Crypto: drop libsodium

We now use simpler OCaml bindings much easier to review.
This commit is contained in:
Vincent Bernardoff 2018-02-04 18:39:34 +01:00 committed by Grégoire Henry
parent 8bec8b7b9c
commit e1d1292c09
45 changed files with 3550 additions and 259 deletions

View File

@ -231,157 +231,167 @@ opam:04:tezos-error-monad:
variables: variables:
package: tezos-error-monad package: tezos-error-monad
opam:05:tezos-rpc: opam:05:blake2:
<<: *opam_definition
variables:
package: blake2
opam:06:tezos-rpc:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-rpc package: tezos-rpc
opam:06:tezos-stdlib-lwt: opam:07:tezos-stdlib-lwt:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-stdlib-lwt package: tezos-stdlib-lwt
opam:07:tezos-crypto: opam:08:tweetnacl:
<<: *opam_definition
variables:
package: tweetnacl
opam:09:tezos-crypto:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-crypto package: tezos-crypto
opam:08:tezos-micheline: opam:10:tezos-micheline:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-micheline package: tezos-micheline
opam:09:ocplib-resto-cohttp: opam:11:ocplib-resto-cohttp:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: ocplib-resto-cohttp package: ocplib-resto-cohttp
opam:10:tezos-base: opam:12:tezos-base:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-base package: tezos-base
opam:11:irmin-leveldb: opam:13:irmin-leveldb:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: irmin-leveldb package: irmin-leveldb
opam:12:tezos-protocol-environment-sigs: opam:14:tezos-protocol-environment-sigs:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-environment-sigs package: tezos-protocol-environment-sigs
opam:13:tezos-rpc-http: opam:15:tezos-rpc-http:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-rpc-http package: tezos-rpc-http
opam:14:tezos-shell-services: opam:16:tezos-shell-services:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-shell-services package: tezos-shell-services
opam:15:tezos-storage: opam:17:tezos-storage:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-storage package: tezos-storage
opam:16:tezos-protocol-compiler: opam:18:tezos-protocol-compiler:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-compiler package: tezos-protocol-compiler
opam:17:tezos-client-base: opam:19:tezos-client-base:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-client-base package: tezos-client-base
opam:18:tezos-protocol-alpha: opam:20:tezos-protocol-alpha:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-alpha package: tezos-protocol-alpha
opam:19:tezos-protocol-environment-client: opam:21:tezos-protocol-environment-client:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-environment-client package: tezos-protocol-environment-client
opam:20:tezos-p2p: opam:22:tezos-protocol-genesis:
<<: *opam_definition
variables:
package: tezos-p2p
opam:21:tezos-protocol-updater:
<<: *opam_definition
variables:
package: tezos-protocol-updater
opam:22:tezos-client-alpha:
<<: *opam_definition
variables:
package: tezos-client-alpha
opam:23:tezos-protocol-genesis:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-genesis package: tezos-protocol-genesis
opam:24:tezos-shell: opam:23:tezos-protocol-updater:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-shell package: tezos-protocol-updater
opam:24:tezos-p2p:
<<: *opam_definition
variables:
package: tezos-p2p
opam:25:ocplib-resto-json: opam:25:ocplib-resto-json:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: ocplib-resto-json package: ocplib-resto-json
opam:26:tezos-client-genesis: opam:26:tezos-client-alpha:
<<: *opam_definition
variables:
package: tezos-client-alpha
opam:27:tezos-client-genesis:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-client-genesis package: tezos-client-genesis
opam:27:tezos-embedded-protocol-alpha: opam:28:tezos-embedded-protocol-alpha:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-embedded-protocol-alpha package: tezos-embedded-protocol-alpha
opam:28:tezos-embedded-protocol-demo: opam:29:tezos-embedded-protocol-demo:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-embedded-protocol-demo package: tezos-embedded-protocol-demo
opam:29:tezos-embedded-protocol-genesis: opam:30:tezos-embedded-protocol-genesis:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-embedded-protocol-genesis package: tezos-embedded-protocol-genesis
opam:30:ocplib-ezresto: opam:31:tezos-shell:
<<: *opam_definition
variables:
package: tezos-shell
opam:32:ocplib-ezresto:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: ocplib-ezresto package: ocplib-ezresto
opam:31:tezos-client: opam:33:tezos-client:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-client package: tezos-client
opam:32:tezos-node: opam:34:tezos-node:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-node package: tezos-node
opam:33:tezos-test-helpers: opam:35:tezos-test-helpers:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-test-helpers package: tezos-test-helpers
opam:34:ocplib-ezresto-directory: opam:36:ocplib-ezresto-directory:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: ocplib-ezresto-directory package: ocplib-ezresto-directory
opam:35:tezos-protocol-demo: opam:37:tezos-protocol-demo:
<<: *opam_definition <<: *opam_definition
variables: variables:
package: tezos-protocol-demo package: tezos-protocol-demo

View File

@ -10,12 +10,12 @@ export OPAMYES=yes
### Temporary HACK ### Temporary HACK
## Should be in sync with `opam-unpin.sh` ## Should be in sync with `opam-unpin.sh`
opam pin add --no-action --dev-repo sodium
opam pin add --no-action --dev-repo ocplib-json-typed opam pin add --no-action --dev-repo ocplib-json-typed
## Unpin package we used to pin... ## Unpin package we used to pin...
opam pin remove --no-action ocp-ocamlres opam pin remove --no-action ocp-ocamlres
opam pin remove --no-action ocplib-resto opam pin remove --no-action ocplib-resto
opam pin remove --no-action sodium
### End of temporary HACK ### End of temporary HACK

View File

@ -39,11 +39,11 @@ let block_forged ?prev ops =
operations = ops } in operations = ops } in
let open Proto in let open Proto in
let generate_proof_of_work_nonce () = let generate_proof_of_work_nonce () =
Sodium.Random.Bigbytes.generate Rand.generate
Proto.Tezos_context.Constants.proof_of_work_nonce_size in Proto.Tezos_context.Constants.proof_of_work_nonce_size in
let generate_seed_nonce () = let generate_seed_nonce () =
match Proto.Nonce_storage.of_bytes @@ match Proto.Nonce_storage.of_bytes @@
Sodium.Random.Bigbytes.generate Rand.generate
Proto.Tezos_context.Constants.nonce_length with Proto.Tezos_context.Constants.nonce_length with
| Error _ -> assert false | Error _ -> assert false
| Ok nonce -> nonce in | Ok nonce -> nonce in

View File

@ -44,7 +44,6 @@ let get_commands_for_version ctxt block protocol =
(* Main (lwt) entry *) (* Main (lwt) entry *)
let main ?only_commands () = let main ?only_commands () =
Random.self_init () ; Random.self_init () ;
Sodium.Random.stir () ;
Lwt.catch begin fun () -> Lwt.catch begin fun () ->
let original_args = List.tl (Array.to_list Sys.argv) in let original_args = List.tl (Array.to_list Sys.argv) in
begin begin

View File

@ -7,17 +7,6 @@
(* *) (* *)
(**************************************************************************) (**************************************************************************)
let () =
let expected_primitive = "blake2b"
and primitive = Sodium.Generichash.primitive in
if primitive <> expected_primitive then begin
Printf.eprintf
"FATAL ERROR: \
invalid value for Sodium.Generichash.primitive: %S (expected %S)@."
primitive expected_primitive ;
exit 1
end
(*-- Type specific Hash builder ---------------------------------------------*) (*-- Type specific Hash builder ---------------------------------------------*)
module type Name = sig module type Name = sig
@ -32,8 +21,8 @@ module type PrefixedName = sig
end end
module Make_minimal (K : Name) = struct module Make_minimal (K : Name) = struct
open Blake2
type t = Sodium.Generichash.hash type t = Blake2b.hash
include K include K
@ -46,7 +35,7 @@ module Make_minimal (K : Name) = struct
if String.length s <> size then if String.length s <> size then
None None
else else
Some (Sodium.Generichash.Bytes.to_hash (Bytes.of_string s)) Some (Blake2b.Hash (Cstruct.of_string s))
let of_string_exn s = let of_string_exn s =
match of_string s with match of_string s with
| None -> | None ->
@ -55,7 +44,7 @@ module Make_minimal (K : Name) = struct
K.name (String.length s) in K.name (String.length s) in
raise (Invalid_argument msg) raise (Invalid_argument msg)
| Some h -> h | Some h -> h
let to_string s = Bytes.to_string (Sodium.Generichash.Bytes.of_hash s) let to_string (Blake2b.Hash h) = Cstruct.to_string h
let of_hex s = of_string (Hex.to_string (`Hex s)) let of_hex s = of_string (Hex.to_string (`Hex s))
let of_hex_exn s = of_string_exn (Hex.to_string (`Hex s)) let of_hex_exn s = of_string_exn (Hex.to_string (`Hex s))
@ -63,14 +52,14 @@ module Make_minimal (K : Name) = struct
let `Hex s = Hex.of_string (to_string s) in let `Hex s = Hex.of_string (to_string s) in
s s
let compare = Sodium.Generichash.compare let compare (Blake2b.Hash h1) (Blake2b.Hash h2) = Cstruct.compare h1 h2
let equal x y = compare x y = 0 let equal x y = compare x y = 0
let of_bytes b = let of_bytes b =
if MBytes.length b <> size then if MBytes.length b <> size then
None None
else else
Some (Sodium.Generichash.Bigbytes.to_hash b) Some (Blake2b.Hash (Cstruct.of_bigarray b))
let of_bytes_exn b = let of_bytes_exn b =
match of_bytes b with match of_bytes b with
| None -> | None ->
@ -79,24 +68,20 @@ module Make_minimal (K : Name) = struct
K.name (MBytes.length b) in K.name (MBytes.length b) in
raise (Invalid_argument msg) raise (Invalid_argument msg)
| Some h -> h | Some h -> h
let to_bytes = Sodium.Generichash.Bigbytes.of_hash let to_bytes (Blake2b.Hash h) = Cstruct.to_bigarray h
let read src off = of_bytes_exn @@ MBytes.sub src off size let read src off = of_bytes_exn @@ MBytes.sub src off size
let write dst off h = MBytes.blit (to_bytes h) 0 dst off size let write dst off h = MBytes.blit (to_bytes h) 0 dst off size
let hash_bytes l = let hash_bytes l =
let open Sodium.Generichash in let state = Blake2b.init size in
let state = init ~size () in List.iter (fun b -> Blake2b.update state (Cstruct.of_bigarray b)) l ;
List.iter (Bigbytes.update state) l ; Blake2b.final state
final state
let hash_string l = let hash_string l =
let open Sodium.Generichash in let state = Blake2b.init size in
let state = init ~size () in List.iter (fun s -> Blake2b.update state (Cstruct.of_string s)) l ;
List.iter Blake2b.final state
(fun s -> Bytes.update state (BytesLabels.unsafe_of_string s))
l ;
final state
let path_length = 6 let path_length = 6
let to_path key l = let to_path key l =
@ -125,11 +110,7 @@ module Make_minimal (K : Name) = struct
module Table = struct module Table = struct
include Hashtbl.Make(struct include Hashtbl.Make(struct
type nonrec t = t type nonrec t = t
let hash s = let hash (Blake2b.Hash h) = Int64.to_int (Cstruct.BE.get_uint64 h 0)
Int64.to_int
(EndianString.BigEndian.get_int64
(Bytes.unsafe_to_string (Sodium.Generichash.Bytes.of_hash s))
0)
let equal = equal let equal = equal
end) end)
end end

View File

@ -9,10 +9,12 @@
(** Tezos - X25519/XSalsa20-Poly1305 cryptography *) (** Tezos - X25519/XSalsa20-Poly1305 cryptography *)
type secret_key = Sodium.Box.secret_key open Tweetnacl
type public_key = Sodium.Box.public_key
type channel_key = Sodium.Box.channel_key type secret_key = Box.secret Box.key
type nonce = Sodium.Box.nonce type public_key = Box.public Box.key
type channel_key = Box.combined Box.key
type nonce = Nonce.t
type target = Z.t type target = Z.t
module Public_key_hash = Blake2B.Make (Base58) (struct module Public_key_hash = Blake2B.Make (Base58) (struct
@ -26,23 +28,50 @@ let () =
Base58.check_encoded_prefix Public_key_hash.b58check_encoding "id" 30 Base58.check_encoded_prefix Public_key_hash.b58check_encoding "id" 30
let hash pk = let hash pk =
Public_key_hash.hash_bytes [Sodium.Box.Bigbytes.of_public_key pk] Public_key_hash.hash_bytes [Cstruct.to_bigarray (Box.to_cstruct pk)]
let zerobytes = Box.zerobytes
let boxzerobytes = Box.boxzerobytes
let random_keypair () = let random_keypair () =
let sk, pk = Sodium.Box.random_keypair () in let pk, sk = Box.keypair () in
sk, pk, hash pk sk, pk, hash pk
let random_nonce = Sodium.Box.random_nonce let random_nonce = Nonce.gen
let increment_nonce = Sodium.Box.increment_nonce let increment_nonce = Nonce.increment
let box = Sodium.Box.Bigbytes.box
let box_open sk pk msg nonce =
try Some (Sodium.Box.Bigbytes.box_open sk pk msg nonce) with
| Sodium.Verification_failure -> None
let precompute = Sodium.Box.precompute let box sk pk msg nonce =
let fast_box = Sodium.Box.Bigbytes.fast_box let msg = Cstruct.of_bigarray msg in
let fast_box_open ck msg nonce = Cstruct.to_bigarray (Box.box ~sk ~pk ~msg ~nonce)
try Some (Sodium.Box.Bigbytes.fast_box_open ck msg nonce) with
| Sodium.Verification_failure -> None let box_open sk pk cmsg nonce =
let cmsg = Cstruct.of_bigarray cmsg in
Option.map ~f:Cstruct.to_bigarray (Box.box_open ~sk ~pk ~cmsg ~nonce)
let box_noalloc sk pk nonce msg =
let msg = Cstruct.of_bigarray msg in
Box.box_noalloc ~sk ~pk ~nonce ~msg
let box_open_noalloc sk pk nonce cmsg =
let cmsg = Cstruct.of_bigarray cmsg in
Box.box_open_noalloc ~sk ~pk ~nonce ~cmsg
let precompute sk pk = Box.combine pk sk
let fast_box k msg nonce =
let msg = Cstruct.of_bigarray msg in
Cstruct.to_bigarray (Box.box_combined ~k ~msg ~nonce)
let fast_box_open k cmsg nonce =
let cmsg = Cstruct.of_bigarray cmsg in
Option.map ~f:Cstruct.to_bigarray (Box.box_open_combined ~k ~cmsg ~nonce)
let fast_box_noalloc k nonce msg =
let msg = Cstruct.of_bigarray msg in
Box.box_combined_noalloc ~k ~nonce ~msg
let fast_box_open_noalloc k nonce cmsg =
let cmsg = Cstruct.of_bigarray cmsg in
Box.box_open_combined_noalloc ~k ~nonce ~cmsg
let compare_target hash target = let compare_target hash target =
let hash = Z.of_bits (Blake2B.to_string hash) in let hash = Z.of_bits (Blake2B.to_string hash) in
@ -71,8 +100,8 @@ let default_target = make_target 24.
let check_proof_of_work pk nonce target = let check_proof_of_work pk nonce target =
let hash = let hash =
Blake2B.hash_bytes [ Blake2B.hash_bytes [
Sodium.Box.Bigbytes.of_public_key pk ; Cstruct.to_bigarray (Box.to_cstruct pk) ;
Sodium.Box.Bigbytes.of_nonce nonce ; Cstruct.to_bigarray (Nonce.to_cstruct nonce) ;
] in ] in
compare_target hash target compare_target hash target
@ -86,26 +115,31 @@ let generate_proof_of_work ?max pk target =
if check_proof_of_work pk nonce target then if check_proof_of_work pk nonce target then
nonce nonce
else else
loop (increment_nonce nonce) (cpt + 1) in loop (Nonce.increment nonce) (cpt + 1) in
loop (random_nonce ()) 0 loop (random_nonce ()) 0
let to_bigarray : type a. a Box.key -> MBytes.t = fun k ->
Cstruct.to_bigarray (Box.to_cstruct k)
let of_bigarray f s = f (Cstruct.of_bigarray s)
let public_key_encoding = let public_key_encoding =
let open Data_encoding in let open Data_encoding in
conv conv
Sodium.Box.Bigbytes.of_public_key to_bigarray
Sodium.Box.Bigbytes.to_public_key (of_bigarray Box.pk_of_cstruct_exn)
(Fixed.bytes Sodium.Box.public_key_size) (Fixed.bytes Box.pkbytes)
let secret_key_encoding = let secret_key_encoding =
let open Data_encoding in let open Data_encoding in
conv conv
Sodium.Box.Bigbytes.of_secret_key to_bigarray
Sodium.Box.Bigbytes.to_secret_key (of_bigarray Box.sk_of_cstruct_exn)
(Fixed.bytes Sodium.Box.secret_key_size) (Fixed.bytes Box.skbytes)
let nonce_encoding = let nonce_encoding =
let open Data_encoding in let open Data_encoding in
conv conv
Sodium.Box.Bigbytes.of_nonce (fun nonce -> Cstruct.to_bigarray (Nonce.to_cstruct nonce))
Sodium.Box.Bigbytes.to_nonce (of_bigarray Nonce.of_cstruct_exn)
(Fixed.bytes Sodium.Box.nonce_size) (Fixed.bytes Nonce.bytes)

