diff options
Diffstat (limited to 'vendor/rfc6979/src/lib.rs')
-rw-r--r-- | vendor/rfc6979/src/lib.rs | 149 |
1 files changed, 149 insertions, 0 deletions
diff --git a/vendor/rfc6979/src/lib.rs b/vendor/rfc6979/src/lib.rs new file mode 100644 index 0000000..817dda1 --- /dev/null +++ b/vendor/rfc6979/src/lib.rs @@ -0,0 +1,149 @@ +#![no_std] +#![doc = include_str!("../README.md")] +#![forbid(unsafe_code, clippy::unwrap_used)] +#![warn(missing_docs, rust_2018_idioms)] +#![doc( + html_logo_url = "https://raw.githubusercontent.com/RustCrypto/media/8f1a9894/logo.svg", + html_favicon_url = "https://raw.githubusercontent.com/RustCrypto/media/8f1a9894/logo.svg" +)] + +//! ## Usage +//! +//! See also: the documentation for the [`generate_k`] function. +//! +//! ``` +//! use hex_literal::hex; +//! use rfc6979::consts::U32; +//! use sha2::{Digest, Sha256}; +//! +//! // NIST P-256 field modulus +//! const NIST_P256_MODULUS: [u8; 32] = +//! hex!("FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551"); +//! +//! // Public key for RFC6979 NIST P256/SHA256 test case +//! const RFC6979_KEY: [u8; 32] = +//! hex!("C9AFA9D845BA75166B5C215767B1D6934E50C3DB36E89B127B8A622B120F6721"); +//! +//! // Test message for RFC6979 NIST P256/SHA256 test case +//! const RFC6979_MSG: &[u8; 6] = b"sample"; +//! +//! // Expected K for RFC6979 NIST P256/SHA256 test case +//! const RFC6979_EXPECTED_K: [u8; 32] = +//! hex!("A6E3C57DD01ABE90086538398355DD4C3B17AA873382B0F24D6129493D8AAD60"); +//! +//! let h = Sha256::digest(RFC6979_MSG); +//! let aad = b""; +//! let k = rfc6979::generate_k::<Sha256, U32>(&RFC6979_KEY.into(), &NIST_P256_MODULUS.into(), &h, aad); +//! assert_eq!(k.as_slice(), &RFC6979_EXPECTED_K); +//! ``` + +mod ct_cmp; + +pub use hmac::digest::generic_array::typenum::consts; + +use hmac::{ + digest::{ + core_api::BlockSizeUser, + generic_array::{ArrayLength, GenericArray}, + Digest, FixedOutput, FixedOutputReset, Mac, + }, + SimpleHmac, +}; + +/// Array of bytes representing a scalar serialized as a big endian integer. +pub type ByteArray<Size> = GenericArray<u8, Size>; + +/// Deterministically generate ephemeral scalar `k`. +/// +/// Accepts the following parameters and inputs: +/// +/// - `x`: secret key +/// - `n`: field modulus +/// - `h`: hash/digest of input message: must be reduced modulo `n` in advance +/// - `data`: additional associated data, e.g. CSRNG output used as added entropy +#[inline] +pub fn generate_k<D, N>( + x: &ByteArray<N>, + n: &ByteArray<N>, + h: &ByteArray<N>, + data: &[u8], +) -> ByteArray<N> +where + D: Digest + BlockSizeUser + FixedOutput<OutputSize = N> + FixedOutputReset, + N: ArrayLength<u8>, +{ + let mut hmac_drbg = HmacDrbg::<D>::new(x, h, data); + + loop { + let mut k = ByteArray::<N>::default(); + hmac_drbg.fill_bytes(&mut k); + + let k_is_zero = ct_cmp::ct_eq(&k, &ByteArray::default()); + if (!k_is_zero & ct_cmp::ct_lt(&k, n)).into() { + return k; + } + } +} + +/// Internal implementation of `HMAC_DRBG` as described in NIST SP800-90A. +/// +/// <https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final> +/// +/// This is a HMAC-based deterministic random bit generator used compute a +/// deterministic ephemeral scalar `k`. +pub struct HmacDrbg<D> +where + D: Digest + BlockSizeUser + FixedOutputReset, +{ + /// HMAC key `K` (see RFC 6979 Section 3.2.c) + k: SimpleHmac<D>, + + /// Chaining value `V` (see RFC 6979 Section 3.2.c) + v: GenericArray<u8, D::OutputSize>, +} + +impl<D> HmacDrbg<D> +where + D: Digest + BlockSizeUser + FixedOutputReset, +{ + /// Initialize `HMAC_DRBG` + pub fn new(entropy_input: &[u8], nonce: &[u8], additional_data: &[u8]) -> Self { + let mut k = SimpleHmac::new(&Default::default()); + let mut v = GenericArray::default(); + + for b in &mut v { + *b = 0x01; + } + + for i in 0..=1 { + k.update(&v); + k.update(&[i]); + k.update(entropy_input); + k.update(nonce); + k.update(additional_data); + k = SimpleHmac::new_from_slice(&k.finalize().into_bytes()).expect("HMAC error"); + + // Steps 3.2.e,g: v = HMAC_k(v) + k.update(&v); + v = k.finalize_reset().into_bytes(); + } + + Self { k, v } + } + + /// Write the next `HMAC_DRBG` output to the given byte slice. + pub fn fill_bytes(&mut self, out: &mut [u8]) { + for out_chunk in out.chunks_mut(self.v.len()) { + self.k.update(&self.v); + self.v = self.k.finalize_reset().into_bytes(); + out_chunk.copy_from_slice(&self.v[..out_chunk.len()]); + } + + self.k.update(&self.v); + self.k.update(&[0x00]); + self.k = + SimpleHmac::new_from_slice(&self.k.finalize_reset().into_bytes()).expect("HMAC error"); + self.k.update(&self.v); + self.v = self.k.finalize_reset().into_bytes(); + } +} |