.Data.__proj__Mkbinding__item__uniq", "FStar.Sealed.seal", "FStar.Reflection.Types.typ", "FStar.Reflection.V2.Data.__proj__Mkbinding__item__sort", "FStar.Reflection.V2.Data.__proj__Mkbinding__item__ppname", "FStar.Tactics.NamedView.namedv" ]
[]
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; } [@@coercion] let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b)) [@@coercion] let binding_to_namedv (b : binding) : Tot namedv =
false
true
FStar.Tactics.V2.SyntaxCoercions.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val binding_to_namedv (b: binding) : Tot namedv
[]
FStar.Tactics.V2.SyntaxCoercions.binding_to_namedv
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "f4cbb7a38d67eeb13fbdb2f4fb8a44a65cbcdc1f", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
b: FStar.Tactics.NamedView.binding -> FStar.Tactics.NamedView.namedv
{ "end_col": 19, "end_line": 28, "start_col": 4, "start_line": 26 }
Prims.Tot
val binder_to_term (b: binder) : Tot term
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b))
val binder_to_term (b: binder) : Tot term let binder_to_term (b: binder) : Tot term =
false
null
false
pack (Tv_Var (binder_to_namedv b))
{ "checked_file": "FStar.Tactics.V2.SyntaxCoercions.fst.checked", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fst.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ "total" ]
[ "FStar.Tactics.NamedView.binder", "FStar.Tactics.NamedView.pack", "FStar.Tactics.NamedView.Tv_Var", "FStar.Tactics.V2.SyntaxCoercions.binder_to_namedv", "FStar.Tactics.NamedView.term" ]
[]
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; } [@@coercion]
false
true
FStar.Tactics.V2.SyntaxCoercions.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val binder_to_term (b: binder) : Tot term
[]
FStar.Tactics.V2.SyntaxCoercions.binder_to_term
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "f4cbb7a38d67eeb13fbdb2f4fb8a44a65cbcdc1f", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
b: FStar.Tactics.NamedView.binder -> FStar.Tactics.NamedView.term
{ "end_col": 36, "end_line": 21, "start_col": 2, "start_line": 21 }
Prims.Tot
val binder_to_namedv (b: binder) : Tot namedv
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; }
val binder_to_namedv (b: binder) : Tot namedv let binder_to_namedv (b: binder) : Tot namedv =
false
null
false
{ ppname = b.ppname; uniq = b.uniq; sort = seal b.sort }
{ "checked_file": "FStar.Tactics.V2.SyntaxCoercions.fst.checked", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fst.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ "total" ]
[ "FStar.Tactics.NamedView.binder", "FStar.Reflection.V2.Data.Mknamedv_view", "FStar.Tactics.NamedView.__proj__Mkbinder__item__uniq", "FStar.Sealed.seal", "FStar.Reflection.Types.typ", "FStar.Tactics.NamedView.__proj__Mkbinder__item__sort", "FStar.Tactics.NamedView.__proj__Mkbinder__item__ppname", "FStar.Tactics.NamedView.namedv" ]
[]
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv =
false
true
FStar.Tactics.V2.SyntaxCoercions.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val binder_to_namedv (b: binder) : Tot namedv
[]
FStar.Tactics.V2.SyntaxCoercions.binder_to_namedv
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "f4cbb7a38d67eeb13fbdb2f4fb8a44a65cbcdc1f", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
b: FStar.Tactics.NamedView.binder -> FStar.Tactics.NamedView.namedv
{ "end_col": 25, "end_line": 16, "start_col": 4, "start_line": 14 }
Prims.Tot
val namedv_to_term (x: namedv) : Tot term
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x)
val namedv_to_term (x: namedv) : Tot term let namedv_to_term (x: namedv) : Tot term =
false
null
false
pack (Tv_Var x)
{ "checked_file": "FStar.Tactics.V2.SyntaxCoercions.fst.checked", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fst.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ "total" ]