View File

@ -28,15 +28,27 @@ val public_key_encoding : public_key Data_encoding.t
val secret_key_encoding : secret_key Data_encoding.t val secret_key_encoding : secret_key Data_encoding.t
val hash : public_key -> Public_key_hash.t val hash : public_key -> Public_key_hash.t
val zerobytes : int
val boxzerobytes : int
val random_keypair : unit -> secret_key * public_key * Public_key_hash.t val random_keypair : unit -> secret_key * public_key * Public_key_hash.t
val box : secret_key -> public_key -> MBytes.t -> nonce -> MBytes.t val box : secret_key -> public_key -> MBytes.t -> nonce -> MBytes.t
val box_open : secret_key -> public_key -> MBytes.t -> nonce -> MBytes.t option val box_open : secret_key -> public_key -> MBytes.t -> nonce -> MBytes.t option
val box_noalloc : secret_key -> public_key -> nonce -> MBytes.t -> unit
val box_open_noalloc : secret_key -> public_key -> nonce -> MBytes.t -> bool
val precompute : secret_key -> public_key -> channel_key val precompute : secret_key -> public_key -> channel_key
val fast_box : channel_key -> MBytes.t -> nonce -> MBytes.t val fast_box : channel_key -> MBytes.t -> nonce -> MBytes.t
val fast_box_open : channel_key -> MBytes.t -> nonce -> MBytes.t option val fast_box_open : channel_key -> MBytes.t -> nonce -> MBytes.t option
val fast_box_noalloc : channel_key -> nonce -> MBytes.t -> unit
val fast_box_open_noalloc : channel_key -> nonce -> MBytes.t -> bool
val check_proof_of_work : public_key -> nonce -> target -> bool val check_proof_of_work : public_key -> nonce -> target -> bool
val generate_proof_of_work : ?max:int -> public_key -> target -> nonce val generate_proof_of_work : ?max:int -> public_key -> target -> nonce

View File

@ -17,10 +17,18 @@ module Public_key_hash = Blake2B.Make(Base58)(struct
let () = let () =
Base58.check_encoded_prefix Public_key_hash.b58check_encoding "tz1" 36 Base58.check_encoded_prefix Public_key_hash.b58check_encoding "tz1" 36
open Tweetnacl
let of_bigarray1 f x =
f (Cstruct.of_bigarray x)
let to_bigarray1 f x =
Cstruct.to_bigarray (f x)
module Public_key = struct module Public_key = struct
type t = Sodium.Sign.public_key type t = Sign.public Sign.key
let compare = Sodium.Sign.compare_public_keys let compare a b = Cstruct.compare (Sign.to_cstruct a) (Sign.to_cstruct b)
let (=) xs ys = compare xs ys = 0 let (=) xs ys = compare xs ys = 0
let (<>) xs ys = compare xs ys <> 0 let (<>) xs ys = compare xs ys <> 0
let (<) xs ys = compare xs ys < 0 let (<) xs ys = compare xs ys < 0
@ -33,16 +41,13 @@ module Public_key = struct
type Base58.data += type Base58.data +=
| Public_key of t | Public_key of t
let to_string s = Bytes.to_string (Sodium.Sign.Bytes.of_public_key s) let to_string s = Cstruct.to_string (Sign.to_cstruct s)
let of_string_exn x = Sodium.Sign.Bytes.to_public_key (Bytes.of_string x) let of_string s = Sign.pk_of_cstruct (Cstruct.of_string s)
let of_string x =
try Some (of_string_exn x)
with _ -> None
let b58check_encoding = let b58check_encoding =
Base58.register_encoding Base58.register_encoding
~prefix: Base58.Prefix.ed25519_public_key ~prefix: Base58.Prefix.ed25519_public_key
~length:Sodium.Sign.public_key_size ~length:Sign.pkbytes
~to_raw:to_string ~to_raw:to_string
~of_raw:of_string ~of_raw:of_string
~wrap:(fun x -> Public_key x) ~wrap:(fun x -> Public_key x)
@ -61,13 +66,14 @@ module Public_key = struct
let pp ppf t = Format.fprintf ppf "%s" (to_b58check t) let pp ppf t = Format.fprintf ppf "%s" (to_b58check t)
let of_hex s = of_string (Hex.to_string s) let of_hex s = of_string (Hex.to_string s)
let of_hex_exn s = of_string_exn (Hex.to_string s) let of_hex_exn s =
match of_string (Hex.to_string s) with
| Some x -> x
| None -> invalid_arg "Public_key.of_hex_exn"
let to_hex s = Hex.of_string (to_string s) let to_hex s = Hex.of_string (to_string s)
let of_bytes_opt s = let of_bytes_opt s =
match Sodium.Sign.Bigbytes.to_public_key s with Sign.pk_of_cstruct (Cstruct.of_bigarray s)
| exception _ -> None
| pk -> Some pk
let of_bytes s = let of_bytes s =
match of_bytes_opt s with match of_bytes_opt s with
@ -81,7 +87,7 @@ module Public_key = struct
Pervasives.invalid_arg "Ed25519.Public_key.of_bytes_exn: argument is not a serialized public key" Pervasives.invalid_arg "Ed25519.Public_key.of_bytes_exn: argument is not a serialized public key"
| Some pk -> pk | Some pk -> pk
let to_bytes = Sodium.Sign.Bigbytes.of_public_key let to_bytes pk = Cstruct.to_bigarray (Sign.to_cstruct pk)
let param ?(name="ed25519-public") ?(desc="Ed25519 public key (b58check-encoded)") t = let param ?(name="ed25519-public") ?(desc="Ed25519 public key (b58check-encoded)") t =
Cli_entries.(param ~name ~desc (parameter (fun _ str -> Lwt.return (of_b58check str))) t) Cli_entries.(param ~name ~desc (parameter (fun _ str -> Lwt.return (of_b58check str))) t)
@ -105,21 +111,21 @@ module Public_key = struct
string) string)
~binary: ~binary:
(conv (conv
Sodium.Sign.Bigbytes.of_public_key (to_bigarray1 Sign.to_cstruct)
Sodium.Sign.Bigbytes.to_public_key (of_bigarray1 Sign.pk_of_cstruct_exn)
(Fixed.bytes Sodium.Sign.public_key_size)) (Fixed.bytes Sign.pkbytes))
let hash v = let hash v =
Public_key_hash.hash_bytes Public_key_hash.hash_bytes
[ Sodium.Sign.Bigbytes.of_public_key v ] [ to_bigarray1 Sign.to_cstruct v ]
end end
module Secret_key = struct module Secret_key = struct
type t = Sodium.Sign.secret_key type t = Sign.secret Sign.key
let to_public_key = Sodium.Sign.secret_key_to_public_key let to_public_key = Sign.public
type Base58.data += type Base58.data +=
| Secret_key of t | Secret_key of t
@ -127,28 +133,21 @@ module Secret_key = struct
let seed_encoding = let seed_encoding =
Base58.register_encoding Base58.register_encoding
~prefix: Base58.Prefix.ed25519_seed ~prefix: Base58.Prefix.ed25519_seed
~length:Sodium.Sign.seed_size ~length:Sign.seedbytes
~to_raw:(fun x -> Sodium.Sign.secret_key_to_seed x |> ~to_raw:(fun sk -> Cstruct.to_string (Sign.seed sk))
Sodium.Sign.Bytes.of_seed |> ~of_raw:(fun buf ->
Bytes.unsafe_to_string) let seed = Cstruct.of_string buf in
~of_raw:(fun x -> match Sign.keypair ~seed () with
try Some (Bytes.unsafe_of_string x |> | exception _ -> None
Sodium.Sign.Bytes.to_seed |> | _pk, sk -> Some sk)
Sodium.Sign.seed_keypair |> ~wrap:(fun sk -> Secret_key sk)
fst)
with _ -> None)
~wrap:(fun x -> Secret_key x)
let secret_key_encoding = let secret_key_encoding =
Base58.register_encoding Base58.register_encoding
~prefix: Base58.Prefix.ed25519_secret_key ~prefix: Base58.Prefix.ed25519_secret_key
~length:Sodium.Sign.secret_key_size ~length:Sign.skbytes
~to_raw:(fun x -> Sodium.Sign.Bytes.of_secret_key x |> ~to_raw:(fun sk -> Cstruct.to_string (Sign.to_cstruct sk))
Bytes.unsafe_to_string) ~of_raw:(fun buf -> Sign.sk_of_cstruct (Cstruct.of_string buf))
~of_raw:(fun x ->
try Some (Bytes.unsafe_of_string x |>
Sodium.Sign.Bytes.to_secret_key)
with _ -> None)
~wrap:(fun x -> Secret_key x) ~wrap:(fun x -> Secret_key x)
let of_b58check_opt s = let of_b58check_opt s =
@ -169,12 +168,11 @@ module Secret_key = struct
let pp ppf t = Format.fprintf ppf "%s" (to_b58check t) let pp ppf t = Format.fprintf ppf "%s" (to_b58check t)
let of_bytes_opt s = let of_bytes_opt s =
match Sodium.Sign.Bigbytes.to_seed s with let s = Cstruct.of_bigarray s in
| seed -> Some (seed |> Sodium.Sign.seed_keypair |> fst) match Cstruct.len s with
| exception _ -> | 32 -> let _pk, sk = Sign.keypair ~seed:s () in Some sk
match Sodium.Sign.Bigbytes.to_secret_key s with | 64 -> Sign.sk_of_cstruct s
| exception _ -> None | _ -> None
| sk -> Some sk
let of_bytes s = let of_bytes s =
match of_bytes_opt s with match of_bytes_opt s with
@ -188,8 +186,7 @@ module Secret_key = struct
Pervasives.invalid_arg "Ed25519.Secret_key.of_bytes_exn: argument is not a serialized seed" Pervasives.invalid_arg "Ed25519.Secret_key.of_bytes_exn: argument is not a serialized seed"
| Some sk -> sk | Some sk -> sk
let to_bytes sk = let to_bytes = to_bigarray1 Sign.seed
Sodium.Sign.(sk |> secret_key_to_seed |> Bigbytes.of_seed)
let param ?(name="ed25519-secret") ?(desc="Ed25519 secret key (b58check-encoded)") t = let param ?(name="ed25519-secret") ?(desc="Ed25519 secret key (b58check-encoded)") t =
Cli_entries.(param ~name ~desc (parameter (fun _ str -> Lwt.return (of_b58check str))) t) Cli_entries.(param ~name ~desc (parameter (fun _ str -> Lwt.return (of_b58check str))) t)
@ -213,20 +210,13 @@ module Secret_key = struct
"Ed25519 secret key: unexpected prefix.") "Ed25519 secret key: unexpected prefix.")
string) string)
~binary: ~binary:
(conv (conv to_bytes (fun buf -> of_bytes_exn buf)
(fun sk -> Sodium.Sign.secret_key_to_seed sk |>
Sodium.Sign.Bigbytes.of_seed)
(fun bytes ->
if MBytes.length bytes = Sodium.Sign.seed_size
then Sodium.Sign.Bigbytes.to_seed bytes |>
Sodium.Sign.seed_keypair |> fst
else Sodium.Sign.Bigbytes.to_secret_key bytes)
(dynamic_size (Variable.bytes))) (dynamic_size (Variable.bytes)))
end end
let sign key msg = let sign key msg =
Sodium.Sign.Bigbytes.(of_signature @@ sign_detached key msg) Cstruct.(to_bigarray (Sign.detached ~key (of_bigarray msg)))
module Signature = struct module Signature = struct
@ -238,7 +228,7 @@ module Signature = struct
let b58check_encoding = let b58check_encoding =
Base58.register_encoding Base58.register_encoding
~prefix: Base58.Prefix.ed25519_signature ~prefix: Base58.Prefix.ed25519_signature
~length:Sodium.Sign.signature_size ~length:Sign.bytes
~to_raw:MBytes.to_string ~to_raw:MBytes.to_string
~of_raw:(fun s -> Some (MBytes.of_string s)) ~of_raw:(fun s -> Some (MBytes.of_string s))
~wrap:(fun x -> Signature x) ~wrap:(fun x -> Signature x)
@ -257,9 +247,7 @@ module Signature = struct
let pp ppf t = Format.fprintf ppf "%s" (to_b58check t) let pp ppf t = Format.fprintf ppf "%s" (to_b58check t)
let of_bytes_opt s = let of_bytes_opt s =
match Sodium.Sign.Bigbytes.to_signature s with if MBytes.length s = Sign.bytes then Some s else None
| exception _ -> None
| _signature -> Some s
let of_bytes s = let of_bytes s =
match of_bytes_opt s with match of_bytes_opt s with
@ -295,13 +283,12 @@ module Signature = struct
| None -> Data_encoding.Json.cannot_destruct | None -> Data_encoding.Json.cannot_destruct
"Ed25519 signature: unexpected prefix.") "Ed25519 signature: unexpected prefix.")
string) string)
~binary: (Fixed.bytes Sodium.Sign.signature_size) ~binary: (Fixed.bytes Sign.bytes)
let check public_key signature msg = let check public_key signature msg =
try Sign.verify_detached ~key:public_key
Sodium.Sign.Bigbytes.(verify public_key (to_signature signature) msg) ; ~signature:(Cstruct.of_bigarray signature)
true (Cstruct.of_bigarray msg)
with _ -> false
let append key msg = let append key msg =
MBytes.concat msg (sign key msg) MBytes.concat msg (sign key msg)
@ -313,32 +300,16 @@ end
module Seed = struct module Seed = struct
type t = Sodium.Sign.seed type t = Cstruct.t
let to_hex s = let generate () = Rand.gen 32
Sodium.Sign.Bytes.of_seed s let extract = Sign.seed
|> Bytes.to_string
|> Hex.of_string
|> (fun (`Hex s) -> s)
let of_hex s =
Hex.to_string (`Hex s)
|> Bytes.of_string
|> Sodium.Sign.Bytes.to_seed
let generate () =
(* Seed is 32 bytes long *)
Sodium.Random.Bytes.generate Sodium.Sign.seed_size
|> Sodium.Sign.Bytes.to_seed
let extract =
Sodium.Sign.secret_key_to_seed
end end
let generate_key () = let generate_key () =
let secret, pub = Sodium.Sign.random_keypair () in let pk, sk = Sign.keypair () in
(Public_key.hash pub, pub, secret) (Public_key.hash pk, pk, sk)
let generate_seeded_key seed = let generate_seeded_key seed =
let secret, pub = Sodium.Sign.seed_keypair seed in let pk, sk = Sign.keypair ~seed () in
(Public_key.hash pub, pub, secret) (Public_key.hash pk, pk, sk)

View File

@ -102,7 +102,7 @@ module Signature : sig
val of_bytes_opt: MBytes.t -> t option val of_bytes_opt: MBytes.t -> t option
val to_bytes: t -> MBytes.t val to_bytes: t -> MBytes.t
(** Checks a signature *) (** Check a signature *)
val check: Public_key.t -> t -> MBytes.t -> bool val check: Public_key.t -> t -> MBytes.t -> bool
(** Append a signature *) (** Append a signature *)
@ -113,8 +113,6 @@ end
module Seed : sig module Seed : sig
type t type t
val to_hex : t -> string
val of_hex : string -> t
val generate : unit -> t val generate : unit -> t
val extract : Secret_key.t -> t val extract : Secret_key.t -> t
end end

View File

@ -15,7 +15,8 @@
tezos-error-monad tezos-error-monad
tezos-rpc tezos-rpc
nocrypto nocrypto
sodium blake2
tweetnacl
zarith)))) zarith))))
(alias (alias

23
src/lib_crypto/rand.ml Normal file
View File

@ -0,0 +1,23 @@
(**************************************************************************)
(* *)
(* Copyright (c) 2014 - 2017. *)
(* Dynamic Ledger Solutions, Inc. <contact@tezos.com> *)
(* *)
(* All rights reserved. No warranty, explicit or implicit, provided. *)
(* *)
(**************************************************************************)
let generate len =
Cstruct.to_bigarray (Tweetnacl.Rand.gen len)
let generate_into ?(pos=0) ?len buf =
let buflen = MBytes.length buf in
let len = match len with
| Some len -> len
| None -> buflen - pos in
if pos < 0 || len < 0 || pos + len > buflen then
invalid_arg (Printf.sprintf "Rand.generate_into: \
invalid slice (pos=%d len=%d)" pos len) ;
let cs = Cstruct.of_bigarray buf in
let cs = Cstruct.sub cs pos len in
Tweetnacl.Rand.write cs

16
src/lib_crypto/rand.mli Normal file
View File

@ -0,0 +1,16 @@
(**************************************************************************)
(* *)
(* Copyright (c) 2014 - 2017. *)
(* Dynamic Ledger Solutions, Inc. <contact@tezos.com> *)
(* *)
(* All rights reserved. No warranty, explicit or implicit, provided. *)
(* *)
(**************************************************************************)
val generate : int -> MBytes.t
(** [generate len] is [len] random bytes. *)
val generate_into : ?pos:int -> ?len:int -> MBytes.t -> unit
(** [generate_into ?pos ?len buf] writes [len] (default:
[MBytes.length buf]) bytes in [buf] starting at [pos] (default:
[0]). *)

