Skip to content

Commit bdb7ddd

Browse files
authored
Merge pull request #293 from pq-code-package/refactor_sign_hashing
Refactor and simplify repeated hashing code in sign.c
2 parents a6552e6 + 256c771 commit bdb7ddd

File tree

3 files changed

+136
-32
lines changed

3 files changed

+136
-32
lines changed

mldsa/sign.c

Lines changed: 59 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,55 @@ int crypto_sign_keypair(uint8_t *pk, uint8_t *sk)
9191
return crypto_sign_keypair_internal(pk, sk, seed);
9292
}
9393

94+
/*************************************************
95+
* Name: mld_H
96+
*
97+
* Description: Abstracts application of SHAKE256 to
98+
* one, two or three blocks of data,
99+
* yielding a user-requested size of
100+
* output.
101+
*
102+
* Arguments: - uint8_t *out: pointer to output
103+
* - size_t outlen: requested output length in bytes
104+
* - const uint8_t *in1: pointer to input block 1
105+
* Must NOT be NULL
106+
* - size_t in1len: length of input in1 bytes
107+
* - const uint8_t *in2: pointer to input block 2
108+
* May be NULL, in which case
109+
* this block is ignored
110+
* - size_t in2len: length of input in2 bytes
111+
* - const uint8_t *in3: pointer to input block 3
112+
* May be NULL, in which case
113+
* this block is ignored
114+
* - size_t in3len: length of input in3 bytes
115+
**************************************************/
116+
static void mld_H(uint8_t *out, size_t outlen, const uint8_t *in1,
117+
size_t in1len, const uint8_t *in2, size_t in2len,
118+
const uint8_t *in3, size_t in3len)
119+
__contract__(
120+
requires(outlen <= 8 * SHAKE256_RATE /* somewhat arbitrary bound */)
121+
requires(memory_no_alias(in1, in1len))
122+
requires(in2 == NULL || memory_no_alias(in2, in2len))
123+
requires(in3 == NULL || memory_no_alias(in3, in3len))
124+
requires(memory_no_alias(out, outlen))
125+
assigns(memory_slice(out, outlen))
126+
)
127+
{
128+
keccak_state state;
129+
shake256_init(&state);
130+
shake256_absorb(&state, in1, in1len);
131+
if (in2 != NULL)
132+
{
133+
shake256_absorb(&state, in2, in2len);
134+
}
135+
if (in3 != NULL)
136+
{
137+
shake256_absorb(&state, in3, in3len);
138+
}
139+
shake256_finalize(&state);
140+
shake256_squeeze(out, outlen, &state);
141+
}
142+
94143
int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
95144
const uint8_t *m, size_t mlen,
96145
const uint8_t *pre, size_t prelen,
@@ -104,7 +153,6 @@ int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
104153
polyvecl mat[MLDSA_K], s1, y, z;
105154
polyveck t0, s2, w1, w0, h;
106155
poly cp;
107-
keccak_state state;
108156

109157
rho = seedbuf;
110158
tr = rho + MLDSA_SEEDBYTES;
@@ -116,12 +164,7 @@ int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
116164
if (!externalmu)
117165
{
118166
/* Compute mu = CRH(tr, pre, msg) */
119-
shake256_init(&state);
120-
shake256_absorb(&state, tr, MLDSA_TRBYTES);
121-
shake256_absorb(&state, pre, prelen);
122-
shake256_absorb(&state, m, mlen);
123-
shake256_finalize(&state);
124-
shake256_squeeze(mu, MLDSA_CRHBYTES, &state);
167+
mld_H(mu, MLDSA_CRHBYTES, tr, MLDSA_TRBYTES, pre, prelen, m, mlen);
125168
}
126169
else
127170
{
@@ -130,12 +173,8 @@ int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
130173
}
131174