[ "FStar.Tactics.NamedView.namedv", "FStar.Tactics.NamedView.pack", "FStar.Tactics.NamedView.Tv_Var", "FStar.Tactics.NamedView.term" ]
[]
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion]
false
true
FStar.Tactics.V2.SyntaxCoercions.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val namedv_to_term (x: namedv) : Tot term
[]
FStar.Tactics.V2.SyntaxCoercions.namedv_to_term
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "f4cbb7a38d67eeb13fbdb2f4fb8a44a65cbcdc1f", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
x: FStar.Tactics.NamedView.namedv -> FStar.Tactics.NamedView.term
{ "end_col": 17, "end_line": 9, "start_col": 2, "start_line": 9 }
Prims.Tot
val binding_to_term (x: binding) : Tot term
[ { "abbrev": false, "full_module": "FStar.Sealed", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.NamedView", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.Builtins", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Tactics.V2", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let binding_to_term (x : binding) : Tot term = namedv_to_term (binding_to_namedv x)
val binding_to_term (x: binding) : Tot term let binding_to_term (x: binding) : Tot term =
false
null
false
namedv_to_term (binding_to_namedv x)
{ "checked_file": "FStar.Tactics.V2.SyntaxCoercions.fst.checked", "dependencies": [ "prims.fst.checked", "FStar.Tactics.NamedView.fsti.checked", "FStar.Tactics.Builtins.fst.checked", "FStar.Sealed.fsti.checked", "FStar.Pervasives.fsti.checked" ], "interface_file": false, "source_file": "FStar.Tactics.V2.SyntaxCoercions.fst" }
[ "total" ]
[ "FStar.Tactics.NamedView.binding", "FStar.Tactics.V2.SyntaxCoercions.namedv_to_term", "FStar.Tactics.V2.SyntaxCoercions.binding_to_namedv", "FStar.Tactics.NamedView.term" ]
[]
module FStar.Tactics.V2.SyntaxCoercions open FStar.Tactics.Builtins open FStar.Tactics.NamedView open FStar.Sealed [@@coercion] let namedv_to_term (x : namedv) : Tot term = pack (Tv_Var x) [@@coercion] let binder_to_namedv (b : binder) : Tot namedv = { ppname = b.ppname; uniq = b.uniq; sort = seal b.sort; } [@@coercion] let binder_to_term (b : binder) : Tot term = pack (Tv_Var (binder_to_namedv b)) [@@coercion] let binding_to_namedv (b : binding) : Tot namedv = { ppname = b.ppname; sort = seal b.sort; uniq = b.uniq } [@@coercion]
false
true
FStar.Tactics.V2.SyntaxCoercions.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": true, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val binding_to_term (x: binding) : Tot term
[]
FStar.Tactics.V2.SyntaxCoercions.binding_to_term
{ "file_name": "ulib/FStar.Tactics.V2.SyntaxCoercions.fst", "git_rev": "f4cbb7a38d67eeb13fbdb2f4fb8a44a65cbcdc1f", "git_url": "https://github.com/FStarLang/FStar.git", "project_name": "FStar" }
x: FStar.Tactics.NamedView.binding -> FStar.Tactics.NamedView.term
{ "end_col": 38, "end_line": 33, "start_col": 2, "start_line": 33 }
Prims.Tot
val encryption_context (cs:ciphersuite) : Type0
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs
val encryption_context (cs:ciphersuite) : Type0 let encryption_context (cs: ciphersuite) =
false
null
false
key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "FStar.Pervasives.Native.tuple4", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.exporter_secret_s" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false
false
true
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val encryption_context (cs:ciphersuite) : Type0
[]
Spec.Agile.HPKE.encryption_context
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> Type0
{ "end_col": 112, "end_line": 331, "start_col": 42, "start_line": 331 }
Prims.Tot
val pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1}
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1)
val pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1} let pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1} =
false
null
false
assert_norm (pow2 32 * pow2 3 <= pow2 61 - 1)
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Prims.pow2", "Prims.op_Subtraction" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pow2_35_less_than_pow2_61:_: unit{pow2 32 * pow2 3 <= pow2 61 - 1}
[]
Spec.Agile.HPKE.pow2_35_less_than_pow2_61
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
_: Prims.unit{Prims.pow2 32 * Prims.pow2 3 <= Prims.pow2 61 - 1}
{ "end_col": 118, "end_line": 16, "start_col": 74, "start_line": 16 }
Prims.Tot
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let default_psk_id = lbytes_empty
let default_psk_id =
false
null
false
lbytes_empty
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "Lib.ByteSequence.lbytes_empty" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val default_psk_id : Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
[]
Spec.Agile.HPKE.default_psk_id
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
Lib.Sequence.lseq (Lib.IntTypes.int_t Lib.IntTypes.U8 Lib.IntTypes.SEC) 0
{ "end_col": 33, "end_line": 307, "start_col": 21, "start_line": 307 }
Prims.Tot
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let set_seq (cs:ciphersuite) (ctx:encryption_context cs) (seq:seq_aead_s cs) = let key, base_nonce, _, exp_sec = ctx in (key, base_nonce, seq, exp_sec)
let set_seq (cs: ciphersuite) (ctx: encryption_context cs) (seq: seq_aead_s cs) =
false
null
false
let key, base_nonce, _, exp_sec = ctx in (key, base_nonce, seq, exp_sec)
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.encryption_context", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.exporter_secret_s", "FStar.Pervasives.Native.Mktuple4", "FStar.Pervasives.Native.tuple4" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false // key and nonce are zero-length if AEAD is Export-Only let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs val key_schedule: cs:ciphersuite -> m:mode -> shared_secret:key_kem_s cs -> info:info_s cs -> opsk:option (psk_s cs & psk_id_s cs) -> Pure (encryption_context cs) (requires verify_psk_inputs cs m opsk) (ensures fun _ -> True) #set-options "--z3rlimit 500 --fuel 0 --ifuel 2" let key_schedule_core (cs:ciphersuite) (m:mode) (shared_secret:key_kem_s cs) (info:info_s cs) (opsk:option (psk_s cs & psk_id_s cs)) : (lbytes (size_ks_ctx cs) & exporter_secret_s cs & (lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) = let (psk, psk_id) = match opsk with | None -> (default_psk, default_psk_id) | Some (psk, psk_id) -> (psk, psk_id) in let psk_id_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_psk_id_hash psk_id in let info_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_info_hash info in let context = build_context cs m psk_id_hash info_hash in let secret = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) shared_secret label_secret psk in let exporter_secret = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_exp context (size_kdf cs) in context, exporter_secret, secret let key_schedule_end (cs:ciphersuite) (m:mode) (context:lbytes (size_ks_ctx cs)) (exporter_secret:exporter_secret_s cs) (secret:(lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) : encryption_context cs = if is_valid_not_export_only_ciphersuite cs then ( let key = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_key context (size_aead_key cs) in let base_nonce = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_base_nonce context (size_aead_nonce cs) in (key, base_nonce, 0, exporter_secret) ) else ( (* if AEAD is Export-Only, then skip computation of key and base_nonce *) assert (size_aead_key cs = 0); assert (size_aead_nonce cs = 0); (lbytes_empty, lbytes_empty, 0, exporter_secret)) let key_schedule cs m shared_secret info opsk = let context, exporter_secret, secret = key_schedule_core cs m shared_secret info opsk in key_schedule_end cs m context exporter_secret secret let key_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let key, _, _, _ = ctx in key let base_nonce_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, base_nonce, _, _ = ctx in base_nonce let seq_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, _, seq, _ = ctx in seq let exp_sec_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, _, _, exp_sec = ctx in exp_sec