View File

@ -16,7 +16,8 @@ depends: [
"tezos-error-monad" "tezos-error-monad"
"tezos-rpc" "tezos-rpc"
"nocrypto" "nocrypto"
"sodium" "blake2"
"tweetnacl"
"zarith" "zarith"
] ]
build: [ build: [

View File

@ -7,8 +7,6 @@
(* *) (* *)
(**************************************************************************) (**************************************************************************)
(* TODO encode/encrypt before to push into the writer pipe. *)
(* TODO patch Sodium.Box to avoid allocation of the encrypted buffer.*)
(* TODO patch Data_encoding for continuation-based binary writer/reader. *) (* TODO patch Data_encoding for continuation-based binary writer/reader. *)
(* TODO test `close ~wait:true`. *) (* TODO test `close ~wait:true`. *)
(* TODO nothing in welcoming message proves that the incoming peer is (* TODO nothing in welcoming message proves that the incoming peer is
@ -33,10 +31,9 @@ type error += Invalid_chunks_size of { value: int ; min: int ; max: int }
module Crypto = struct module Crypto = struct
let bufsize = 1 lsl 16 - 1
let header_length = 2 let header_length = 2
let crypto_overhead = 18 (* FIXME import from Sodium.Box. *) let max_content_length = bufsize - header_length - Crypto_box.boxzerobytes
let max_content_length =
1 lsl (header_length * 8) - crypto_overhead
type data = { type data = {
channel_key : Crypto_box.channel_key ; channel_key : Crypto_box.channel_key ;
@ -44,48 +41,53 @@ module Crypto = struct
mutable remote_nonce : Crypto_box.nonce ; mutable remote_nonce : Crypto_box.nonce ;
} }
let write_chunk fd cryptobox_data buf = let write_chunk fd cryptobox_data msg =
let header_buf = MBytes.create header_length in let msglen = MBytes.length msg in
fail_unless
(msglen <= max_content_length) Invalid_message_size >>=? fun () ->
let buf = MBytes.init (msglen + Crypto_box.zerobytes) '\x00' in
MBytes.blit msg 0 buf Crypto_box.zerobytes msglen ;
let local_nonce = cryptobox_data.local_nonce in let local_nonce = cryptobox_data.local_nonce in
cryptobox_data.local_nonce <- Crypto_box.increment_nonce local_nonce ; cryptobox_data.local_nonce <- Crypto_box.increment_nonce local_nonce ;
let encrypted_message = Crypto_box.fast_box_noalloc
Crypto_box.fast_box cryptobox_data.channel_key buf local_nonce in cryptobox_data.channel_key local_nonce buf ;
let encrypted_len = MBytes.length encrypted_message in let encrypted_length = msglen + Crypto_box.boxzerobytes in
fail_unless MBytes.set_int16 buf
(encrypted_len < 1 lsl (header_length * 8)) (Crypto_box.boxzerobytes - header_length) encrypted_length ;
Invalid_message_size >>=? fun () -> let payload = MBytes.sub buf (Crypto_box.boxzerobytes - header_length)
MBytes.set_int16 header_buf 0 encrypted_len ; (header_length + encrypted_length) in
P2p_io_scheduler.write fd header_buf >>=? fun () -> P2p_io_scheduler.write fd payload
P2p_io_scheduler.write fd encrypted_message >>=? fun () ->
return ()
let read_chunk fd cryptobox_data = let read_chunk fd cryptobox_data =
let header_buf = MBytes.create header_length in let header_buf = MBytes.create header_length in
P2p_io_scheduler.read_full ~len:header_length fd header_buf >>=? fun () -> P2p_io_scheduler.read_full ~len:header_length fd header_buf >>=? fun () ->
let len = MBytes.get_uint16 header_buf 0 in let encrypted_length = MBytes.get_uint16 header_buf 0 in
let buf = MBytes.create len in let buf = MBytes.init (encrypted_length + Crypto_box.boxzerobytes) '\x00' in
P2p_io_scheduler.read_full ~len fd buf >>=? fun () -> P2p_io_scheduler.read_full
~pos:Crypto_box.boxzerobytes ~len:encrypted_length fd buf >>=? fun () ->
let remote_nonce = cryptobox_data.remote_nonce in let remote_nonce = cryptobox_data.remote_nonce in
cryptobox_data.remote_nonce <- Crypto_box.increment_nonce remote_nonce ; cryptobox_data.remote_nonce <- Crypto_box.increment_nonce remote_nonce ;
match match
Crypto_box.fast_box_open cryptobox_data.channel_key buf remote_nonce Crypto_box.fast_box_open_noalloc
cryptobox_data.channel_key remote_nonce buf
with with
| None -> | false ->
fail Decipher_error fail Decipher_error
| Some buf -> | true ->
return buf return (MBytes.sub buf Crypto_box.zerobytes
(encrypted_length - Crypto_box.boxzerobytes))
end end
let check_binary_chunks_size size = let check_binary_chunks_size size =
let value = size - Crypto.crypto_overhead - Crypto.header_length in let value = size - Crypto_box.boxzerobytes - Crypto.header_length in
fail_unless fail_unless
(value > 0 && (value > 0 &&
value <= Crypto.max_content_length) value <= Crypto.max_content_length)
(Invalid_chunks_size (Invalid_chunks_size
{ value = size ; { value = size ;
min = Crypto.(header_length + crypto_overhead + 1) ; min = Crypto.(header_length + Crypto_box.boxzerobytes + 1) ;
max = Crypto.(max_content_length + crypto_overhead + header_length) max = Crypto.bufsize ;
}) })
module Connection_message = struct module Connection_message = struct
@ -392,7 +394,7 @@ module Writer = struct
match binary_chunks_size with match binary_chunks_size with
| None -> Crypto.max_content_length | None -> Crypto.max_content_length
| Some size -> | Some size ->
let size = size - Crypto.crypto_overhead - Crypto.header_length in let size = size - Crypto_box.boxzerobytes - Crypto.header_length in
assert (size > 0) ; assert (size > 0) ;
assert (size <= Crypto.max_content_length) ; assert (size <= Crypto.max_content_length) ;
size size

View File

@ -26,13 +26,6 @@ let id0 =
let versions = P2p_version.[{ name = "TEST" ; minor = 0 ; major = 0 }] let versions = P2p_version.[{ name = "TEST" ; minor = 0 ; major = 0 }]
let random_bytes len =
let msg = MBytes.create len in
for i = 0 to len / 8 - 1 do
MBytes.set_int64 msg (i*8) (Random.int64 Int64.max_int)
done ;
msg
let rec listen ?port addr = let rec listen ?port addr =
let tentative_port = let tentative_port =
match port with match port with
@ -143,7 +136,7 @@ let is_decoding_error = function
module Low_level = struct module Low_level = struct
let simple_msg = random_bytes (1 lsl 4) let simple_msg = Rand.generate (1 lsl 4)
let client _ch sched addr port = let client _ch sched addr port =
let msg = MBytes.create (MBytes.length simple_msg) in let msg = MBytes.create (MBytes.length simple_msg) in
@ -215,8 +208,8 @@ module Simple_message = struct
let encoding = Data_encoding.bytes let encoding = Data_encoding.bytes
let simple_msg = random_bytes (1 lsl 4) let simple_msg = Rand.generate (1 lsl 4)
let simple_msg2 = random_bytes (1 lsl 4) let simple_msg2 = Rand.generate (1 lsl 4)
let server ch sched socket = let server ch sched socket =
accept sched socket >>=? fun (_info, auth_fd) -> accept sched socket >>=? fun (_info, auth_fd) ->
@ -246,8 +239,8 @@ module Chunked_message = struct
let encoding = Data_encoding.bytes let encoding = Data_encoding.bytes
let simple_msg = random_bytes (1 lsl 8) let simple_msg = Rand.generate (1 lsl 8)
let simple_msg2 = random_bytes (1 lsl 8) let simple_msg2 = Rand.generate (1 lsl 8)
let server ch sched socket = let server ch sched socket =
accept sched socket >>=? fun (_info, auth_fd) -> accept sched socket >>=? fun (_info, auth_fd) ->
@ -279,8 +272,8 @@ module Oversized_message = struct
let encoding = Data_encoding.bytes let encoding = Data_encoding.bytes
let simple_msg = random_bytes (1 lsl 17) let simple_msg = Rand.generate (1 lsl 17)
let simple_msg2 = random_bytes (1 lsl 17) let simple_msg2 = Rand.generate (1 lsl 17)
let server ch sched socket = let server ch sched socket =
accept sched socket >>=? fun (_info, auth_fd) -> accept sched socket >>=? fun (_info, auth_fd) ->
@ -310,7 +303,7 @@ module Close_on_read = struct
let encoding = Data_encoding.bytes let encoding = Data_encoding.bytes
let simple_msg = random_bytes (1 lsl 4) let simple_msg = Rand.generate (1 lsl 4)
let server ch sched socket = let server ch sched socket =
accept sched socket >>=? fun (_info, auth_fd) -> accept sched socket >>=? fun (_info, auth_fd) ->
@ -336,7 +329,7 @@ module Close_on_write = struct
let encoding = Data_encoding.bytes let encoding = Data_encoding.bytes
let simple_msg = random_bytes (1 lsl 4) let simple_msg = Rand.generate (1 lsl 4)
let server ch sched socket = let server ch sched socket =
accept sched socket >>=? fun (_info, auth_fd) -> accept sched socket >>=? fun (_info, auth_fd) ->

View File

@ -117,21 +117,23 @@ let debug fmt =
else Format.ifprintf Format.err_formatter fmt else Format.ifprintf Format.err_formatter fmt
let hash_file file = let hash_file file =
let open Sodium.Generichash in let open Blake2 in
let buflen = 8092 in let buflen = 8092 in
let buf = BytesLabels.create buflen in let buf = BytesLabels.create buflen in
let fd = Unix.openfile file [Unix.O_RDONLY] 0o600 in let fd = Unix.openfile file [Unix.O_RDONLY] 0o600 in
let state = init ~size:32 () in let state = Blake2b.init 32 in
let loop () = let loop () =
match Unix.read fd buf 0 buflen with match Unix.read fd buf 0 buflen with
| 0 -> () | 0 -> ()
| nb_read -> | nb_read ->
Bytes.update state @@ Blake2b.update state
if nb_read = buflen then buf else BytesLabels.sub buf ~pos:0 ~len:nb_read (Cstruct.of_bytes
(if nb_read = buflen then buf else BytesLabels.sub buf ~pos:0 ~len:nb_read))
in in
loop () ; loop () ;
Unix.close fd ; Unix.close fd ;
BytesLabels.unsafe_to_string (Bytes.of_hash (final state)) let Blake2b.Hash h = Blake2b.final state in
Cstruct.to_string h
let mktemp_dir () = let mktemp_dir () =
Filename.get_temp_dir_name () // Filename.get_temp_dir_name () //

View File

@ -21,6 +21,12 @@ let copy ba =
let ba' = create (Array1.dim ba) in let ba' = create (Array1.dim ba) in
Array1.blit ba ba'; Array1.blit ba ba';
ba' ba'
let fill = Array1.fill
let init sz v =
let b = create sz in
fill b v ;
b
(** Adapted from ocaml-cstruct. *) (** Adapted from ocaml-cstruct. *)

View File

@ -20,9 +20,14 @@ type t = (char, int8_unsigned_elt, c_layout) Array1.t
val create: int -> t val create: int -> t
(** [create n] allocates and returns an array of size [n] **) (** [create n] allocates and returns an array of size [n] **)
val init: int -> char -> t
(** [init n c] allocates and returns an array of size [n] initialized
with [c]. *)
val length: t -> int val length: t -> int
val copy: t -> t val copy: t -> t
val fill: t -> char -> unit
val sub: t -> int -> int -> t val sub: t -> int -> int -> t
(** [sub src ofs len] extract a sub-array of [src] starting at [ofs] (** [sub src ofs len] extract a sub-array of [src] starting at [ofs]

View File

@ -12,7 +12,8 @@
tezos-data-encoding tezos-data-encoding
tezos-error-monad tezos-error-monad
lwt.unix lwt.unix
ipaddr.unix)))) ipaddr.unix
str))))
(alias (alias
((name runtest_indent) ((name runtest_indent)

View File

@ -13,11 +13,11 @@ open Tezos_context
open Logging.Client.Baking open Logging.Client.Baking
let generate_proof_of_work_nonce () = let generate_proof_of_work_nonce () =
Sodium.Random.Bigbytes.generate Constants.proof_of_work_nonce_size Rand.generate Constants.proof_of_work_nonce_size
let generate_seed_nonce () = let generate_seed_nonce () =
match Nonce.of_bytes @@ match Nonce.of_bytes @@
Sodium.Random.Bigbytes.generate Constants.nonce_length with Rand.generate Constants.nonce_length with
| Error _ -> assert false | Error _ -> assert false
| Ok nonce -> nonce | Ok nonce -> nonce

View File

@ -263,7 +263,7 @@ module Helpers = struct
operations cctxt block ~branch [Seed_nonce_revelation { level ; nonce }] operations cctxt block ~branch [Seed_nonce_revelation { level ; nonce }]
let faucet cctxt let faucet cctxt
block ~branch ~id () = block ~branch ~id () =
let nonce = Sodium.Random.Bigbytes.generate 16 in let nonce = Rand.generate 16 in
operations cctxt block ~branch [Faucet { id ; nonce }] operations cctxt block ~branch [Faucet { id ; nonce }]
end end
let empty_proof_of_work_nonce = let empty_proof_of_work_nonce =

View File

@ -409,7 +409,7 @@ module Baking = struct
let bake block (contract: Account.t) operations = let bake block (contract: Account.t) operations =
let seed_nonce = let seed_nonce =
match Nonce.of_bytes @@ match Nonce.of_bytes @@
Sodium.Random.Bigbytes.generate Constants.nonce_length with Rand.generate Constants.nonce_length with
| Error _ -> assert false | Error _ -> assert false
| Ok nonce -> nonce in | Ok nonce -> nonce in
let seed_nonce_hash = Nonce.hash seed_nonce in let seed_nonce_hash = Nonce.hash seed_nonce in

View File

@ -42,8 +42,8 @@ let get_op_header_res (res : result) : operation_header = {
let get_proto_header priority : protocol_header = { let get_proto_header priority : protocol_header = {
priority ; priority ;
proof_of_work_nonce = Helpers_sodium.generate_proof_of_work_nonce (); proof_of_work_nonce = Helpers_crypto.generate_proof_of_work_nonce ();
seed_nonce_hash = Proto_alpha.Tezos_context.Nonce.hash @@ Helpers_sodium.generate_seed_nonce () seed_nonce_hash = Proto_alpha.Tezos_context.Nonce.hash @@ Helpers_crypto.generate_seed_nonce ()
} }
let get_op_header pbh : operation_header = { let get_op_header pbh : operation_header = {

View File

@ -10,10 +10,10 @@
open Proto_alpha.Tezos_context open Proto_alpha.Tezos_context
let generate_proof_of_work_nonce () = let generate_proof_of_work_nonce () =
Sodium.Random.Bigbytes.generate Constants.proof_of_work_nonce_size Rand.generate Constants.proof_of_work_nonce_size
let generate_seed_nonce () = let generate_seed_nonce () =
match Nonce.of_bytes @@ match Nonce.of_bytes @@
Sodium.Random.Bigbytes.generate Constants.nonce_length with Rand.generate Constants.nonce_length with
| Error _ -> assert false | Error _ -> assert false
| Ok nonce -> nonce | Ok nonce -> nonce

View File

@ -9,7 +9,7 @@
open Proto_alpha open Proto_alpha
module Sodium = Helpers_sodium module Crypto = Helpers_crypto
module Cast = Helpers_cast module Cast = Helpers_cast
module Assert = Helpers_assert module Assert = Helpers_assert
module Services = Helpers_services module Services = Helpers_services

13
vendors/ocaml-blake2/LICENSE.md vendored Normal file
View File

@ -0,0 +1,13 @@
Copyright (c) 2017 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

21
vendors/ocaml-blake2/blake2.opam vendored Normal file
View File

@ -0,0 +1,21 @@
opam-version: "1.2"
name: "blake2"
version: "dev"
authors: "Vincent Bernardoff <vb@luminar.eu.org>"
maintainer: "Vincent Bernardoff <vb@luminar.eu.org>"
license: "ISC"
homepage: "https://github.com/vbmithr/ocaml-blake2"
bug-reports: "https://github.com/vbmithr/ocaml-blake2/issues"
dev-repo: "git://github.com/vbmithr/ocaml-blake2"
available: [
ocaml-version >= "4.02.0"
]
build: [ "jbuilder" "build" "-j" jobs "-p" name "@install" ]
build-test: [ "jbuilder" "runtest" "-p" name "-j" jobs ]
depends: [
"jbuilder" {build & >= "1.0+beta16"}
"cstruct" {>= "3.2.1"}
"alcotest" { test }
]