132175
/* Compute rhoprime = CRH(key, rnd, mu) */
133-
shake256_init(&state);
134-
shake256_absorb(&state, key, MLDSA_SEEDBYTES);
135-
shake256_absorb(&state, rnd, MLDSA_RNDBYTES);
136-
shake256_absorb(&state, mu, MLDSA_CRHBYTES);
137-
shake256_finalize(&state);
138-
shake256_squeeze(rhoprime, MLDSA_CRHBYTES, &state);
176+
mld_H(rhoprime, MLDSA_CRHBYTES, key, MLDSA_SEEDBYTES, rnd, MLDSA_RNDBYTES, mu,
177+
MLDSA_CRHBYTES);
139178

140179
/* Expand matrix and transform vectors */
141180
polyvec_matrix_expand(mat, rho);
@@ -150,7 +189,7 @@ int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
150189
/* place loop invariants for CBMC. */
151190
while (1)
152191
__loop__(
153-
invariant(true); /* TODO */
192+
invariant(1) /* TODO */
154193
)
155194
{
156195
/* Sample intermediate vector y */
@@ -168,11 +207,8 @@ int crypto_sign_signature_internal(uint8_t *sig, size_t *siglen,
168207
polyveck_decompose(&w1, &w0, &w1);
169208
polyveck_pack_w1(sig, &w1);
170209

171-
shake256_init(&state);
172-
shake256_absorb(&state, mu, MLDSA_CRHBYTES);
173-
shake256_absorb(&state, sig, MLDSA_K * MLDSA_POLYW1_PACKEDBYTES);
174-
shake256_finalize(&state);
175-
shake256_squeeze(sig, MLDSA_CTILDEBYTES, &state);
210+
mld_H(sig, MLDSA_CTILDEBYTES, mu, MLDSA_CRHBYTES, sig,
211+
MLDSA_K * MLDSA_POLYW1_PACKEDBYTES, NULL, 0);
176212
poly_challenge(&cp, sig);
177213
poly_ntt(&cp);
178214

@@ -309,7 +345,6 @@ int crypto_sign_verify_internal(const uint8_t *sig, size_t siglen,
309345
poly cp;
310346
polyvecl mat[MLDSA_K], z;
311347
polyveck t1, w1, h;
312-
keccak_state state;
313348

314349
if (siglen != CRYPTO_BYTES)
315350
{
@@ -329,13 +364,8 @@ int crypto_sign_verify_internal(const uint8_t *sig, size_t siglen,
329364
if (!externalmu)
330365
{
331366
/* Compute CRH(H(rho, t1), pre, msg) */
332-
shake256(mu, MLDSA_TRBYTES, pk, CRYPTO_PUBLICKEYBYTES);
333-
shake256_init(&state);
334-
shake256_absorb(&state, mu, MLDSA_TRBYTES);
335-
shake256_absorb(&state, pre, prelen);
336-
shake256_absorb(&state, m, mlen);
337-
shake256_finalize(&state);
338-
shake256_squeeze(mu, MLDSA_CRHBYTES, &state);
367+
mld_H(mu, MLDSA_TRBYTES, pk, CRYPTO_PUBLICKEYBYTES, NULL, 0, NULL, 0);
368+
mld_H(mu, MLDSA_CRHBYTES, mu, MLDSA_TRBYTES, pre, prelen, m, mlen);
339369
}
340370
else
341371
{
@@ -365,11 +395,8 @@ int crypto_sign_verify_internal(const uint8_t *sig, size_t siglen,
365395
polyveck_pack_w1(buf, &w1);
366396

367397
/* Call random oracle and verify challenge */
368-
shake256_init(&state);
369-
shake256_absorb(&state, mu, MLDSA_CRHBYTES);
370-
shake256_absorb(&state, buf, MLDSA_K * MLDSA_POLYW1_PACKEDBYTES);
371-
shake256_finalize(&state);
372-
shake256_squeeze(c2, MLDSA_CTILDEBYTES, &state);
398+
mld_H(c2, MLDSA_CTILDEBYTES, mu, MLDSA_CRHBYTES, buf,
399+
MLDSA_K * MLDSA_POLYW1_PACKEDBYTES, NULL, 0);
373400
for (i = 0; i < MLDSA_CTILDEBYTES; ++i)
374401
{
375402
if (c[i] != c2[i])