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 2, "max_fuel": 0, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 500, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val set_seq : cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> seq: Spec.Agile.HPKE.seq_aead_s cs -> ((Spec.Agile.HPKE.key_aead_s cs * Spec.Agile.HPKE.nonce_aead_s cs) * Spec.Agile.HPKE.seq_aead_s cs) * Spec.Agile.HPKE.exporter_secret_s cs
[]
Spec.Agile.HPKE.set_seq
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> seq: Spec.Agile.HPKE.seq_aead_s cs -> ((Spec.Agile.HPKE.key_aead_s cs * Spec.Agile.HPKE.nonce_aead_s cs) * Spec.Agile.HPKE.seq_aead_s cs) * Spec.Agile.HPKE.exporter_secret_s cs
{ "end_col": 33, "end_line": 401, "start_col": 78, "start_line": 399 }
Prims.Tot
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let seq_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, _, seq, _ = ctx in seq
let seq_of_ctx (cs: ciphersuite) (ctx: encryption_context cs) =
false
null
false
let _, _, seq, _ = ctx in seq
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.encryption_context", "Spec.Agile.HPKE.key_aead_s", "Spec.Agile.HPKE.nonce_aead_s", "Spec.Agile.HPKE.seq_aead_s", "Spec.Agile.HPKE.exporter_secret_s" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false // key and nonce are zero-length if AEAD is Export-Only let encryption_context (cs:ciphersuite) = key_aead_s cs & nonce_aead_s cs & seq_aead_s cs & exporter_secret_s cs val key_schedule: cs:ciphersuite -> m:mode -> shared_secret:key_kem_s cs -> info:info_s cs -> opsk:option (psk_s cs & psk_id_s cs) -> Pure (encryption_context cs) (requires verify_psk_inputs cs m opsk) (ensures fun _ -> True) #set-options "--z3rlimit 500 --fuel 0 --ifuel 2" let key_schedule_core (cs:ciphersuite) (m:mode) (shared_secret:key_kem_s cs) (info:info_s cs) (opsk:option (psk_s cs & psk_id_s cs)) : (lbytes (size_ks_ctx cs) & exporter_secret_s cs & (lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) = let (psk, psk_id) = match opsk with | None -> (default_psk, default_psk_id) | Some (psk, psk_id) -> (psk, psk_id) in let psk_id_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_psk_id_hash psk_id in let info_hash = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) lbytes_empty label_info_hash info in let context = build_context cs m psk_id_hash info_hash in let secret = labeled_extract (hash_of_cs cs) (suite_id_hpke cs) shared_secret label_secret psk in let exporter_secret = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_exp context (size_kdf cs) in context, exporter_secret, secret let key_schedule_end (cs:ciphersuite) (m:mode) (context:lbytes (size_ks_ctx cs)) (exporter_secret:exporter_secret_s cs) (secret:(lbytes (Spec.Hash.Definitions.hash_length (hash_of_cs cs)))) : encryption_context cs = if is_valid_not_export_only_ciphersuite cs then ( let key = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_key context (size_aead_key cs) in let base_nonce = labeled_expand (hash_of_cs cs) (suite_id_hpke cs) secret label_base_nonce context (size_aead_nonce cs) in (key, base_nonce, 0, exporter_secret) ) else ( (* if AEAD is Export-Only, then skip computation of key and base_nonce *) assert (size_aead_key cs = 0); assert (size_aead_nonce cs = 0); (lbytes_empty, lbytes_empty, 0, exporter_secret)) let key_schedule cs m shared_secret info opsk = let context, exporter_secret, secret = key_schedule_core cs m shared_secret info opsk in key_schedule_end cs m context exporter_secret secret let key_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let key, _, _, _ = ctx in key let base_nonce_of_ctx (cs:ciphersuite) (ctx:encryption_context cs) = let _, base_nonce, _, _ = ctx in base_nonce