160
vendors/ocaml-blake2/src/blake2-impl.h vendored Normal file
View File

@ -0,0 +1,160 @@
/*
BLAKE2 reference source code package - reference C implementations
Copyright 2012, Samuel Neves <sneves@dei.uc.pt>. You may use this under the
terms of the CC0, the OpenSSL Licence, or the Apache Public License 2.0, at
your option. The terms of these licenses can be found at:
- CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
- OpenSSL license : https://www.openssl.org/source/license.html
- Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0
More information about the BLAKE2 hash function can be found at
https://blake2.net.
*/
#ifndef BLAKE2_IMPL_H
#define BLAKE2_IMPL_H
#include <stdint.h>
#include <string.h>
#if !defined(__cplusplus) && (!defined(__STDC_VERSION__) || __STDC_VERSION__ < 199901L)
#if defined(_MSC_VER)
#define BLAKE2_INLINE __inline
#elif defined(__GNUC__)
#define BLAKE2_INLINE __inline__
#else
#define BLAKE2_INLINE
#endif
#else
#define BLAKE2_INLINE inline
#endif
static BLAKE2_INLINE uint32_t load32( const void *src )
{
#if defined(NATIVE_LITTLE_ENDIAN)
uint32_t w;
memcpy(&w, src, sizeof w);
return w;
#else
const uint8_t *p = ( const uint8_t * )src;
return (( uint32_t )( p[0] ) << 0) |
(( uint32_t )( p[1] ) << 8) |
(( uint32_t )( p[2] ) << 16) |
(( uint32_t )( p[3] ) << 24) ;
#endif
}
static BLAKE2_INLINE uint64_t load64( const void *src )
{
#if defined(NATIVE_LITTLE_ENDIAN)
uint64_t w;
memcpy(&w, src, sizeof w);
return w;
#else
const uint8_t *p = ( const uint8_t * )src;
return (( uint64_t )( p[0] ) << 0) |
(( uint64_t )( p[1] ) << 8) |
(( uint64_t )( p[2] ) << 16) |
(( uint64_t )( p[3] ) << 24) |
(( uint64_t )( p[4] ) << 32) |
(( uint64_t )( p[5] ) << 40) |
(( uint64_t )( p[6] ) << 48) |
(( uint64_t )( p[7] ) << 56) ;
#endif
}
static BLAKE2_INLINE uint16_t load16( const void *src )
{
#if defined(NATIVE_LITTLE_ENDIAN)
uint16_t w;
memcpy(&w, src, sizeof w);
return w;
#else
const uint8_t *p = ( const uint8_t * )src;
return (( uint16_t )( p[0] ) << 0) |
(( uint16_t )( p[1] ) << 8) ;
#endif
}
static BLAKE2_INLINE void store16( void *dst, uint16_t w )
{
#if defined(NATIVE_LITTLE_ENDIAN)
memcpy(dst, &w, sizeof w);
#else
uint8_t *p = ( uint8_t * )dst;
*p++ = ( uint8_t )w; w >>= 8;
*p++ = ( uint8_t )w;
#endif
}
static BLAKE2_INLINE void store32( void *dst, uint32_t w )
{
#if defined(NATIVE_LITTLE_ENDIAN)
memcpy(dst, &w, sizeof w);
#else
uint8_t *p = ( uint8_t * )dst;
p[0] = (uint8_t)(w >> 0);
p[1] = (uint8_t)(w >> 8);
p[2] = (uint8_t)(w >> 16);
p[3] = (uint8_t)(w >> 24);
#endif
}
static BLAKE2_INLINE void store64( void *dst, uint64_t w )
{
#if defined(NATIVE_LITTLE_ENDIAN)
memcpy(dst, &w, sizeof w);
#else
uint8_t *p = ( uint8_t * )dst;
p[0] = (uint8_t)(w >> 0);
p[1] = (uint8_t)(w >> 8);
p[2] = (uint8_t)(w >> 16);
p[3] = (uint8_t)(w >> 24);
p[4] = (uint8_t)(w >> 32);
p[5] = (uint8_t)(w >> 40);
p[6] = (uint8_t)(w >> 48);
p[7] = (uint8_t)(w >> 56);
#endif
}
static BLAKE2_INLINE uint64_t load48( const void *src )
{
const uint8_t *p = ( const uint8_t * )src;
return (( uint64_t )( p[0] ) << 0) |
(( uint64_t )( p[1] ) << 8) |
(( uint64_t )( p[2] ) << 16) |
(( uint64_t )( p[3] ) << 24) |
(( uint64_t )( p[4] ) << 32) |
(( uint64_t )( p[5] ) << 40) ;
}
static BLAKE2_INLINE void store48( void *dst, uint64_t w )
{
uint8_t *p = ( uint8_t * )dst;
p[0] = (uint8_t)(w >> 0);
p[1] = (uint8_t)(w >> 8);
p[2] = (uint8_t)(w >> 16);
p[3] = (uint8_t)(w >> 24);
p[4] = (uint8_t)(w >> 32);
p[5] = (uint8_t)(w >> 40);
}
static BLAKE2_INLINE uint32_t rotr32( const uint32_t w, const unsigned c )
{
return ( w >> c ) | ( w << ( 32 - c ) );
}
static BLAKE2_INLINE uint64_t rotr64( const uint64_t w, const unsigned c )
{
return ( w >> c ) | ( w << ( 64 - c ) );
}
/* prevents compiler optimizing out memset() */
static BLAKE2_INLINE void secure_zero_memory(void *v, size_t n)
{
static void *(*const volatile memset_v)(void *, int, size_t) = &memset;
memset_v(v, 0, n);
}
#endif

195
vendors/ocaml-blake2/src/blake2.h vendored Normal file
View File

@ -0,0 +1,195 @@
/*
BLAKE2 reference source code package - reference C implementations
Copyright 2012, Samuel Neves <sneves@dei.uc.pt>. You may use this under the
terms of the CC0, the OpenSSL Licence, or the Apache Public License 2.0, at
your option. The terms of these licenses can be found at:
- CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
- OpenSSL license : https://www.openssl.org/source/license.html
- Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0
More information about the BLAKE2 hash function can be found at
https://blake2.net.
*/
#ifndef BLAKE2_H
#define BLAKE2_H
#include <stddef.h>
#include <stdint.h>
#if defined(_MSC_VER)
#define BLAKE2_PACKED(x) __pragma(pack(push, 1)) x __pragma(pack(pop))
#else
#define BLAKE2_PACKED(x) x __attribute__((packed))
#endif
#if defined(__cplusplus)
extern "C" {
#endif
enum blake2s_constant
{
BLAKE2S_BLOCKBYTES = 64,
BLAKE2S_OUTBYTES = 32,
BLAKE2S_KEYBYTES = 32,
BLAKE2S_SALTBYTES = 8,
BLAKE2S_PERSONALBYTES = 8
};
enum blake2b_constant
{
BLAKE2B_BLOCKBYTES = 128,
BLAKE2B_OUTBYTES = 64,
BLAKE2B_KEYBYTES = 64,
BLAKE2B_SALTBYTES = 16,
BLAKE2B_PERSONALBYTES = 16
};
typedef struct blake2s_state__
{
uint32_t h[8];
uint32_t t[2];
uint32_t f[2];
uint8_t buf[BLAKE2S_BLOCKBYTES];
size_t buflen;
size_t outlen;
uint8_t last_node;
} blake2s_state;
typedef struct blake2b_state__
{
uint64_t h[8];
uint64_t t[2];
uint64_t f[2];
uint8_t buf[BLAKE2B_BLOCKBYTES];
size_t buflen;
size_t outlen;
uint8_t last_node;
} blake2b_state;
typedef struct blake2sp_state__
{
blake2s_state S[8][1];
blake2s_state R[1];
uint8_t buf[8 * BLAKE2S_BLOCKBYTES];
size_t buflen;
size_t outlen;
} blake2sp_state;
typedef struct blake2bp_state__
{
blake2b_state S[4][1];
blake2b_state R[1];
uint8_t buf[4 * BLAKE2B_BLOCKBYTES];
size_t buflen;
size_t outlen;
} blake2bp_state;
BLAKE2_PACKED(struct blake2s_param__
{
uint8_t digest_length; /* 1 */
uint8_t key_length; /* 2 */
uint8_t fanout; /* 3 */
uint8_t depth; /* 4 */
uint32_t leaf_length; /* 8 */
uint32_t node_offset; /* 12 */
uint16_t xof_length; /* 14 */
uint8_t node_depth; /* 15 */
uint8_t inner_length; /* 16 */
/* uint8_t reserved[0]; */
uint8_t salt[BLAKE2S_SALTBYTES]; /* 24 */
uint8_t personal[BLAKE2S_PERSONALBYTES]; /* 32 */
});
typedef struct blake2s_param__ blake2s_param;
BLAKE2_PACKED(struct blake2b_param__
{
uint8_t digest_length; /* 1 */
uint8_t key_length; /* 2 */
uint8_t fanout; /* 3 */
uint8_t depth; /* 4 */
uint32_t leaf_length; /* 8 */
uint32_t node_offset; /* 12 */
uint32_t xof_length; /* 16 */
uint8_t node_depth; /* 17 */
uint8_t inner_length; /* 18 */
uint8_t reserved[14]; /* 32 */
uint8_t salt[BLAKE2B_SALTBYTES]; /* 48 */
uint8_t personal[BLAKE2B_PERSONALBYTES]; /* 64 */
});
typedef struct blake2b_param__ blake2b_param;
typedef struct blake2xs_state__
{
blake2s_state S[1];
blake2s_param P[1];
} blake2xs_state;
typedef struct blake2xb_state__
{
blake2b_state S[1];
blake2b_param P[1];
} blake2xb_state;
/* Padded structs result in a compile-time error */
enum {
BLAKE2_DUMMY_1 = 1/(sizeof(blake2s_param) == BLAKE2S_OUTBYTES),
BLAKE2_DUMMY_2 = 1/(sizeof(blake2b_param) == BLAKE2B_OUTBYTES)
};
/* Streaming API */
int blake2s_init( blake2s_state *S, size_t outlen );
int blake2s_init_key( blake2s_state *S, size_t outlen, const void *key, size_t keylen );
int blake2s_init_param( blake2s_state *S, const blake2s_param *P );
int blake2s_update( blake2s_state *S, const void *in, size_t inlen );
int blake2s_final( blake2s_state *S, void *out, size_t outlen );
int blake2b_init( blake2b_state *S, size_t outlen );
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen );
int blake2b_init_param( blake2b_state *S, const blake2b_param *P );
int blake2b_update( blake2b_state *S, const void *in, size_t inlen );
int blake2b_final( blake2b_state *S, void *out, size_t outlen );
int blake2sp_init( blake2sp_state *S, size_t outlen );
int blake2sp_init_key( blake2sp_state *S, size_t outlen, const void *key, size_t keylen );
int blake2sp_update( blake2sp_state *S, const void *in, size_t inlen );
int blake2sp_final( blake2sp_state *S, void *out, size_t outlen );
int blake2bp_init( blake2bp_state *S, size_t outlen );
int blake2bp_init_key( blake2bp_state *S, size_t outlen, const void *key, size_t keylen );
int blake2bp_update( blake2bp_state *S, const void *in, size_t inlen );
int blake2bp_final( blake2bp_state *S, void *out, size_t outlen );
/* Variable output length API */
int blake2xs_init( blake2xs_state *S, const size_t outlen );
int blake2xs_init_key( blake2xs_state *S, const size_t outlen, const void *key, size_t keylen );
int blake2xs_update( blake2xs_state *S, const void *in, size_t inlen );
int blake2xs_final(blake2xs_state *S, void *out, size_t outlen);
int blake2xb_init( blake2xb_state *S, const size_t outlen );
int blake2xb_init_key( blake2xb_state *S, const size_t outlen, const void *key, size_t keylen );
int blake2xb_update( blake2xb_state *S, const void *in, size_t inlen );
int blake2xb_final(blake2xb_state *S, void *out, size_t outlen);
/* Simple API */
int blake2s( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
int blake2sp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
int blake2bp( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
int blake2xs( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
int blake2xb( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
/* This is simply an alias for blake2b */
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen );
#if defined(__cplusplus)
}
#endif
#endif

91
vendors/ocaml-blake2/src/blake2.ml vendored Normal file
View File

@ -0,0 +1,91 @@
(*---------------------------------------------------------------------------
Copyright (c) 2018 Vincent Bernardoff. All rights reserved.
Distributed under the ISC license, see terms at the end of the file.
---------------------------------------------------------------------------*)
module Blake2b = struct
type t = Cstruct.t
external sizeof_state : unit -> int =
"sizeof_blake2b_state" [@@noalloc]
let bytes = sizeof_state ()
external init : Cstruct.buffer -> int -> int =
"ml_blake2b_init" [@@noalloc]
external outlen : Cstruct.buffer -> int =
"blake2b_state_outlen" [@@noalloc]
let outlen t = outlen t.Cstruct.buffer
external init_key : Cstruct.buffer -> int -> Cstruct.buffer -> int =
"ml_blake2b_init_key" [@@noalloc]
external update : Cstruct.buffer -> Cstruct.buffer -> int =
"ml_blake2b_update" [@@noalloc]
external final : Cstruct.buffer -> Cstruct.buffer -> int =
"ml_blake2b_final" [@@noalloc]
external direct :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer -> int =
"ml_blake2b" [@@noalloc]
let or_fail ~msg f =
match f () with
| 0 -> ()
| _ -> failwith msg
let init ?key size =
if size < 1 || size > 64 then
invalid_arg "Blake2b.init: size must be between 1 and 64" ;
let t = Cstruct.create_unsafe bytes in
begin match key with
| Some key ->
or_fail ~msg:"Blake2b.init"
(fun () -> init_key t.buffer size key.Cstruct.buffer)
| None ->
or_fail ~msg:"Blake2b.init"
(fun () -> init t.buffer size)
end ;
t
let update t buf =
or_fail ~msg:"Blake2b.update"
(fun () -> update t.Cstruct.buffer buf.Cstruct.buffer)
type hash = Hash of Cstruct.t
let final t =
let len = outlen t in
let buf = Cstruct.create_unsafe len in
or_fail ~msg:"Blake2b.final"
(fun () -> final t.Cstruct.buffer buf.Cstruct.buffer) ;
Hash buf
let direct ?(key=Cstruct.create_unsafe 0) inbuf len =
if len < 1 || len > 64 then
invalid_arg "Blake2b.direct: size must be between 1 and 64" ;
let outbuf = Cstruct.create len in
or_fail ~msg:"Blake2b.direct"
(fun () -> direct outbuf.Cstruct.buffer
inbuf.Cstruct.buffer key.buffer) ;
Hash outbuf
end
(*---------------------------------------------------------------------------
Copyright (c) 2018 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
---------------------------------------------------------------------------*)

40
vendors/ocaml-blake2/src/blake2.mli vendored Normal file
View File

@ -0,0 +1,40 @@
(*---------------------------------------------------------------------------
Copyright (c) 2018 Vincent Bernardoff. All rights reserved.
Distributed under the ISC license, see terms at the end of the file.
---------------------------------------------------------------------------*)
module Blake2b : sig
type t
type hash = Hash of Cstruct.t
val init : ?key:Cstruct.t -> int -> t
(** [init ?key size] is a blake2b context for hashes of size [size],
using [key] if present. *)
val update : t -> Cstruct.t -> unit
(** [update t buf] updates [t] with the data in [buf]. *)
val final : t -> hash
(** [final t] is the blake2b hash of all data updated in [t] so
far. *)
val direct : ?key:Cstruct.t -> Cstruct.t -> int -> hash
(** [direct ?key outbuf inbuf] writes the blake2b hash of [inbuf] in
[outbuf], using [key] is present. *)
end
(*---------------------------------------------------------------------------
Copyright (c) 2018 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
---------------------------------------------------------------------------*)

