File: HPKE-KeySchedule.swift

package info (click to toggle)
swiftlang 6.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 2,519,992 kB
  • sloc: cpp: 9,107,863; ansic: 2,040,022; asm: 1,135,751; python: 296,500; objc: 82,456; f90: 60,502; lisp: 34,951; pascal: 19,946; sh: 18,133; perl: 7,482; ml: 4,937; javascript: 4,117; makefile: 3,840; awk: 3,535; xml: 914; fortran: 619; cs: 573; ruby: 573
file content (144 lines) | stat: -rw-r--r-- 6,940 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
//===----------------------------------------------------------------------===//
//
// This source file is part of the SwiftCrypto open source project
//
// Copyright (c) 2019-2020 Apple Inc. and the SwiftCrypto project authors
// Licensed under Apache License v2.0
//
// See LICENSE.txt for license information
// See CONTRIBUTORS.md for the list of SwiftCrypto project authors
//
// SPDX-License-Identifier: Apache-2.0
//
//===----------------------------------------------------------------------===//
#if CRYPTO_IN_SWIFTPM && !CRYPTO_IN_SWIFTPM_FORCE_BUILD_API
@_exported import CryptoKit
#else
import Foundation

extension HPKE {
    internal struct KeySchedule {
        fileprivate static let pksIDHashLabel = Data("psk_id_hash".utf8)
        fileprivate static let infoHashLabel = Data("info_hash".utf8)
        fileprivate static let secretLabel = Data("secret".utf8)
        fileprivate static let keyLabel = Data("key".utf8)
        fileprivate static let baseLabel = Data("base_nonce".utf8)
        fileprivate static let exporterLabel = Data("exp".utf8)
        
        var sequenceNumber: UInt64 = 0
        var key: SymmetricKey?
        var nonce: Data?
        var exporterSecret: SymmetricKey
        var ciphersuite: HPKE.Ciphersuite
        
        static func verifyPSKInputs(mode: HPKE.Mode, psk: SymmetricKey?, pskID: Data?) throws {
            let gotPSK = (psk != nil)
            let gotPSKID = (pskID != nil)
            
            if gotPSK != gotPSKID {
                throw HPKE.Errors.inconsistentPSKInputs
            }
            
            if gotPSK && !HPKE.Mode.pskModes.contains(mode) {
                throw HPKE.Errors.unexpectedPSK
            }
            
            if !gotPSK && HPKE.Mode.pskModes.contains(mode) {
                throw HPKE.Errors.expectedPSK
            }
        }
        
        init(mode: HPKE.Mode, sharedSecret: ContiguousBytes, info: Data, psk: SymmetricKey?, pskID: Data?, ciphersuite: Ciphersuite) throws {
            try HPKE.KeySchedule.verifyPSKInputs(mode: mode, psk: psk, pskID: pskID)
            
            let pskIDHash = NonSecretOutputLabeledExtract(salt: nil,
                                                          label: HPKE.KeySchedule.pksIDHashLabel,
                                                          ikm: pskID.map { SymmetricKey(data: $0) },
                                                          suiteID: ciphersuite.identifier,
                                                          kdf: ciphersuite.kdf)
            
            let infoHash = NonSecretOutputLabeledExtract(salt: nil,
                                                         label: HPKE.KeySchedule.infoHashLabel,
                                                         ikm: SymmetricKey(data: info),
                                                         suiteID: ciphersuite.identifier,
                                                         kdf: ciphersuite.kdf)
            
            var keyScheduleContext = Data()
            keyScheduleContext.append(mode.value)
            keyScheduleContext.append(pskIDHash)
            keyScheduleContext.append(infoHash)
            
            let secret = LabeledExtract(salt: Data(unsafeFromContiguousBytes: sharedSecret),
                                        label: HPKE.KeySchedule.secretLabel,
                                        ikm: psk.map { SymmetricKey(data: $0) },
                                        suiteID: ciphersuite.identifier,
                                        kdf: ciphersuite.kdf)
            
            if !ciphersuite.aead.isExportOnly {
                self.key = LabeledExpand(prk: secret,
                                         label: HPKE.KeySchedule.keyLabel,
                                         info: keyScheduleContext,
                                         outputByteCount: UInt16(ciphersuite.aead.keyByteCount),
                                         suiteID: ciphersuite.identifier,
                                         kdf: ciphersuite.kdf)
                
                self.nonce = NonSecretOutputLabeledExpand(prk: secret,
                                                          label: HPKE.KeySchedule.baseLabel,
                                                          info: keyScheduleContext,
                                                          outputByteCount: UInt16(ciphersuite.aead.nonceByteCount),
                                                          suiteID: ciphersuite.identifier,
                                                          kdf: ciphersuite.kdf)
            }
            
            self.exporterSecret = LabeledExpand(prk: secret,
                                                label: HPKE.KeySchedule.exporterLabel,
                                                info: keyScheduleContext,
                                                outputByteCount: UInt16(ciphersuite.kdf.Nh),
                                                suiteID: ciphersuite.identifier,
                                                kdf: ciphersuite.kdf)
            
            
            self.ciphersuite = ciphersuite
        }
        
        mutating func incrementSequenceNumber() throws {
            if self.sequenceNumber >= ((1 << (self.ciphersuite.aead.nonceByteCount)) - 1) {
                throw HPKE.Errors.outOfRangeSequenceNumber
            }
            sequenceNumber += 1
        }
        
        mutating func seal<M: DataProtocol, AD: DataProtocol>(_ msg: M, authenticating aad: AD) throws -> Data {
            guard !self.ciphersuite.aead.isExportOnly else {
                throw HPKE.Errors.exportOnlyMode
            }
            
            let ct = try ciphersuite.aead.seal(msg, authenticating: aad, nonce: currentNonce, using: self.key!)
            try incrementSequenceNumber()
            return ct
        }
        
        mutating func open<C: DataProtocol, AD: DataProtocol>(_ ciphertext: C, authenticating aad: AD) throws -> Data {
            guard !self.ciphersuite.aead.isExportOnly else {
                throw HPKE.Errors.exportOnlyMode
            }
            
            let pt = try ciphersuite.aead.open(ciphertext, nonce: currentNonce, authenticating: aad, using: self.key!)
            try incrementSequenceNumber()
            return pt
        }
        
        var currentNonce: Data {
            var nonceData = [UInt8](repeating: 0, count: ciphersuite.aead.nonceByteCount - MemoryLayout.size(ofValue: sequenceNumber))
            var bigEndian = sequenceNumber.bigEndian
            withUnsafeBytes(of: &(bigEndian)) { (bufferPointer) in
                nonceData.append(contentsOf: bufferPointer)
            }
            let nonce = self.nonce!
            precondition(nonce.count == nonceData.count)
            return Data(zip(nonceData, nonce).lazy.map { $0.0 ^ $0.1 })
        }
    }
}

#endif // Linux or !SwiftPM