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 0, "initial_ifuel": 2, "max_fuel": 0, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 500, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val seq_of_ctx : cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.seq_aead_s cs
[]
Spec.Agile.HPKE.seq_of_ctx
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> ctx: Spec.Agile.HPKE.encryption_context cs -> Spec.Agile.HPKE.seq_aead_s cs
{ "end_col": 31, "end_line": 394, "start_col": 61, "start_line": 393 }
Prims.Tot
val pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1}
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1)
val pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1} let pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1} =
false
null
false
assert_norm (pow2 32 * pow2 3 <= pow2 125 - 1)
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "FStar.Pervasives.assert_norm", "Prims.b2t", "Prims.op_LessThanOrEqual", "FStar.Mul.op_Star", "Prims.pow2", "Prims.op_Subtraction" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952)
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val pow2_35_less_than_pow2_125:_: unit{pow2 32 * pow2 3 <= pow2 125 - 1}
[]
Spec.Agile.HPKE.pow2_35_less_than_pow2_125
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
_: Prims.unit{Prims.pow2 32 * Prims.pow2 3 <= Prims.pow2 125 - 1}
{ "end_col": 121, "end_line": 17, "start_col": 76, "start_line": 17 }
Prims.Tot
val verify_psk_inputs (cs: ciphersuite) (m: mode) (opsk: option (psk_s cs & psk_id_s cs)) : bool
[ { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": true, "full_module": "Spec.Agile.HKDF", "short_module": "HKDF" }, { "abbrev": true, "full_module": "Spec.Agile.Hash", "short_module": "Hash" }, { "abbrev": true, "full_module": "Spec.Agile.AEAD", "short_module": "AEAD" }, { "abbrev": true, "full_module": "Spec.Agile.DH", "short_module": "DH" }, { "abbrev": false, "full_module": "Lib.ByteSequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.Sequence", "short_module": null }, { "abbrev": false, "full_module": "Lib.RawIntTypes", "short_module": null }, { "abbrev": false, "full_module": "Lib.IntTypes", "short_module": null }, { "abbrev": false, "full_module": "FStar.Mul", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "Spec.Agile", "short_module": null }, { "abbrev": false, "full_module": "FStar.Pervasives", "short_module": null }, { "abbrev": false, "full_module": "Prims", "short_module": null }, { "abbrev": false, "full_module": "FStar", "short_module": null } ]
false
let verify_psk_inputs (cs:ciphersuite) (m:mode) (opsk:option(psk_s cs & psk_id_s cs)) : bool = match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false
val verify_psk_inputs (cs: ciphersuite) (m: mode) (opsk: option (psk_s cs & psk_id_s cs)) : bool let verify_psk_inputs (cs: ciphersuite) (m: mode) (opsk: option (psk_s cs & psk_id_s cs)) : bool =
false
null
false
match (m, opsk) with | Base, None -> true | PSK, Some _ -> true | Auth, None -> true | AuthPSK, Some _ -> true | _, _ -> false
{ "checked_file": "Spec.Agile.HPKE.fst.checked", "dependencies": [ "Spec.P256.fst.checked", "Spec.Loops.fst.checked", "Spec.Hash.Definitions.fst.checked", "Spec.Agile.HMAC.fsti.checked", "Spec.Agile.HKDF.fsti.checked", "Spec.Agile.Hash.fsti.checked", "Spec.Agile.DH.fst.checked", "Spec.Agile.AEAD.fsti.checked", "prims.fst.checked", "Lib.Sequence.fsti.checked", "Lib.RawIntTypes.fsti.checked", "Lib.IntTypes.fsti.checked", "Lib.ByteSequence.fsti.checked", "FStar.Seq.fst.checked", "FStar.Pervasives.Native.fst.checked", "FStar.Pervasives.fsti.checked", "FStar.Mul.fst.checked" ], "interface_file": true, "source_file": "Spec.Agile.HPKE.fst" }