423
vendors/ocaml-blake2/src/blake2b-ref.c vendored Normal file
View File

@ -0,0 +1,423 @@
/*
BLAKE2 reference source code package - reference C implementations
Copyright 2012, Samuel Neves <sneves@dei.uc.pt>. You may use this under the
terms of the CC0, the OpenSSL Licence, or the Apache Public License 2.0, at
your option. The terms of these licenses can be found at:
- CC0 1.0 Universal : http://creativecommons.org/publicdomain/zero/1.0
- OpenSSL license : https://www.openssl.org/source/license.html
- Apache 2.0 : http://www.apache.org/licenses/LICENSE-2.0
More information about the BLAKE2 hash function can be found at
https://blake2.net.
*/
#include <stdint.h>
#include <string.h>
#include <stdio.h>
#include "blake2.h"
#include "blake2-impl.h"
static const uint64_t blake2b_IV[8] =
{
0x6a09e667f3bcc908ULL, 0xbb67ae8584caa73bULL,
0x3c6ef372fe94f82bULL, 0xa54ff53a5f1d36f1ULL,
0x510e527fade682d1ULL, 0x9b05688c2b3e6c1fULL,
0x1f83d9abfb41bd6bULL, 0x5be0cd19137e2179ULL
};
static const uint8_t blake2b_sigma[12][16] =
{
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } ,
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 } ,
{ 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 } ,
{ 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 } ,
{ 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 } ,
{ 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 } ,
{ 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 } ,
{ 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 } ,
{ 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 } ,
{ 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13 , 0 } ,
{ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 } ,
{ 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 }
};
static void blake2b_set_lastnode( blake2b_state *S )
{
S->f[1] = (uint64_t)-1;
}
/* Some helper functions, not necessarily useful */
static int blake2b_is_lastblock( const blake2b_state *S )
{
return S->f[0] != 0;
}
static void blake2b_set_lastblock( blake2b_state *S )
{
if( S->last_node ) blake2b_set_lastnode( S );
S->f[0] = (uint64_t)-1;
}
static void blake2b_increment_counter( blake2b_state *S, const uint64_t inc )
{
S->t[0] += inc;
S->t[1] += ( S->t[0] < inc );
}
static void blake2b_init0( blake2b_state *S )
{
size_t i;
memset( S, 0, sizeof( blake2b_state ) );
for( i = 0; i < 8; ++i ) S->h[i] = blake2b_IV[i];
}
/* init xors IV with input parameter block */
int blake2b_init_param( blake2b_state *S, const blake2b_param *P )
{
const uint8_t *p = ( const uint8_t * )( P );
size_t i;
blake2b_init0( S );
/* IV XOR ParamBlock */
for( i = 0; i < 8; ++i )
S->h[i] ^= load64( p + sizeof( S->h[i] ) * i );
S->outlen = P->digest_length;
return 0;
}
int blake2b_init( blake2b_state *S, size_t outlen )
{
blake2b_param P[1];
if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1;
P->digest_length = (uint8_t)outlen;
P->key_length = 0;
P->fanout = 1;
P->depth = 1;
store32( &P->leaf_length, 0 );
store32( &P->node_offset, 0 );
store32( &P->xof_length, 0 );
P->node_depth = 0;
P->inner_length = 0;
memset( P->reserved, 0, sizeof( P->reserved ) );
memset( P->salt, 0, sizeof( P->salt ) );
memset( P->personal, 0, sizeof( P->personal ) );
return blake2b_init_param( S, P );
}
int blake2b_init_key( blake2b_state *S, size_t outlen, const void *key, size_t keylen )
{
blake2b_param P[1];
if ( ( !outlen ) || ( outlen > BLAKE2B_OUTBYTES ) ) return -1;
if ( !key || !keylen || keylen > BLAKE2B_KEYBYTES ) return -1;
P->digest_length = (uint8_t)outlen;
P->key_length = (uint8_t)keylen;
P->fanout = 1;
P->depth = 1;
store32( &P->leaf_length, 0 );
store32( &P->node_offset, 0 );
store32( &P->xof_length, 0 );
P->node_depth = 0;
P->inner_length = 0;
memset( P->reserved, 0, sizeof( P->reserved ) );
memset( P->salt, 0, sizeof( P->salt ) );
memset( P->personal, 0, sizeof( P->personal ) );
if( blake2b_init_param( S, P ) < 0 ) return -1;
{
uint8_t block[BLAKE2B_BLOCKBYTES];
memset( block, 0, BLAKE2B_BLOCKBYTES );
memcpy( block, key, keylen );
blake2b_update( S, block, BLAKE2B_BLOCKBYTES );
secure_zero_memory( block, BLAKE2B_BLOCKBYTES ); /* Burn the key from stack */
}
return 0;
}
#define G(r,i,a,b,c,d) \
do { \
a = a + b + m[blake2b_sigma[r][2*i+0]]; \
d = rotr64(d ^ a, 32); \
c = c + d; \
b = rotr64(b ^ c, 24); \
a = a + b + m[blake2b_sigma[r][2*i+1]]; \
d = rotr64(d ^ a, 16); \
c = c + d; \
b = rotr64(b ^ c, 63); \
} while(0)
#define ROUND(r) \
do { \
G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \
G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \
G(r,2,v[ 2],v[ 6],v[10],v[14]); \
G(r,3,v[ 3],v[ 7],v[11],v[15]); \
G(r,4,v[ 0],v[ 5],v[10],v[15]); \
G(r,5,v[ 1],v[ 6],v[11],v[12]); \
G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \
G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \
} while(0)
static void blake2b_compress( blake2b_state *S, const uint8_t block[BLAKE2B_BLOCKBYTES] )
{
uint64_t m[16];
uint64_t v[16];
size_t i;
for( i = 0; i < 16; ++i ) {
m[i] = load64( block + i * sizeof( m[i] ) );
}
for( i = 0; i < 8; ++i ) {
v[i] = S->h[i];
}
v[ 8] = blake2b_IV[0];
v[ 9] = blake2b_IV[1];
v[10] = blake2b_IV[2];
v[11] = blake2b_IV[3];
v[12] = blake2b_IV[4] ^ S->t[0];
v[13] = blake2b_IV[5] ^ S->t[1];
v[14] = blake2b_IV[6] ^ S->f[0];
v[15] = blake2b_IV[7] ^ S->f[1];
ROUND( 0 );
ROUND( 1 );
ROUND( 2 );
ROUND( 3 );
ROUND( 4 );
ROUND( 5 );
ROUND( 6 );
ROUND( 7 );
ROUND( 8 );
ROUND( 9 );
ROUND( 10 );
ROUND( 11 );
for( i = 0; i < 8; ++i ) {
S->h[i] = S->h[i] ^ v[i] ^ v[i + 8];
}
}
#undef G
#undef ROUND
int blake2b_update( blake2b_state *S, const void *pin, size_t inlen )
{
const unsigned char * in = (const unsigned char *)pin;
if( inlen > 0 )
{
size_t left = S->buflen;
size_t fill = BLAKE2B_BLOCKBYTES - left;
if( inlen > fill )
{
S->buflen = 0;
memcpy( S->buf + left, in, fill ); /* Fill buffer */
blake2b_increment_counter( S, BLAKE2B_BLOCKBYTES );
blake2b_compress( S, S->buf ); /* Compress */
in += fill; inlen -= fill;
while(inlen > BLAKE2B_BLOCKBYTES) {
blake2b_increment_counter(S, BLAKE2B_BLOCKBYTES);
blake2b_compress( S, in );
in += BLAKE2B_BLOCKBYTES;
inlen -= BLAKE2B_BLOCKBYTES;
}
}
memcpy( S->buf + S->buflen, in, inlen );
S->buflen += inlen;
}
return 0;
}
int blake2b_final( blake2b_state *S, void *out, size_t outlen )
{
uint8_t buffer[BLAKE2B_OUTBYTES] = {0};
size_t i;
if( out == NULL || outlen < S->outlen )
return -1;
if( blake2b_is_lastblock( S ) )
return -1;
blake2b_increment_counter( S, S->buflen );
blake2b_set_lastblock( S );
memset( S->buf + S->buflen, 0, BLAKE2B_BLOCKBYTES - S->buflen ); /* Padding */
blake2b_compress( S, S->buf );
for( i = 0; i < 8; ++i ) /* Output full hash to temp buffer */
store64( buffer + sizeof( S->h[i] ) * i, S->h[i] );
memcpy( out, buffer, S->outlen );
secure_zero_memory(buffer, sizeof(buffer));
return 0;
}
/* inlen, at least, should be uint64_t. Others can be size_t. */
int blake2b( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen )
{
blake2b_state S[1];
/* Verify parameters */
if ( NULL == in && inlen > 0 ) return -1;
if ( NULL == out ) return -1;
if( NULL == key && keylen > 0 ) return -1;
if( !outlen || outlen > BLAKE2B_OUTBYTES ) return -1;
if( keylen > BLAKE2B_KEYBYTES ) return -1;
if( keylen > 0 )
{
if( blake2b_init_key( S, outlen, key, keylen ) < 0 ) return -1;
}
else
{
if( blake2b_init( S, outlen ) < 0 ) return -1;
}
blake2b_update( S, ( const uint8_t * )in, inlen );
blake2b_final( S, out, outlen );
return 0;
}
int blake2( void *out, size_t outlen, const void *in, size_t inlen, const void *key, size_t keylen ) {
return blake2b(out, outlen, in, inlen, key, keylen);
}
#if defined(SUPERCOP)
int crypto_hash( unsigned char *out, unsigned char *in, unsigned long long inlen )
{
return blake2b( out, BLAKE2B_OUTBYTES, in, inlen, NULL, 0 );
}
#endif
#if defined(BLAKE2B_SELFTEST)
#include <string.h>
#include "blake2-kat.h"
int main( void )
{
uint8_t key[BLAKE2B_KEYBYTES];
uint8_t buf[BLAKE2_KAT_LENGTH];
size_t i, step;
for( i = 0; i < BLAKE2B_KEYBYTES; ++i )
key[i] = ( uint8_t )i;
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
buf[i] = ( uint8_t )i;
/* Test simple API */
for( i = 0; i < BLAKE2_KAT_LENGTH; ++i )
{
uint8_t hash[BLAKE2B_OUTBYTES];
blake2b( hash, BLAKE2B_OUTBYTES, buf, i, key, BLAKE2B_KEYBYTES );
if( 0 != memcmp( hash, blake2b_keyed_kat[i], BLAKE2B_OUTBYTES ) )
{
goto fail;
}
}
/* Test streaming API */
for(step = 1; step < BLAKE2B_BLOCKBYTES; ++step) {
for (i = 0; i < BLAKE2_KAT_LENGTH; ++i) {
uint8_t hash[BLAKE2B_OUTBYTES];
blake2b_state S;
uint8_t * p = buf;
size_t mlen = i;
int err = 0;
if( (err = blake2b_init_key(&S, BLAKE2B_OUTBYTES, key, BLAKE2B_KEYBYTES)) < 0 ) {
goto fail;
}
while (mlen >= step) {
if ( (err = blake2b_update(&S, p, step)) < 0 ) {
goto fail;
}
mlen -= step;
p += step;
}
if ( (err = blake2b_update(&S, p, mlen)) < 0) {
goto fail;
}
if ( (err = blake2b_final(&S, hash, BLAKE2B_OUTBYTES)) < 0) {
goto fail;
}
if (0 != memcmp(hash, blake2b_keyed_kat[i], BLAKE2B_OUTBYTES)) {
goto fail;
}
}
}
puts( "ok" );
return 0;
fail:
puts("error");
return -1;
}
#endif
#include <caml/mlvalues.h>
#include <caml/bigarray.h>
CAMLprim value sizeof_blake2b_state(value unit) {
return Val_int(sizeof(blake2b_state));
}
CAMLprim value blake2b_state_outlen(value S) {
blake2b_state *s = Caml_ba_data_val(S);
return Val_int(s->outlen);
}
CAMLprim value ml_blake2b_init(value S, value outlen) {
return Val_int(blake2b_init(Caml_ba_data_val(S), Int_val(outlen)));
}
CAMLprim value ml_blake2b_init_key(value S, value outlen, value key) {
return Val_int(blake2b_init_key(Caml_ba_data_val(S),
Int_val(outlen),
Caml_ba_data_val(key),
Caml_ba_array_val(key)->dim[0]));
}
CAMLprim value ml_blake2b_update(value S, value in) {
return Val_int(blake2b_update(Caml_ba_data_val(S),
Caml_ba_data_val(in),
Caml_ba_array_val(in)->dim[0]));
}
CAMLprim value ml_blake2b_final(value S, value out) {
return Val_int(blake2b_final(Caml_ba_data_val(S),
Caml_ba_data_val(out),
Caml_ba_array_val(out)->dim[0]));
}
CAMLprim value ml_blake2b(value out, value in, value key) {
return Val_int(blake2b(Caml_ba_data_val(out),
Caml_ba_array_val(out)->dim[0],
Caml_ba_data_val(in),
Caml_ba_array_val(in)->dim[0],
Caml_ba_data_val(key),
Caml_ba_array_val(key)->dim[0]));
}

7
vendors/ocaml-blake2/src/jbuild vendored Normal file
View File

@ -0,0 +1,7 @@
(jbuild_version 1)
(library
((name blake2)
(public_name blake2)
(libraries (cstruct))
(c_names (blake2b-ref))))

14
vendors/ocaml-blake2/test/jbuild vendored Normal file
View File

@ -0,0 +1,14 @@
(jbuild_version 1)
(executable
((name test)
(libraries (blake2 alcotest))))
(alias
((name runtest-blake2)
(deps (test.exe))
(action (run ${<}))))
(alias
((name runtest)
(deps ((alias runtest-blake2)))))

59
vendors/ocaml-blake2/test/test.ml vendored Normal file
View File

@ -0,0 +1,59 @@
open Blake2
type vector = {
data_in : string list ;
data_key : string option ;
data_out : string ;
}
let vectors = [
{ data_in = [ "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f" ] ;
data_key = None ;
data_out = "1c077e279de6548523502b6df800ffdab5e2c3e9442eb838f58c295f3b147cef9d701c41c321283f00c71affa0619310399126295b78dd4d1a74572ef9ed5135" ;
} ;
{ data_in = [ "000102030405060708090a0b0c0d0e0f101112131415" ; "161718"; "191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f" ] ;
data_key = None ;
data_out = "1c077e279de6548523502b6df800ffdab5e2c3e9442eb838f58c295f3b147cef9d701c41c321283f00c71affa0619310399126295b78dd4d1a74572ef9ed5135" ;
} ;
{ data_in = [ "000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e5f606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3" ] ;
data_key = Some ("000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f") ;
data_out = "b39614268fdd8781515e2cfebf89b4d5402bab10c226e6344e6b9ae000fb0d6c79cb2f3ec80e80eaeb1980d2f8698916bd2e9f747236655116649cd3ca23a837" ;
} ;
]
let test_update { data_in ; data_key ; data_out } =
let key =
match data_key with None -> None | Some s -> Some (Cstruct.of_hex s) in
let data_out = Cstruct.of_hex data_out in
let d = Blake2b.init ?key (Cstruct.len data_out) in
List.iter (fun s -> Blake2b.update d (Cstruct.of_hex s)) data_in ;
let Blake2b.Hash h = Blake2b.final d in
assert Cstruct.(equal data_out h)
let test_direct { data_in ; data_key ; data_out } =
let key =
match data_key with None -> None | Some s -> Some (Cstruct.of_hex s) in
let data_out = Cstruct.of_hex data_out in
let Blake2b.Hash h =
Blake2b.direct ?key
(Cstruct.of_hex (String.concat "" data_in))
(Cstruct.len data_out) in
assert Cstruct.(equal data_out h)
let update_tests =
List.mapi
(fun i v -> string_of_int i, `Quick, fun () -> test_update v)
vectors
let direct_tests =
List.mapi
(fun i v -> string_of_int i, `Quick, fun () -> test_direct v)
vectors
let () =
Alcotest.run "blake2b" [
"update", update_tests ;
"direct", direct_tests ;
]

13
vendors/ocaml-tweetnacl/LICENSE.md vendored Normal file
View File

@ -0,0 +1,13 @@
Copyright (c) 2017 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

7
vendors/ocaml-tweetnacl/src/jbuild vendored Normal file
View File

@ -0,0 +1,7 @@
(jbuild_version 1)
(library
((name tweetnacl)
(public_name tweetnacl)
(libraries (hex cstruct zarith))
(c_names (tweetnacl_stubs))))