proofs/cbmc/mld_h/Makefile

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
# Copyright (c) The mldsa-native project authors
2+
# SPDX-License-Identifier: Apache-2.0 OR ISC OR MIT
3+
4+
include ../Makefile_params.common
5+
6+
HARNESS_ENTRY = harness
7+
HARNESS_FILE = mld_h_harness
8+
9+
# This should be a unique identifier for this proof, and will appear on the
10+
# Litani dashboard. It can be human-readable and contain spaces if you wish.
11+
PROOF_UID = mld_h
12+
13+
DEFINES +=
14+
INCLUDES +=
15+
16+
REMOVE_FUNCTION_BODY +=
17+
UNWINDSET +=
18+
19+
PROOF_SOURCES += $(PROOFDIR)/$(HARNESS_FILE).c
20+
PROJECT_SOURCES += $(SRCDIR)/mldsa/sign.c
21+
22+
CHECK_FUNCTION_CONTRACTS=mld_H
23+
USE_FUNCTION_CONTRACTS=$(FIPS202_NAMESPACE)shake256_init $(FIPS202_NAMESPACE)shake256_absorb $(FIPS202_NAMESPACE)shake256_squeeze $(FIPS202_NAMESPACE)shake256_finalize
24+
APPLY_LOOP_CONTRACTS=on
25+
USE_DYNAMIC_FRAMES=1
26+
27+
# Disable any setting of EXTERNAL_SAT_SOLVER, and choose SMT backend instead
28+
EXTERNAL_SAT_SOLVER=
29+
CBMCFLAGS=--smt2
30+
31+
FUNCTION_NAME = mld_h
32+
33+
# If this proof is found to consume huge amounts of RAM, you can set the
34+
# EXPENSIVE variable. With new enough versions of the proof tools, this will
35+
# restrict the number of EXPENSIVE CBMC jobs running at once. See the
36+
# documentation in Makefile.common under the "Job Pools" heading for details.
37+
# EXPENSIVE = true
38+
39+
# This function is large enough to need...
40+
CBMC_OBJECT_BITS = 8
41+
42+
# If you require access to a file-local ("static") function or object to conduct
43+
# your proof, set the following (and do not include the original source file
44+
# ("mldsa/poly.c") in PROJECT_SOURCES).
45+
# REWRITTEN_SOURCES = $(PROOFDIR)/<__SOURCE_FILE_BASENAME__>.i
46+
# include ../Makefile.common
47+
# $(PROOFDIR)/<__SOURCE_FILE_BASENAME__>.i_SOURCE = $(SRCDIR)/mldsa/poly.c
48+
# $(PROOFDIR)/<__SOURCE_FILE_BASENAME__>.i_FUNCTIONS = foo bar
49+
# $(PROOFDIR)/<__SOURCE_FILE_BASENAME__>.i_OBJECTS = baz
50+
# Care is required with variables on the left-hand side: REWRITTEN_SOURCES must
51+
# be set before including Makefile.common, but any use of variables on the
52+
# left-hand side requires those variables to be defined. Hence, _SOURCE,
53+
# _FUNCTIONS, _OBJECTS is set after including Makefile.common.
54+
55+
include ../Makefile.common

proofs/cbmc/mld_h/mld_h_harness.c

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
// Copyright (c) The mldsa-native project authors
2+
// SPDX-License-Identifier: Apache-2.0 OR ISC OR MIT
3+
4+
#include "sign.h"
5+
6+
void mld_H(uint8_t *out, size_t outlen, const uint8_t *in1, size_t in1len,
7+
const uint8_t *in2, size_t in2len, const uint8_t *in3,
8+
size_t in3len);
9+
10+
void harness(void)
11+
{
12+
uint8_t *out;
13+
size_t outlen;
14+
const uint8_t *in1;
15+
size_t in1len;
16+
const uint8_t *in2;
17+
size_t in2len;
18+
const uint8_t *in3;
19+
size_t in3len;
20+
21+
mld_H(out, outlen, in1, in1len, in2, in2len, in3, in3len);
22+
}

0 commit comments

Comments
 (0)