[ "total" ]
[ "Spec.Agile.HPKE.ciphersuite", "Spec.Agile.HPKE.mode", "FStar.Pervasives.Native.option", "FStar.Pervasives.Native.tuple2", "Spec.Agile.HPKE.psk_s", "Spec.Agile.HPKE.psk_id_s", "FStar.Pervasives.Native.Mktuple2", "Prims.bool" ]
[]
module Spec.Agile.HPKE open FStar.Mul open Lib.IntTypes open Lib.RawIntTypes open Lib.Sequence open Lib.ByteSequence module DH = Spec.Agile.DH module AEAD = Spec.Agile.AEAD module Hash = Spec.Agile.Hash module HKDF = Spec.Agile.HKDF let pow2_61 : _:unit{pow2 61 == 2305843009213693952} = assert_norm(pow2 61 == 2305843009213693952) let pow2_35_less_than_pow2_61 : _:unit{pow2 32 * pow2 3 <= pow2 61 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 61 - 1) let pow2_35_less_than_pow2_125 : _:unit{pow2 32 * pow2 3 <= pow2 125 - 1} = assert_norm(pow2 32 * pow2 3 <= pow2 125 - 1) #set-options "--z3rlimit 20 --fuel 0 --ifuel 1" /// Types val id_kem: cs:ciphersuite -> Tot (lbytes 2) let id_kem cs = let kem_dh, kem_hash, _, _ = cs in match kem_dh, kem_hash with | DH.DH_P256, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 16) | DH.DH_Curve25519, Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 32) val id_kdf: cs:ciphersuite -> Tot (lbytes 2) let id_kdf cs = let _, _, _, h = cs in match h with | Hash.SHA2_256 -> create 1 (u8 0) @| create 1 (u8 1) | Hash.SHA2_384 -> create 1 (u8 0) @| create 1 (u8 2) | Hash.SHA2_512 -> create 1 (u8 0) @| create 1 (u8 3) val id_aead: cs:ciphersuite -> Tot (lbytes 2) let id_aead cs = let _, _, a, _ = cs in match a with | Seal AEAD.AES128_GCM -> create 1 (u8 0) @| create 1 (u8 1) | Seal AEAD.AES256_GCM -> create 1 (u8 0) @| create 1 (u8 2) | Seal AEAD.CHACHA20_POLY1305 -> create 1 (u8 0) @| create 1 (u8 3) | ExportOnly -> create 1 (u8 255) @| create 1 (u8 255) val suite_id_kem: cs:ciphersuite -> Tot (lbytes size_suite_id_kem) let suite_id_kem cs = Seq.append label_KEM (id_kem cs) val suite_id_hpke: cs:ciphersuite -> Tot (lbytes size_suite_id_hpke) let suite_id_hpke cs = Seq.append label_HPKE (id_kem cs @| id_kdf cs @| id_aead cs) val id_of_mode: m:mode -> Tot (lbytes size_mode_identifier) let id_of_mode m = match m with | Base -> create 1 (u8 0) | PSK -> create 1 (u8 1) | Auth -> create 1 (u8 2) | AuthPSK -> create 1 (u8 3) val labeled_extract: a:hash_algorithm -> suite_id:bytes -> salt:bytes -> label:bytes -> ikm:bytes -> Pure (lbytes (Spec.Hash.Definitions.hash_length a)) (requires Spec.Agile.HMAC.keysized a (Seq.length salt) /\ labeled_extract_ikm_length_pred a (Seq.length suite_id + Seq.length label + Seq.length ikm)) (ensures fun _ -> True) let labeled_extract a suite_id salt label ikm = let labeled_ikm1 = Seq.append label_version suite_id in let labeled_ikm2 = Seq.append labeled_ikm1 label in let labeled_ikm3 = Seq.append labeled_ikm2 ikm in HKDF.extract a salt labeled_ikm3 val labeled_expand: a:hash_algorithm -> suite_id:bytes -> prk:bytes -> label:bytes -> info:bytes -> l:size_nat -> Pure (lbytes l) (requires Spec.Hash.Definitions.hash_length a <= Seq.length prk /\ Spec.Agile.HMAC.keysized a (Seq.length prk) /\ labeled_expand_info_length_pred a (Seq.length suite_id + Seq.length label + Seq.length info) /\ HKDF.expand_output_length_pred a l) (ensures fun _ -> True) let labeled_expand a suite_id prk label info l = let labeled_info1 = nat_to_bytes_be 2 l in let labeled_info2 = Seq.append labeled_info1 label_version in let labeled_info3 = Seq.append labeled_info2 suite_id in let labeled_info4 = Seq.append labeled_info3 label in let labeled_info5 = Seq.append labeled_info4 info in HKDF.expand a prk labeled_info5 l let extract_and_expand_dh_pred (cs:ciphersuite) (dh_length:nat) = labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + dh_length) let extract_and_expand_ctx_pred (cs:ciphersuite) (ctx_length:nat) = labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + ctx_length) val extract_and_expand: cs:ciphersuite -> dh:bytes -> kem_context:bytes -> Pure (key_kem_s cs) (requires extract_and_expand_dh_pred cs (Seq.length dh) /\ extract_and_expand_ctx_pred cs (Seq.length kem_context)) (ensures fun _ -> True) let extract_and_expand cs dh kem_context = let eae_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_eae_prk dh in labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) eae_prk label_shared_secret kem_context (size_kem_key cs) let deserialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Extract the point coordinates by removing the first representation byte | DH.DH_P256 -> sub pk 1 64 let serialize_public_key cs pk = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> pk // Add the first representation byte to the point coordinates | DH.DH_P256 -> create 1 (u8 4) @| pk val dkp_nist_p: cs:ciphersuite -> lbytes (size_kem_kdf cs) -> counter:uint8 -> Tot (option (key_dh_secret_s cs & key_dh_public_s cs)) (decreases 255 - v counter) let rec dkp_nist_p cs dkp_prk counter = let counterbyte = nat_to_intseq_be #U8 #SEC 1 (v counter) in let bytes = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_candidate counterbyte (size_dh_key cs) in let bytes = Lib.Sequence.map2 (logand #U8 #SEC) bytes (Seq.create (size_dh_key cs) (u8 255)) in let sk = nat_from_intseq_be #U8 #SEC bytes in if sk = 0 || sk >= Spec.P256.prime then if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) else match DH.secret_to_public (kem_dh_of_cs cs) bytes with | Some pk -> Some (bytes, serialize_public_key cs pk) | None -> if (v counter) = 255 then None else dkp_nist_p cs dkp_prk (counter +! (u8 1)) let derive_key_pair cs ikm = match kem_dh_of_cs cs with | DH.DH_Curve25519 -> begin let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in let sk = labeled_expand (kem_hash_of_cs cs) (suite_id_kem cs) dkp_prk label_sk lbytes_empty (size_dh_key cs) in match DH.secret_to_public (kem_dh_of_cs cs) sk with | Some pk -> Some (sk, serialize_public_key cs pk) end | DH.DH_P256 -> let dkp_prk = labeled_extract (kem_hash_of_cs cs) (suite_id_kem cs) lbytes_empty label_dkp_prk ikm in dkp_nist_p cs dkp_prk (u8 0) val prepare_dh: cs:ciphersuite -> DH.serialized_point (kem_dh_of_cs cs) -> Tot (lbytes 32) let prepare_dh cs dh = match (kem_dh_of_cs cs) with | DH.DH_Curve25519 -> serialize_public_key cs dh | DH.DH_P256 -> sub dh 0 32 val encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let encap cs skE pkR = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> let enc = serialize_public_key cs pkE in match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some dh -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret:key_kem_s cs = extract_and_expand cs dhm kem_context in Some (shared_secret, enc) val decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> Tot (option (key_kem_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let decap cs enc skR = let _ = allow_inversion Spec.Agile.DH.algorithm in let _ = allow_inversion Spec.Agile.Hash.hash_alg in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some dh -> match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let kem_context = concat enc pkRm in let dhm = prepare_dh cs dh in assert (Seq.length kem_context = 2*size_dh_public cs); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); let shared_secret = extract_and_expand cs dhm kem_context in Some (shared_secret) val auth_encap: cs:ciphersuite -> skE:key_dh_secret_s cs -> pkR:DH.serialized_point (kem_dh_of_cs cs) -> skS:key_dh_secret_s cs -> Tot (option (key_kem_s cs & key_dh_public_s