272
vendors/ocaml-tweetnacl/src/tweetnacl.h vendored Normal file
View File

@ -0,0 +1,272 @@
#ifndef TWEETNACL_H
#define TWEETNACL_H
#define crypto_auth_PRIMITIVE "hmacsha512256"
#define crypto_auth crypto_auth_hmacsha512256
#define crypto_auth_verify crypto_auth_hmacsha512256_verify
#define crypto_auth_BYTES crypto_auth_hmacsha512256_BYTES
#define crypto_auth_KEYBYTES crypto_auth_hmacsha512256_KEYBYTES
#define crypto_auth_IMPLEMENTATION crypto_auth_hmacsha512256_IMPLEMENTATION
#define crypto_auth_VERSION crypto_auth_hmacsha512256_VERSION
#define crypto_auth_hmacsha512256_tweet_BYTES 32
#define crypto_auth_hmacsha512256_tweet_KEYBYTES 32
extern int crypto_auth_hmacsha512256_tweet(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *);
extern int crypto_auth_hmacsha512256_tweet_verify(const unsigned char *,const unsigned char *,unsigned long long,const unsigned char *);
#define crypto_auth_hmacsha512256_tweet_VERSION "-"
#define crypto_auth_hmacsha512256 crypto_auth_hmacsha512256_tweet
#define crypto_auth_hmacsha512256_verify crypto_auth_hmacsha512256_tweet_verify
#define crypto_auth_hmacsha512256_BYTES crypto_auth_hmacsha512256_tweet_BYTES
#define crypto_auth_hmacsha512256_KEYBYTES crypto_auth_hmacsha512256_tweet_KEYBYTES
#define crypto_auth_hmacsha512256_VERSION crypto_auth_hmacsha512256_tweet_VERSION
#define crypto_auth_hmacsha512256_IMPLEMENTATION "crypto_auth/hmacsha512256/tweet"
#define crypto_box_PRIMITIVE "curve25519xsalsa20poly1305"
#define crypto_box crypto_box_curve25519xsalsa20poly1305
#define crypto_box_open crypto_box_curve25519xsalsa20poly1305_open
#define crypto_box_keypair crypto_box_curve25519xsalsa20poly1305_keypair
#define crypto_box_beforenm crypto_box_curve25519xsalsa20poly1305_beforenm
#define crypto_box_afternm crypto_box_curve25519xsalsa20poly1305_afternm
#define crypto_box_open_afternm crypto_box_curve25519xsalsa20poly1305_open_afternm
#define crypto_box_PUBLICKEYBYTES crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES
#define crypto_box_SECRETKEYBYTES crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES
#define crypto_box_BEFORENMBYTES crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES
#define crypto_box_NONCEBYTES crypto_box_curve25519xsalsa20poly1305_NONCEBYTES
#define crypto_box_ZEROBYTES crypto_box_curve25519xsalsa20poly1305_ZEROBYTES
#define crypto_box_BOXZEROBYTES crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES
#define crypto_box_IMPLEMENTATION crypto_box_curve25519xsalsa20poly1305_IMPLEMENTATION
#define crypto_box_VERSION crypto_box_curve25519xsalsa20poly1305_VERSION
#define crypto_box_curve25519xsalsa20poly1305_tweet_PUBLICKEYBYTES 32
#define crypto_box_curve25519xsalsa20poly1305_tweet_SECRETKEYBYTES 32
#define crypto_box_curve25519xsalsa20poly1305_tweet_BEFORENMBYTES 32
#define crypto_box_curve25519xsalsa20poly1305_tweet_NONCEBYTES 24
#define crypto_box_curve25519xsalsa20poly1305_tweet_ZEROBYTES 32
#define crypto_box_curve25519xsalsa20poly1305_tweet_BOXZEROBYTES 16
extern int crypto_box_curve25519xsalsa20poly1305_tweet(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *,const unsigned char *);
extern int crypto_box_curve25519xsalsa20poly1305_tweet_open(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *,const unsigned char *);
extern int crypto_box_curve25519xsalsa20poly1305_tweet_keypair(unsigned char *,unsigned char *);
extern int crypto_box_curve25519xsalsa20poly1305_tweet_beforenm(unsigned char *,const unsigned char *,const unsigned char *);
extern int crypto_box_curve25519xsalsa20poly1305_tweet_afternm(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
extern int crypto_box_curve25519xsalsa20poly1305_tweet_open_afternm(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
#define crypto_box_curve25519xsalsa20poly1305_tweet_VERSION "-"
#define crypto_box_curve25519xsalsa20poly1305 crypto_box_curve25519xsalsa20poly1305_tweet
#define crypto_box_curve25519xsalsa20poly1305_open crypto_box_curve25519xsalsa20poly1305_tweet_open
#define crypto_box_curve25519xsalsa20poly1305_keypair crypto_box_curve25519xsalsa20poly1305_tweet_keypair
#define crypto_box_curve25519xsalsa20poly1305_beforenm crypto_box_curve25519xsalsa20poly1305_tweet_beforenm
#define crypto_box_curve25519xsalsa20poly1305_afternm crypto_box_curve25519xsalsa20poly1305_tweet_afternm
#define crypto_box_curve25519xsalsa20poly1305_open_afternm crypto_box_curve25519xsalsa20poly1305_tweet_open_afternm
#define crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES crypto_box_curve25519xsalsa20poly1305_tweet_PUBLICKEYBYTES
#define crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES crypto_box_curve25519xsalsa20poly1305_tweet_SECRETKEYBYTES
#define crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES crypto_box_curve25519xsalsa20poly1305_tweet_BEFORENMBYTES
#define crypto_box_curve25519xsalsa20poly1305_NONCEBYTES crypto_box_curve25519xsalsa20poly1305_tweet_NONCEBYTES
#define crypto_box_curve25519xsalsa20poly1305_ZEROBYTES crypto_box_curve25519xsalsa20poly1305_tweet_ZEROBYTES
#define crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES crypto_box_curve25519xsalsa20poly1305_tweet_BOXZEROBYTES
#define crypto_box_curve25519xsalsa20poly1305_VERSION crypto_box_curve25519xsalsa20poly1305_tweet_VERSION
#define crypto_box_curve25519xsalsa20poly1305_IMPLEMENTATION "crypto_box/curve25519xsalsa20poly1305/tweet"
#define crypto_core_PRIMITIVE "salsa20"
#define crypto_core crypto_core_salsa20
#define crypto_core_OUTPUTBYTES crypto_core_salsa20_OUTPUTBYTES
#define crypto_core_INPUTBYTES crypto_core_salsa20_INPUTBYTES
#define crypto_core_KEYBYTES crypto_core_salsa20_KEYBYTES
#define crypto_core_CONSTBYTES crypto_core_salsa20_CONSTBYTES
#define crypto_core_IMPLEMENTATION crypto_core_salsa20_IMPLEMENTATION
#define crypto_core_VERSION crypto_core_salsa20_VERSION
#define crypto_core_salsa20_tweet_OUTPUTBYTES 64
#define crypto_core_salsa20_tweet_INPUTBYTES 16
#define crypto_core_salsa20_tweet_KEYBYTES 32
#define crypto_core_salsa20_tweet_CONSTBYTES 16
extern int crypto_core_salsa20_tweet(unsigned char *,const unsigned char *,const unsigned char *,const unsigned char *);
#define crypto_core_salsa20_tweet_VERSION "-"
#define crypto_core_salsa20 crypto_core_salsa20_tweet
#define crypto_core_salsa20_OUTPUTBYTES crypto_core_salsa20_tweet_OUTPUTBYTES
#define crypto_core_salsa20_INPUTBYTES crypto_core_salsa20_tweet_INPUTBYTES
#define crypto_core_salsa20_KEYBYTES crypto_core_salsa20_tweet_KEYBYTES
#define crypto_core_salsa20_CONSTBYTES crypto_core_salsa20_tweet_CONSTBYTES
#define crypto_core_salsa20_VERSION crypto_core_salsa20_tweet_VERSION
#define crypto_core_salsa20_IMPLEMENTATION "crypto_core/salsa20/tweet"
#define crypto_core_hsalsa20_tweet_OUTPUTBYTES 32
#define crypto_core_hsalsa20_tweet_INPUTBYTES 16
#define crypto_core_hsalsa20_tweet_KEYBYTES 32
#define crypto_core_hsalsa20_tweet_CONSTBYTES 16
extern int crypto_core_hsalsa20_tweet(unsigned char *,const unsigned char *,const unsigned char *,const unsigned char *);
#define crypto_core_hsalsa20_tweet_VERSION "-"
#define crypto_core_hsalsa20 crypto_core_hsalsa20_tweet
#define crypto_core_hsalsa20_OUTPUTBYTES crypto_core_hsalsa20_tweet_OUTPUTBYTES
#define crypto_core_hsalsa20_INPUTBYTES crypto_core_hsalsa20_tweet_INPUTBYTES
#define crypto_core_hsalsa20_KEYBYTES crypto_core_hsalsa20_tweet_KEYBYTES
#define crypto_core_hsalsa20_CONSTBYTES crypto_core_hsalsa20_tweet_CONSTBYTES
#define crypto_core_hsalsa20_VERSION crypto_core_hsalsa20_tweet_VERSION
#define crypto_core_hsalsa20_IMPLEMENTATION "crypto_core/hsalsa20/tweet"
#define crypto_hashblocks_PRIMITIVE "sha512"
#define crypto_hashblocks crypto_hashblocks_sha512
#define crypto_hashblocks_STATEBYTES crypto_hashblocks_sha512_STATEBYTES
#define crypto_hashblocks_BLOCKBYTES crypto_hashblocks_sha512_BLOCKBYTES
#define crypto_hashblocks_IMPLEMENTATION crypto_hashblocks_sha512_IMPLEMENTATION
#define crypto_hashblocks_VERSION crypto_hashblocks_sha512_VERSION
#define crypto_hashblocks_sha512_tweet_STATEBYTES 64
#define crypto_hashblocks_sha512_tweet_BLOCKBYTES 128
extern int crypto_hashblocks_sha512_tweet(unsigned char *,const unsigned char *,unsigned long long);
#define crypto_hashblocks_sha512_tweet_VERSION "-"
#define crypto_hashblocks_sha512 crypto_hashblocks_sha512_tweet
#define crypto_hashblocks_sha512_STATEBYTES crypto_hashblocks_sha512_tweet_STATEBYTES
#define crypto_hashblocks_sha512_BLOCKBYTES crypto_hashblocks_sha512_tweet_BLOCKBYTES
#define crypto_hashblocks_sha512_VERSION crypto_hashblocks_sha512_tweet_VERSION
#define crypto_hashblocks_sha512_IMPLEMENTATION "crypto_hashblocks/sha512/tweet"
#define crypto_hashblocks_sha256_tweet_STATEBYTES 32
#define crypto_hashblocks_sha256_tweet_BLOCKBYTES 64
extern int crypto_hashblocks_sha256_tweet(unsigned char *,const unsigned char *,unsigned long long);
#define crypto_hashblocks_sha256_tweet_VERSION "-"
#define crypto_hashblocks_sha256 crypto_hashblocks_sha256_tweet
#define crypto_hashblocks_sha256_STATEBYTES crypto_hashblocks_sha256_tweet_STATEBYTES
#define crypto_hashblocks_sha256_BLOCKBYTES crypto_hashblocks_sha256_tweet_BLOCKBYTES
#define crypto_hashblocks_sha256_VERSION crypto_hashblocks_sha256_tweet_VERSION
#define crypto_hashblocks_sha256_IMPLEMENTATION "crypto_hashblocks/sha256/tweet"
#define crypto_hash_PRIMITIVE "sha512"
#define crypto_hash crypto_hash_sha512
#define crypto_hash_BYTES crypto_hash_sha512_BYTES
#define crypto_hash_IMPLEMENTATION crypto_hash_sha512_IMPLEMENTATION
#define crypto_hash_VERSION crypto_hash_sha512_VERSION
#define crypto_hash_sha512_tweet_BYTES 64
extern int crypto_hash_sha512_tweet(unsigned char *,const unsigned char *,unsigned long long);
#define crypto_hash_sha512_tweet_VERSION "-"
#define crypto_hash_sha512 crypto_hash_sha512_tweet
#define crypto_hash_sha512_BYTES crypto_hash_sha512_tweet_BYTES
#define crypto_hash_sha512_VERSION crypto_hash_sha512_tweet_VERSION
#define crypto_hash_sha512_IMPLEMENTATION "crypto_hash/sha512/tweet"
#define crypto_hash_sha256_tweet_BYTES 32
extern int crypto_hash_sha256_tweet(unsigned char *,const unsigned char *,unsigned long long);
#define crypto_hash_sha256_tweet_VERSION "-"
#define crypto_hash_sha256 crypto_hash_sha256_tweet
#define crypto_hash_sha256_BYTES crypto_hash_sha256_tweet_BYTES
#define crypto_hash_sha256_VERSION crypto_hash_sha256_tweet_VERSION
#define crypto_hash_sha256_IMPLEMENTATION "crypto_hash/sha256/tweet"
#define crypto_onetimeauth_PRIMITIVE "poly1305"
#define crypto_onetimeauth crypto_onetimeauth_poly1305
#define crypto_onetimeauth_verify crypto_onetimeauth_poly1305_verify
#define crypto_onetimeauth_BYTES crypto_onetimeauth_poly1305_BYTES
#define crypto_onetimeauth_KEYBYTES crypto_onetimeauth_poly1305_KEYBYTES
#define crypto_onetimeauth_IMPLEMENTATION crypto_onetimeauth_poly1305_IMPLEMENTATION
#define crypto_onetimeauth_VERSION crypto_onetimeauth_poly1305_VERSION
#define crypto_onetimeauth_poly1305_tweet_BYTES 16
#define crypto_onetimeauth_poly1305_tweet_KEYBYTES 32
extern int crypto_onetimeauth_poly1305_tweet(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *);
extern int crypto_onetimeauth_poly1305_tweet_verify(const unsigned char *,const unsigned char *,unsigned long long,const unsigned char *);
#define crypto_onetimeauth_poly1305_tweet_VERSION "-"
#define crypto_onetimeauth_poly1305 crypto_onetimeauth_poly1305_tweet
#define crypto_onetimeauth_poly1305_verify crypto_onetimeauth_poly1305_tweet_verify
#define crypto_onetimeauth_poly1305_BYTES crypto_onetimeauth_poly1305_tweet_BYTES
#define crypto_onetimeauth_poly1305_KEYBYTES crypto_onetimeauth_poly1305_tweet_KEYBYTES
#define crypto_onetimeauth_poly1305_VERSION crypto_onetimeauth_poly1305_tweet_VERSION
#define crypto_onetimeauth_poly1305_IMPLEMENTATION "crypto_onetimeauth/poly1305/tweet"
#define crypto_scalarmult_PRIMITIVE "curve25519"
#define crypto_scalarmult crypto_scalarmult_curve25519
#define crypto_scalarmult_base crypto_scalarmult_curve25519_base
#define crypto_scalarmult_BYTES crypto_scalarmult_curve25519_BYTES
#define crypto_scalarmult_SCALARBYTES crypto_scalarmult_curve25519_SCALARBYTES
#define crypto_scalarmult_IMPLEMENTATION crypto_scalarmult_curve25519_IMPLEMENTATION
#define crypto_scalarmult_VERSION crypto_scalarmult_curve25519_VERSION
#define crypto_scalarmult_curve25519_tweet_BYTES 32
#define crypto_scalarmult_curve25519_tweet_SCALARBYTES 32
extern int crypto_scalarmult_curve25519_tweet(unsigned char *,const unsigned char *,const unsigned char *);
extern int crypto_scalarmult_curve25519_tweet_base(unsigned char *,const unsigned char *);
#define crypto_scalarmult_curve25519_tweet_VERSION "-"
#define crypto_scalarmult_curve25519 crypto_scalarmult_curve25519_tweet
#define crypto_scalarmult_curve25519_base crypto_scalarmult_curve25519_tweet_base
#define crypto_scalarmult_curve25519_BYTES crypto_scalarmult_curve25519_tweet_BYTES
#define crypto_scalarmult_curve25519_SCALARBYTES crypto_scalarmult_curve25519_tweet_SCALARBYTES
#define crypto_scalarmult_curve25519_VERSION crypto_scalarmult_curve25519_tweet_VERSION
#define crypto_scalarmult_curve25519_IMPLEMENTATION "crypto_scalarmult/curve25519/tweet"
#define crypto_secretbox_PRIMITIVE "xsalsa20poly1305"
#define crypto_secretbox crypto_secretbox_xsalsa20poly1305
#define crypto_secretbox_open crypto_secretbox_xsalsa20poly1305_open
#define crypto_secretbox_KEYBYTES crypto_secretbox_xsalsa20poly1305_KEYBYTES
#define crypto_secretbox_NONCEBYTES crypto_secretbox_xsalsa20poly1305_NONCEBYTES
#define crypto_secretbox_ZEROBYTES crypto_secretbox_xsalsa20poly1305_ZEROBYTES
#define crypto_secretbox_BOXZEROBYTES crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES
#define crypto_secretbox_IMPLEMENTATION crypto_secretbox_xsalsa20poly1305_IMPLEMENTATION
#define crypto_secretbox_VERSION crypto_secretbox_xsalsa20poly1305_VERSION
#define crypto_secretbox_xsalsa20poly1305_tweet_KEYBYTES 32
#define crypto_secretbox_xsalsa20poly1305_tweet_NONCEBYTES 24
#define crypto_secretbox_xsalsa20poly1305_tweet_ZEROBYTES 32
#define crypto_secretbox_xsalsa20poly1305_tweet_BOXZEROBYTES 16
extern int crypto_secretbox_xsalsa20poly1305_tweet(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
extern int crypto_secretbox_xsalsa20poly1305_tweet_open(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
#define crypto_secretbox_xsalsa20poly1305_tweet_VERSION "-"
#define crypto_secretbox_xsalsa20poly1305 crypto_secretbox_xsalsa20poly1305_tweet
#define crypto_secretbox_xsalsa20poly1305_open crypto_secretbox_xsalsa20poly1305_tweet_open
#define crypto_secretbox_xsalsa20poly1305_KEYBYTES crypto_secretbox_xsalsa20poly1305_tweet_KEYBYTES
#define crypto_secretbox_xsalsa20poly1305_NONCEBYTES crypto_secretbox_xsalsa20poly1305_tweet_NONCEBYTES
#define crypto_secretbox_xsalsa20poly1305_ZEROBYTES crypto_secretbox_xsalsa20poly1305_tweet_ZEROBYTES
#define crypto_secretbox_xsalsa20poly1305_BOXZEROBYTES crypto_secretbox_xsalsa20poly1305_tweet_BOXZEROBYTES
#define crypto_secretbox_xsalsa20poly1305_VERSION crypto_secretbox_xsalsa20poly1305_tweet_VERSION
#define crypto_secretbox_xsalsa20poly1305_IMPLEMENTATION "crypto_secretbox/xsalsa20poly1305/tweet"
#define crypto_sign_PRIMITIVE "ed25519"
#define crypto_sign crypto_sign_ed25519
#define crypto_sign_open crypto_sign_ed25519_open
#define crypto_sign_keypair crypto_sign_ed25519_keypair
#define crypto_sign_BYTES crypto_sign_ed25519_BYTES
#define crypto_sign_PUBLICKEYBYTES crypto_sign_ed25519_PUBLICKEYBYTES
#define crypto_sign_SECRETKEYBYTES crypto_sign_ed25519_SECRETKEYBYTES
#define crypto_sign_IMPLEMENTATION crypto_sign_ed25519_IMPLEMENTATION
#define crypto_sign_VERSION crypto_sign_ed25519_VERSION
#define crypto_sign_ed25519_tweet_BYTES 64
#define crypto_sign_ed25519_tweet_PUBLICKEYBYTES 32
#define crypto_sign_ed25519_tweet_SECRETKEYBYTES 64
extern int crypto_sign_ed25519_tweet(unsigned char *,unsigned long long *,const unsigned char *,unsigned long long,const unsigned char *);
extern int crypto_sign_ed25519_tweet_open(unsigned char *,unsigned long long *,const unsigned char *,unsigned long long,const unsigned char *);
extern int crypto_sign_ed25519_tweet_keypair(unsigned char *,unsigned char *);
#define crypto_sign_ed25519_tweet_VERSION "-"
#define crypto_sign_ed25519 crypto_sign_ed25519_tweet
#define crypto_sign_ed25519_open crypto_sign_ed25519_tweet_open
#define crypto_sign_ed25519_keypair crypto_sign_ed25519_tweet_keypair
#define crypto_sign_ed25519_BYTES crypto_sign_ed25519_tweet_BYTES
#define crypto_sign_ed25519_PUBLICKEYBYTES crypto_sign_ed25519_tweet_PUBLICKEYBYTES
#define crypto_sign_ed25519_SECRETKEYBYTES crypto_sign_ed25519_tweet_SECRETKEYBYTES
#define crypto_sign_ed25519_VERSION crypto_sign_ed25519_tweet_VERSION
#define crypto_sign_ed25519_IMPLEMENTATION "crypto_sign/ed25519/tweet"
#define crypto_stream_PRIMITIVE "xsalsa20"
#define crypto_stream crypto_stream_xsalsa20
#define crypto_stream_xor crypto_stream_xsalsa20_xor
#define crypto_stream_KEYBYTES crypto_stream_xsalsa20_KEYBYTES
#define crypto_stream_NONCEBYTES crypto_stream_xsalsa20_NONCEBYTES
#define crypto_stream_IMPLEMENTATION crypto_stream_xsalsa20_IMPLEMENTATION
#define crypto_stream_VERSION crypto_stream_xsalsa20_VERSION
#define crypto_stream_xsalsa20_tweet_KEYBYTES 32
#define crypto_stream_xsalsa20_tweet_NONCEBYTES 24
extern int crypto_stream_xsalsa20_tweet(unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
extern int crypto_stream_xsalsa20_tweet_xor(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
#define crypto_stream_xsalsa20_tweet_VERSION "-"
#define crypto_stream_xsalsa20 crypto_stream_xsalsa20_tweet
#define crypto_stream_xsalsa20_xor crypto_stream_xsalsa20_tweet_xor
#define crypto_stream_xsalsa20_KEYBYTES crypto_stream_xsalsa20_tweet_KEYBYTES
#define crypto_stream_xsalsa20_NONCEBYTES crypto_stream_xsalsa20_tweet_NONCEBYTES
#define crypto_stream_xsalsa20_VERSION crypto_stream_xsalsa20_tweet_VERSION
#define crypto_stream_xsalsa20_IMPLEMENTATION "crypto_stream/xsalsa20/tweet"
#define crypto_stream_salsa20_tweet_KEYBYTES 32
#define crypto_stream_salsa20_tweet_NONCEBYTES 8
extern int crypto_stream_salsa20_tweet(unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
extern int crypto_stream_salsa20_tweet_xor(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *);
#define crypto_stream_salsa20_tweet_VERSION "-"
#define crypto_stream_salsa20 crypto_stream_salsa20_tweet
#define crypto_stream_salsa20_xor crypto_stream_salsa20_tweet_xor
#define crypto_stream_salsa20_KEYBYTES crypto_stream_salsa20_tweet_KEYBYTES
#define crypto_stream_salsa20_NONCEBYTES crypto_stream_salsa20_tweet_NONCEBYTES
#define crypto_stream_salsa20_VERSION crypto_stream_salsa20_tweet_VERSION
#define crypto_stream_salsa20_IMPLEMENTATION "crypto_stream/salsa20/tweet"
#define crypto_verify_PRIMITIVE "16"
#define crypto_verify crypto_verify_16
#define crypto_verify_BYTES crypto_verify_16_BYTES
#define crypto_verify_IMPLEMENTATION crypto_verify_16_IMPLEMENTATION
#define crypto_verify_VERSION crypto_verify_16_VERSION
#define crypto_verify_16_tweet_BYTES 16
extern int crypto_verify_16_tweet(const unsigned char *,const unsigned char *);
#define crypto_verify_16_tweet_VERSION "-"
#define crypto_verify_16 crypto_verify_16_tweet
#define crypto_verify_16_BYTES crypto_verify_16_tweet_BYTES
#define crypto_verify_16_VERSION crypto_verify_16_tweet_VERSION
#define crypto_verify_16_IMPLEMENTATION "crypto_verify/16/tweet"
#define crypto_verify_32_tweet_BYTES 32
extern int crypto_verify_32_tweet(const unsigned char *,const unsigned char *);
#define crypto_verify_32_tweet_VERSION "-"
#define crypto_verify_32 crypto_verify_32_tweet
#define crypto_verify_32_BYTES crypto_verify_32_tweet_BYTES
#define crypto_verify_32_VERSION crypto_verify_32_tweet_VERSION
#define crypto_verify_32_IMPLEMENTATION "crypto_verify/32/tweet"
#endif

