use hacspec_lib::Randomness;
use hmac::hkdf_extract;
use crate::COMPUTATIONAL_SECURITY;
pub const MAC_LENGTH: usize = COMPUTATIONAL_SECURITY;
pub type Mac = [u8; MAC_LENGTH];
pub type MacKey = [u8; MAC_LENGTH];
pub fn hash_to_mac_width(dst: &[u8], input: &[u8]) -> [u8; 16] {
let mut hash = hkdf_extract(dst, input);
hash.truncate(16);
hash.try_into().unwrap()
}
pub fn xor_mac_width(left: &Mac, right: &Mac) -> Mac {
let mut result = [0u8; MAC_LENGTH];
for (index, byte) in result.iter_mut().enumerate() {
*byte = left[index] ^ right[index];
}
result
}
pub fn generate_mac_key(entropy: &mut Randomness) -> MacKey {
let k: [u8; MAC_LENGTH] = entropy
.bytes(MAC_LENGTH)
.expect("sufficient randomness should have been provided externally")
.try_into()
.expect("should have received the required number of bytes, because we requested them");
k
}
pub fn mac(bit: &bool, global_key: &MacKey, entropy: &mut Randomness) -> (Mac, MacKey) {
let key: [u8; MAC_LENGTH] = generate_mac_key(entropy);
let mut mac = [0u8; MAC_LENGTH];
for idx in 0..mac.len() {
mac[idx] = key[idx] ^ ((*bit as u8) * global_key[idx]);
}
(mac, key)
}
pub fn verify_mac(bit: &bool, mac: &Mac, key: &MacKey, global_key: &MacKey) -> bool {
for idx in 0..mac.len() {
let recomputed = key[idx] ^ ((*bit as u8) * global_key[idx]);
if mac[idx] != recomputed {
return false;
}
}
true
}
#[test]
fn simple() {
use rand::thread_rng;
use rand::RngCore;
let mut rng = thread_rng();
let mut random = vec![0; 2 * COMPUTATIONAL_SECURITY + 1];
rng.fill_bytes(&mut random);
let mut entropy = Randomness::new(random);
let b = entropy.bit().unwrap();
let delta = generate_mac_key(&mut entropy);
let (mac, key) = mac(&b, &delta, &mut entropy);
debug_assert!(verify_mac(&b, &mac, &key, &delta));
debug_assert!(!verify_mac(&!b, &mac, &key, &delta))
}