cs)) #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_encap cs skE pkR skS = let _ = allow_inversion Spec.Agile.DH.algorithm in match DH.secret_to_public (kem_dh_of_cs cs) skE with | None -> None | Some pkE -> match DH.dh (kem_dh_of_cs cs) skE pkR with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skS pkR with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in // TODO Do not put 32 literally let dh = concat #uint8 #32 #32 esm ssm in let enc = serialize_public_key cs pkE in match DH.secret_to_public (kem_dh_of_cs cs) skS with | None -> None | Some pkS -> let pkSm = serialize_public_key cs pkS in let pkRm = serialize_public_key cs pkR in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); // TODO Do not put 64 literally assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret, enc) #reset-options val auth_decap: cs: ciphersuite -> enc: key_dh_public_s cs -> skR: key_dh_secret_s cs -> pkS: DH.serialized_point (kem_dh_of_cs cs) -> Tot (option (key_kem_s cs)) #restart-solver #set-options "--z3rlimit 100 --fuel 0 --ifuel 0" let auth_decap cs enc skR pkS = let _ = allow_inversion Spec.Agile.DH.algorithm in let pkE = deserialize_public_key cs enc in match DH.dh (kem_dh_of_cs cs) skR pkE with | None -> None | Some es -> match DH.dh (kem_dh_of_cs cs) skR pkS with | None -> None | Some ss -> let esm = prepare_dh cs es in let ssm = prepare_dh cs ss in let dh = concat #uint8 #32 #32 esm ssm in match DH.secret_to_public (kem_dh_of_cs cs) skR with | None -> None | Some pkR -> let pkRm = serialize_public_key cs pkR in let pkSm = serialize_public_key cs pkS in let kem_context = concat enc (concat pkRm pkSm) in assert (Seq.length kem_context = 3*size_dh_public cs); assert (labeled_expand_info_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_shared_secret + Seq.length kem_context)); assert (extract_and_expand_ctx_pred cs (Seq.length kem_context)); assert (Seq.length dh = 64); assert (labeled_extract_ikm_length_pred (kem_hash_of_cs cs) (size_suite_id_kem + size_label_eae_prk + Seq.length dh)); assert (extract_and_expand_dh_pred cs (Seq.length dh)); let shared_secret = extract_and_expand cs dh kem_context in Some (shared_secret) #reset-options let default_psk = lbytes_empty let default_psk_id = lbytes_empty val build_context: cs:ciphersuite -> m:mode -> psk_id_hash:lbytes (size_kdf cs) -> info_hash:lbytes (size_kdf cs) -> Tot (lbytes (size_ks_ctx cs)) let build_context cs m psk_id_hash info_hash = let context = id_of_mode m in let context = Seq.append context psk_id_hash in let context = Seq.append context info_hash in context
false
false
Spec.Agile.HPKE.fst
{ "detail_errors": false, "detail_hint_replay": false, "initial_fuel": 2, "initial_ifuel": 1, "max_fuel": 8, "max_ifuel": 2, "no_plugins": false, "no_smt": false, "no_tactics": false, "quake_hi": 1, "quake_keep": false, "quake_lo": 1, "retry": false, "reuse_hint_for": null, "smtencoding_elim_box": false, "smtencoding_l_arith_repr": "boxwrap", "smtencoding_nl_arith_repr": "boxwrap", "smtencoding_valid_elim": false, "smtencoding_valid_intro": true, "tcnorm": true, "trivial_pre_for_unannotated_effectful_fns": false, "z3cliopt": [], "z3refresh": false, "z3rlimit": 5, "z3rlimit_factor": 1, "z3seed": 0, "z3smtopt": [], "z3version": "4.8.5" }
null
val verify_psk_inputs (cs: ciphersuite) (m: mode) (opsk: option (psk_s cs & psk_id_s cs)) : bool
[]
Spec.Agile.HPKE.verify_psk_inputs
{ "file_name": "specs/Spec.Agile.HPKE.fst", "git_rev": "12c5e9539c7e3c366c26409d3b86493548c4483e", "git_url": "https://github.com/hacl-star/hacl-star.git", "project_name": "hacl-star" }
cs: Spec.Agile.HPKE.ciphersuite -> m: Spec.Agile.HPKE.mode -> opsk: FStar.Pervasives.Native.option (Spec.Agile.HPKE.psk_s cs * Spec.Agile.HPKE.psk_id_s cs) -> Prims.bool
{ "end_col": 17, "end_line": 328, "start_col": 2, "start_line": 323 }