468
vendors/ocaml-tweetnacl/src/tweetnacl.ml vendored Normal file
View File

@ -0,0 +1,468 @@
(*---------------------------------------------------------------------------
Copyright (c) 2017 Vincent Bernardoff. All rights reserved.
Distributed under the ISC license, see terms at the end of the file.
---------------------------------------------------------------------------*)
module Rand = struct
external randombytes : Cstruct.buffer -> int -> unit =
"ml_randombytes" [@@noalloc]
let gen sz =
let cs = Cstruct.create_unsafe sz in
randombytes (Cstruct.to_bigarray cs) sz ;
cs
let write cs =
Cstruct.(randombytes (to_bigarray cs) (len cs))
end
module Hash = struct
let bytes = 64
external sha512 :
Cstruct.buffer -> Cstruct.buffer -> int -> unit =
"ml_crypto_hash" [@@noalloc]
let sha512 msg =
let q = Cstruct.create_unsafe bytes in
sha512 q.buffer msg.Cstruct.buffer (Cstruct.len msg) ;
q
end
let cs_of_z cs z =
let bits = Z.to_bits z in
Cstruct.blit_from_string bits 0 cs 0 (String.length bits)
let unopt_invalid_arg1 ~msg f cs =
match f cs with
| Some v -> v
| None -> invalid_arg msg
module Nonce = struct
type t = Cstruct.t
let bytes = 24
let gen () =
Rand.gen bytes
let rec incr_byte b step byteno =
let res = Cstruct.BE.get_uint16 b byteno + step in
let lo = res land 0xffff in
let hi = res asr 16 in
Cstruct.BE.set_uint16 b byteno lo ;
if hi = 0 || byteno = 0 then ()
else incr_byte b hi (byteno - 2)
let increment ?(step = 1) nonce =
let new_nonce = Cstruct.create_unsafe 24 in
Cstruct.blit nonce 0 new_nonce 0 24 ;
incr_byte new_nonce step 22 ;
new_nonce
let of_cstruct cs =
try Some (Cstruct.sub cs 0 bytes) with _ -> None
let of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Box.Nonce.of_cstruct_exn" of_cstruct
let to_cstruct nonce = nonce
end
module Secretbox = struct
type key = Cstruct.t
let keybytes = 32
let zerobytes = 32
let boxzerobytes = 16
let genkey () =
Rand.gen 32
let of_cstruct cs =
if Cstruct.len cs < keybytes then None
else Some (Cstruct.sub cs 0 keybytes)
let of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Secret_box.of_cstruct_exn" of_cstruct
external secretbox :
Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> unit = "ml_secretbox" [@@noalloc]
external secretbox_open :
Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> int = "ml_secretbox_open" [@@noalloc]
let box ~key ~nonce ~msg =
let msglen = Cstruct.len msg in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit msg 0 buf zerobytes msglen ;
secretbox
buf.buffer buf.buffer nonce.Cstruct.buffer key.Cstruct.buffer ;
Cstruct.sub buf boxzerobytes (buflen - boxzerobytes)
let box_noalloc ~key ~nonce ~msg =
secretbox
msg.Cstruct.buffer msg.buffer nonce.Cstruct.buffer key.Cstruct.buffer
let box_open ~key ~nonce ~cmsg =
let msglen = Cstruct.len cmsg - boxzerobytes in
let buf = Cstruct.create (zerobytes + msglen) in
Cstruct.blit cmsg 0 buf boxzerobytes (msglen + boxzerobytes) ;
match secretbox_open buf.buffer buf.buffer
nonce.Cstruct.buffer key.Cstruct.buffer with
| 0 -> Some (Cstruct.sub buf zerobytes msglen)
| _ -> None
let box_open_noalloc ~key ~nonce ~cmsg =
match secretbox_open cmsg.Cstruct.buffer cmsg.buffer
nonce.Cstruct.buffer key.Cstruct.buffer with
| 0 -> true
| _ -> false
end
module Box = struct
type secret
type public
type combined
type _ key =
| Sk : Cstruct.t -> secret key
| Pk : Cstruct.t -> public key
| Ck : Cstruct.t -> combined key
let skbytes = 32
let pkbytes = 32
let beforenmbytes = 32
let zerobytes = 32
let boxzerobytes = 16
let to_cstruct : type a. a key -> Cstruct.t = function
| Pk cs -> cs
| Sk cs -> cs
| Ck cs -> cs
let blit_to_cstruct :
type a. a key -> ?pos:int -> Cstruct.t -> unit = fun key ?(pos=0) cs ->
match key with
| Pk pk -> Cstruct.blit pk 0 cs pos pkbytes
| Sk sk -> Cstruct.blit sk 0 cs pos skbytes
| Ck ck -> Cstruct.blit ck 0 cs pos beforenmbytes
let pp : type a. Format.formatter -> a key -> unit = fun ppf -> function
| Pk cs -> Format.fprintf ppf "P %a" Hex.pp (Hex.of_cstruct cs)
| Sk cs -> Format.fprintf ppf "S %a" Hex.pp (Hex.of_cstruct cs)
| Ck cs -> Format.fprintf ppf "C %a" Hex.pp (Hex.of_cstruct cs)
let show t = Format.asprintf "%a" pp t
let equal :
type a. a key -> a key -> bool = fun a b -> match a, b with
| Pk a, Pk b -> Cstruct.equal a b
| Sk a, Sk b -> Cstruct.equal a b
| Ck a, Ck b -> Cstruct.equal a b
let sk_of_cstruct cs =
try Some (Sk (Cstruct.sub cs 0 skbytes)) with _ -> None
let pk_of_cstruct cs =
try Some (Pk (Cstruct.sub cs 0 pkbytes)) with _ -> None
let ck_of_cstruct cs =
try Some (Ck (Cstruct.sub cs 0 beforenmbytes)) with _ -> None
let sk_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Box.sk_of_cstruct_exn" sk_of_cstruct
let pk_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Box.pk_of_cstruct_exn" pk_of_cstruct
let ck_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Box.ck_of_cstruct_exn" ck_of_cstruct
external keypair :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_box_keypair" [@@noalloc]
let keypair () =
let sk = Cstruct.create skbytes in
let pk = Cstruct.create pkbytes in
keypair pk.buffer sk.buffer ;
Pk pk, Sk sk
external box_stub :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_box" [@@noalloc]
let box ~pk:(Pk pk) ~sk:(Sk sk) ~nonce ~msg =
let msglen = Cstruct.len msg in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit msg 0 buf zerobytes msglen ;
box_stub
buf.buffer buf.buffer nonce.Cstruct.buffer pk.buffer sk.buffer ;
Cstruct.sub buf boxzerobytes (buflen - boxzerobytes)
let box_noalloc ~pk:(Pk pk) ~sk:(Sk sk) ~nonce ~msg =
box_stub
msg.Cstruct.buffer msg.buffer nonce.Cstruct.buffer pk.buffer sk.buffer
external box_open_stub :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> int =
"ml_crypto_box_open" [@@noalloc]
let box_open ~pk:(Pk pk) ~sk:(Sk sk) ~nonce ~cmsg =
let msglen = Cstruct.len cmsg - boxzerobytes in
let buf = Cstruct.create (zerobytes + msglen) in
Cstruct.blit cmsg 0 buf boxzerobytes (msglen + boxzerobytes) ;
match box_open_stub buf.buffer buf.buffer
nonce.Cstruct.buffer pk.buffer sk.buffer with
| 0 -> Some (Cstruct.sub buf zerobytes msglen)
| _ -> None
let box_open_noalloc ~pk:(Pk pk) ~sk:(Sk sk) ~nonce ~cmsg =
match box_open_stub cmsg.Cstruct.buffer cmsg.buffer
nonce.Cstruct.buffer pk.buffer sk.buffer with
| 0 -> true
| _ -> false
external box_beforenm :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_box_beforenm" [@@noalloc]
let combine (Pk pk) (Sk sk) =
let combined = Cstruct.create_unsafe beforenmbytes in
box_beforenm combined.buffer pk.buffer sk.buffer ;
Ck combined
external box_afternm :
Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_box_afternm" [@@noalloc]
let box_combined ~k:(Ck k) ~nonce ~msg =
let msglen = Cstruct.len msg in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit msg 0 buf zerobytes msglen ;
box_afternm buf.buffer buf.buffer nonce.Cstruct.buffer k.buffer ;
Cstruct.sub buf boxzerobytes (buflen - boxzerobytes)
let box_combined_noalloc ~k:(Ck k) ~nonce ~msg =
box_afternm msg.Cstruct.buffer msg.buffer nonce.Cstruct.buffer k.buffer
external box_open_afternm :
Cstruct.buffer -> Cstruct.buffer ->
Cstruct.buffer -> Cstruct.buffer -> int =
"ml_crypto_box_open_afternm" [@@noalloc]
let box_open_combined ~k:(Ck k) ~nonce ~cmsg =
let msglen = Cstruct.len cmsg - boxzerobytes in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit cmsg 0 buf boxzerobytes (msglen + boxzerobytes) ;
match box_open_afternm buf.buffer buf.buffer
nonce.Cstruct.buffer k.buffer with
| 0 -> Some (Cstruct.sub buf zerobytes msglen)
| _ -> None
let box_open_combined_noalloc ~k:(Ck k) ~nonce ~cmsg =
match box_open_afternm cmsg.Cstruct.buffer cmsg.buffer
nonce.Cstruct.buffer k.buffer with
| 0 -> true
| _ -> false
end
module Sign = struct
type secret
type extended
type public
type _ key =
| Sk : Cstruct.t -> secret key
| Ek : Cstruct.t -> extended key
| Pk : Cstruct.t -> public key
let bytes = 64
let pkbytes = 32
let skbytes = 64
let ekbytes = 64
let seedbytes = 32
let sk_of_cstruct cs =
try Some (Sk (Cstruct.sub cs 0 skbytes)) with _ -> None
let ek_of_cstruct cs =
try Some (Ek (Cstruct.sub cs 0 ekbytes)) with _ -> None
let pk_of_cstruct cs =
try Some (Pk (Cstruct.sub cs 0 pkbytes)) with _ -> None
let sk_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Sign.sk_of_cstruct_exn" sk_of_cstruct
let ek_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Sign.ek_of_cstruct_exn" ek_of_cstruct
let pk_of_cstruct_exn =
unopt_invalid_arg1 ~msg:"Sign.pk_of_cstruct_exn" pk_of_cstruct
let to_cstruct : type a. a key -> Cstruct.t = function
| Pk cs -> cs
| Sk cs -> cs
| Ek cs -> cs
let seed (Sk cs) = Cstruct.sub cs 0 seedbytes
let blit_to_cstruct :
type a. a key -> ?pos:int -> Cstruct.t -> unit = fun key ?(pos=0) cs ->
match key with
| Pk pk -> Cstruct.blit pk 0 cs pos pkbytes
| Sk sk -> Cstruct.blit sk 0 cs pos skbytes
| Ek ek -> Cstruct.blit ek 0 cs pos ekbytes
let pp : type a. Format.formatter -> a key -> unit = fun ppf -> function
| Pk cs -> Format.fprintf ppf "P %a" Hex.pp (Hex.of_cstruct cs)
| Sk cs -> Format.fprintf ppf "S %a" Hex.pp (Hex.of_cstruct cs)
| Ek cs -> Format.fprintf ppf "E %a" Hex.pp (Hex.of_cstruct cs)
let show t = Format.asprintf "%a" pp t
let equal :
type a. a key -> a key -> bool = fun a b -> match a, b with
| Pk a, Pk b -> Cstruct.equal a b
| Sk a, Sk b -> Cstruct.equal a b
| Ek a, Ek b -> Cstruct.equal a b
external keypair :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_sign_keypair" [@@noalloc]
external keypair_seed :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_sign_keypair_seed" [@@noalloc]
let keypair ?seed () =
let pk = Cstruct.create_unsafe pkbytes in
let sk = Cstruct.create_unsafe skbytes in
begin match seed with
| None ->
Cstruct.(keypair (to_bigarray pk) (to_bigarray sk))
| Some cs ->
if Cstruct.len cs < seedbytes then
invalid_arg "Sign.keypair: seed must be at least 32 bytes long" ;
Cstruct.blit cs 0 sk 0 pkbytes ;
Cstruct.(keypair_seed (to_bigarray pk) (to_bigarray sk))
end ;
Pk pk, Sk sk
let extended (Sk sk) =
let cs = Hash.sha512 (Cstruct.sub sk 0 pkbytes) in
Cstruct.(set_uint8 cs 0 (get_uint8 cs 0 land 248)) ;
Cstruct.(set_uint8 cs 31 (get_uint8 cs 31 land 127)) ;
Cstruct.(set_uint8 cs 31 (get_uint8 cs 31 lor 64)) ;
Ek cs
external sign :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_sign" [@@noalloc]
external sign_extended :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_crypto_sign_extended" [@@noalloc]
let sign ~key:(Sk sk) msg =
let msglen = Cstruct.len msg in
let cs = Cstruct.create_unsafe (bytes + msglen) in
Cstruct.blit msg 0 cs bytes msglen ;
Cstruct.(sign (to_bigarray cs) (to_bigarray sk)) ;
cs
let sign_extended ~key:(Ek ek) msg =
let msglen = Cstruct.len msg in
let cs = Cstruct.create_unsafe (bytes + msglen) in
Cstruct.blit msg 0 cs bytes msglen ;
Cstruct.(sign_extended (to_bigarray cs) (to_bigarray ek)) ;
cs
let detached ~key msg =
Cstruct.sub (sign ~key msg) 0 bytes
let detached_extended ~key msg =
Cstruct.sub (sign_extended ~key msg) 0 bytes
external verify :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer -> int =
"ml_crypto_sign_open" [@@noalloc]
let verify ~key:(Pk pk) smsg =
let mlen = Cstruct.create_unsafe 8 in
let msg = Cstruct.(create (len smsg)) in
let ret = Cstruct.(verify
(to_bigarray msg) (to_bigarray mlen)
(to_bigarray smsg) (to_bigarray pk)) in
match ret with
| 0 ->
let len = Cstruct.LE.get_uint64 mlen 0 |> Int64.to_int in
Some (Cstruct.sub msg 0 len)
| _ -> None
let verify_detached ~key ~signature msg =
let cs = Cstruct.create_unsafe (bytes + Cstruct.len msg) in
Cstruct.blit signature 0 cs 0 bytes ;
Cstruct.blit msg 0 cs bytes (Cstruct.len msg) ;
match verify ~key cs with
| None -> false
| Some _ -> true
external add :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_add" [@@noalloc]
let add (Pk p) (Pk q) =
let cs = Cstruct.create_unsafe pkbytes in
Cstruct.blit p 0 cs 0 pkbytes ;
Cstruct.(add (to_bigarray cs) (to_bigarray q)) ;
Pk cs
external mult :
Cstruct.buffer -> Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_scalarmult" [@@noalloc]
external base :
Cstruct.buffer -> Cstruct.buffer -> unit =
"ml_scalarbase" [@@noalloc]
let mult (Pk q) s =
let r = Cstruct.create_unsafe pkbytes in
let scalar = Cstruct.create_unsafe pkbytes in
cs_of_z scalar s ;
Cstruct.(mult (to_bigarray r) (to_bigarray q) (to_bigarray scalar)) ;
Pk r
let base_direct s =
let cs = Cstruct.create_unsafe pkbytes in
Cstruct.(base (to_bigarray cs) (to_bigarray s)) ;
cs
let base s =
let r = Cstruct.create_unsafe pkbytes in
let scalar = Cstruct.create_unsafe pkbytes in
cs_of_z scalar s ;
Cstruct.(base (to_bigarray r) (to_bigarray scalar)) ;
Pk r
let public : type a. a key -> public key = function
| Pk _ as pk -> pk
| Sk cs -> Pk (Cstruct.sub cs 32 32)
| Ek cs -> Pk (base_direct (Cstruct.sub cs 0 32))
end
(*---------------------------------------------------------------------------
Copyright (c) 2017 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
---------------------------------------------------------------------------*)

View File

@ -0,0 +1,158 @@
(*---------------------------------------------------------------------------
Copyright (c) 2017 Vincent Bernardoff. All rights reserved.
Distributed under the ISC license, see terms at the end of the file.
---------------------------------------------------------------------------*)
module Rand : sig
val gen : int -> Cstruct.t
val write : Cstruct.t -> unit
end
module Hash : sig
val sha512 : Cstruct.t -> Cstruct.t
end
module Nonce : sig
type t
val bytes : int
val gen : unit -> t
val increment : ?step:int -> t -> t
val of_cstruct : Cstruct.t -> t option
val of_cstruct_exn : Cstruct.t -> t
val to_cstruct : t -> Cstruct.t
end
module Secretbox : sig
type key
val keybytes : int
val zerobytes : int
val boxzerobytes : int
val genkey : unit -> key
val of_cstruct : Cstruct.t -> key option
val of_cstruct_exn : Cstruct.t -> key
val box : key:key -> nonce:Nonce.t -> msg:Cstruct.t -> Cstruct.t
val box_open : key:key -> nonce:Nonce.t -> cmsg:Cstruct.t -> Cstruct.t option
val box_noalloc : key:key -> nonce:Nonce.t -> msg:Cstruct.t -> unit
val box_open_noalloc : key:key -> nonce:Nonce.t -> cmsg:Cstruct.t -> bool
end
module Box : sig
type secret
type public
type combined
type _ key
val skbytes : int
val pkbytes : int
val beforenmbytes : int
val zerobytes : int
val boxzerobytes : int
val pp : Format.formatter -> _ key -> unit
val show : _ key -> string
val equal : 'a key -> 'a key -> bool
val to_cstruct : _ key -> Cstruct.t
val blit_to_cstruct : _ key -> ?pos:int -> Cstruct.t -> unit
val sk_of_cstruct : Cstruct.t -> secret key option
val pk_of_cstruct : Cstruct.t -> public key option
val ck_of_cstruct : Cstruct.t -> combined key option
val sk_of_cstruct_exn : Cstruct.t -> secret key
val pk_of_cstruct_exn : Cstruct.t -> public key
val ck_of_cstruct_exn : Cstruct.t -> combined key
val keypair : unit -> public key * secret key
val box :
pk:public key -> sk:secret key ->
nonce:Nonce.t -> msg:Cstruct.t -> Cstruct.t
val box_open :
pk:public key -> sk:secret key ->
nonce:Nonce.t -> cmsg:Cstruct.t -> Cstruct.t option
val box_noalloc :
pk:public key -> sk:secret key ->
nonce:Nonce.t -> msg:Cstruct.t -> unit
val box_open_noalloc :
pk:public key -> sk:secret key ->
nonce:Nonce.t -> cmsg:Cstruct.t -> bool
val combine : public key -> secret key -> combined key
val box_combined :
k:combined key -> nonce:Nonce.t -> msg:Cstruct.t -> Cstruct.t
val box_open_combined :
k:combined key -> nonce:Nonce.t -> cmsg:Cstruct.t -> Cstruct.t option
val box_combined_noalloc :
k:combined key -> nonce:Nonce.t -> msg:Cstruct.t -> unit
val box_open_combined_noalloc :
k:combined key -> nonce:Nonce.t -> cmsg:Cstruct.t -> bool
end
module Sign : sig
type secret
type extended
type public
type _ key
val bytes : int
val pkbytes : int
val skbytes : int
val ekbytes : int
val seedbytes : int
val pp : Format.formatter -> _ key -> unit
val show : _ key -> string
val to_cstruct : _ key -> Cstruct.t
val blit_to_cstruct : _ key -> ?pos:int -> Cstruct.t -> unit
val sk_of_cstruct : Cstruct.t -> secret key option
val ek_of_cstruct : Cstruct.t -> extended key option
val pk_of_cstruct : Cstruct.t -> public key option
val sk_of_cstruct_exn : Cstruct.t -> secret key
val ek_of_cstruct_exn : Cstruct.t -> extended key
val pk_of_cstruct_exn : Cstruct.t -> public key
val keypair : ?seed:Cstruct.t -> unit -> public key * secret key
val equal : 'a key -> 'a key -> bool
val extended : secret key -> extended key
val seed : secret key -> Cstruct.t
val public : _ key -> public key
val sign : key:secret key -> Cstruct.t -> Cstruct.t
val sign_extended : key:extended key -> Cstruct.t -> Cstruct.t
val detached : key:secret key -> Cstruct.t -> Cstruct.t
val detached_extended : key:extended key -> Cstruct.t -> Cstruct.t
val verify : key:public key -> Cstruct.t -> Cstruct.t option
val verify_detached : key:public key -> signature:Cstruct.t -> Cstruct.t -> bool
val add : public key -> public key -> public key
val mult : public key -> Z.t -> public key
val base : Z.t -> public key
end
(*---------------------------------------------------------------------------
Copyright (c) 2017 Vincent Bernardoff
Permission to use, copy, modify, and/or distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
---------------------------------------------------------------------------*)

File diff suppressed because it is too large Load Diff

14
vendors/ocaml-tweetnacl/test/jbuild vendored Normal file
View File

@ -0,0 +1,14 @@
(jbuild_version 1)
(executable
((name test)
(libraries (hex tweetnacl alcotest))))
(alias
((name runtest-tweetnacl)
(deps (test.exe))
(action (run ${<}))))
(alias
((name runtest)
(deps ((alias runtest-tweetnacl)))))

190
vendors/ocaml-tweetnacl/test/test.ml vendored Normal file
View File

@ -0,0 +1,190 @@
open Tweetnacl
let msg = "Voulez-vous coucher avec moi, ce soir ?" |> Cstruct.of_string
let msglen = Cstruct.len msg
let sha512 () =
let resp = `Hex "7941f442d956f124d77ee1d1f0ba3db100751090462cdce4aed5fcd240529097bc666bf9c424becde760910df652c7aefec50b02d7f6efe666f79e5242fb755b" in
let digest = Hash.sha512 msg in
assert (resp = (Hex.of_cstruct digest))
let keypair () =
let seed = Rand.gen 32 in
let pk, sk = Sign.keypair ~seed () in
let pk', sk' = Sign.keypair ~seed () in
assert (Sign.equal pk pk') ;
assert (Sign.equal sk sk')
let sign () =
let pk, sk = Sign.keypair () in
let signed_msg = Sign.sign ~key:sk msg in
match Sign.verify ~key:pk signed_msg with
| None -> failwith "Impossible to verify"
| Some verified_msg ->
assert (Hex.of_cstruct msg =
Hex.of_cstruct (Cstruct.sub verified_msg Sign.bytes msglen))
let sign_detached () =
let pk, sk = Sign.keypair () in
let signature = Sign.detached ~key:sk msg in
match Sign.verify_detached ~key:pk ~signature msg with
| false -> failwith "Impossible to verify"
| true -> ()
let sign_extended () =
let pk, sk = Sign.keypair () in
let ek = Sign.extended sk in
let signed_msg = Sign.sign_extended ~key:ek msg in
match Sign.verify ~key:pk signed_msg with
| None -> failwith "Impossible to verify"
| Some verified_msg ->
assert (Hex.of_cstruct msg =
Hex.of_cstruct (Cstruct.sub verified_msg Sign.bytes msglen))
let sign_extended_detached () =
let pk, sk = Sign.keypair () in
let ek = Sign.extended sk in
let signature = Sign.detached_extended ~key:ek msg in
match Sign.verify_detached ~key:pk ~signature msg with
| false -> failwith "Impossible to verify"
| true -> ()
let public () =
let pk, sk = Sign.keypair () in
let pk' = Sign.to_cstruct pk in
let ek = Sign.extended sk in
let ppk = Sign.(public pk |> to_cstruct) in
let psk = Sign.(public sk |> to_cstruct) in
let pek = Sign.(public ek |> to_cstruct) in
assert (Cstruct.equal pk' ppk) ;
assert (Cstruct.equal pk' psk) ;
assert (Cstruct.equal pk' pek)
let base () =
let pk, sk = Sign.keypair () in
let ek = Sign.(extended sk |> to_cstruct) in
let z = Z.of_bits Cstruct.(sub ek 0 32 |> to_string) in
let pk' = Sign.base z in
assert (Sign.equal pk pk')
let comm () =
let pk1, _ = Sign.keypair () in
let pk2, _ = Sign.keypair () in
let pk3 = Sign.add pk1 pk2 in
let pk3' = Sign.add pk2 pk1 in
assert (Sign.equal pk3 pk3')
let assoc () =
let pk1, _ = Sign.keypair () in
let pk2, _ = Sign.keypair () in
let pk3, _ = Sign.keypair () in
let sum12 = Sign.add pk1 pk2 in
let sum23 = Sign.add pk2 pk3 in
let a = Sign.add sum12 pk3 in
let b = Sign.add pk1 sum23 in
assert (Sign.equal a b)
let arith () =
let pk, _sk = Sign.keypair () in
let pk2 = Sign.mult pk (Z.of_int 3) in
let pk2' = Sign.(add (add pk pk) pk) in
assert (Sign.equal pk2 pk2')
let arith2 () =
let a = Sign.base (Z.of_int 3) in
let b = Sign.mult a (Z.of_int 2) in
let b' = Sign.base (Z.of_int 6) in
assert (Sign.equal b b')
let hash = [
"sha512", `Quick, sha512 ;
]
let secretbox () =
let open Secretbox in
let key = genkey () in
let nonce = Nonce.gen () in
let cmsg = box ~key ~nonce ~msg in
assert (Cstruct.len cmsg = msglen + boxzerobytes) ;
begin match box_open ~key ~nonce ~cmsg with
| None -> assert false
| Some msg' -> assert Cstruct.(equal msg msg')
end
let secretbox_noalloc () =
let open Secretbox in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit msg 0 buf zerobytes msglen ;
let key = genkey () in
let nonce = Nonce.gen () in
box_noalloc ~key ~nonce ~msg:buf ;
let res = box_open_noalloc ~key ~nonce ~cmsg:buf in
assert res ;
assert Cstruct.(equal msg (sub buf zerobytes msglen))
let secretbox = [
"secretbox", `Quick, secretbox ;
"secretbox_noalloc", `Quick, secretbox_noalloc ;
]
let box () =
let open Box in
let pk, sk = keypair () in
let ck = combine pk sk in
let nonce = Nonce.gen () in
let cmsg = box ~pk ~sk ~nonce ~msg in
assert (Cstruct.len cmsg = msglen + boxzerobytes) ;
begin match box_open ~pk ~sk ~nonce ~cmsg with
| None -> assert false
| Some msg' -> assert Cstruct.(equal msg msg')
end ;
let cmsg = box_combined ~k:ck ~nonce ~msg in
begin match box_open_combined ~k:ck ~nonce ~cmsg with
| None -> assert false
| Some msg' -> assert Cstruct.(equal msg msg')
end
let box_noalloc () =
let open Box in
let buflen = msglen + zerobytes in
let buf = Cstruct.create buflen in
Cstruct.blit msg 0 buf zerobytes msglen ;
let pk, sk = keypair () in
let ck = combine pk sk in
let nonce = Nonce.gen () in
box_noalloc ~pk ~sk ~nonce ~msg:buf ;
let res = box_open_noalloc ~pk ~sk ~nonce ~cmsg:buf in
assert res ;
assert Cstruct.(equal msg (sub buf zerobytes msglen)) ;
box_combined_noalloc ~k:ck ~nonce ~msg:buf ;
let res = box_open_combined_noalloc ~k:ck ~nonce ~cmsg:buf in
assert res ;
assert Cstruct.(equal msg (sub buf zerobytes msglen))
let box = [
"box", `Quick, box ;
"box_noalloc", `Quick, box_noalloc ;
]
let sign = [
"keypair", `Quick, keypair ;
"sign", `Quick, sign ;
"sign_detached", `Quick, sign_detached ;
"sign_extended", `Quick, sign_extended ;
"sign_extended_detached", `Quick, sign_extended_detached ;
"public", `Quick, public ;
"base", `Quick, base ;
"comm", `Quick, comm ;
"assoc", `Quick, assoc ;
"arith", `Quick, arith ;
"arith2", `Quick, arith2 ;
]
let () =
Alcotest.run "tweetnacl" [
"hash", hash ;
"secretbox", secretbox ;
"box", box ;
"sign", sign ;
]

23
vendors/ocaml-tweetnacl/tweetnacl.opam vendored Normal file
View File

@ -0,0 +1,23 @@
opam-version: "1.2"
name: "tweetnacl"
version: "dev"
authors: "Vincent Bernardoff <vb@luminar.eu.org>"
maintainer: "Vincent Bernardoff <vb@luminar.eu.org>"
license: "ISC"
homepage: "https://github.com/vbmithr/ocaml-tweetnacl"
bug-reports: "https://github.com/vbmithr/ocaml-tweetnacl/issues"
dev-repo: "git://github.com/vbmithr/ocaml-tweetnacl"
available: [
ocaml-version >= "4.02.0"
]
build: [ "jbuilder" "build" "-j" jobs "-p" name "@install" ]
build-test: [ "jbuilder" "runtest" "-p" name "-j" jobs ]
depends: [
"jbuilder" {build & >= "1.0+beta16"}
"hex" {>= "1.2.0"}
"cstruct" {>= "3.2.1"}
"zarith" {>= "1.7"}
"alcotest" { "test" }
]