summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/mlkem/mlkem_internal.h
diff options
context:
space:
mode:
authorbeck <>2024-12-13 00:17:18 +0000
committerbeck <>2024-12-13 00:17:18 +0000
commitd9dfb4af218b8d9fe842f363b39f2dc52cc54fc3 (patch)
tree96342312b2f330ea5c3d02d4c28c8c50ece4ee37 /src/lib/libcrypto/mlkem/mlkem_internal.h
parentc1d2232367daaf8b4eb64a789c2280bf931a6b99 (diff)
downloadopenbsd-d9dfb4af218b8d9fe842f363b39f2dc52cc54fc3.tar.gz
openbsd-d9dfb4af218b8d9fe842f363b39f2dc52cc54fc3.tar.bz2
openbsd-d9dfb4af218b8d9fe842f363b39f2dc52cc54fc3.zip
Add ML-KEM 1024 from BoringSSL
Changes include conversion from C++, basic KNF, then adaptation to use our sha3 functions for sha3 and shake instead of the BorinSSL version. This Adds units tests to run against BoringSSL and NIST test vectors. The future public API is the same as Boring's - but is not yet exposed pending making bytestring.h public (which will happen separately) and a minor bump Currently this will just ensure we build and run regress. ok tb@ to get it into the tree and massage from there.
Diffstat (limited to '')
-rw-r--r--src/lib/libcrypto/mlkem/mlkem_internal.h39
1 files changed, 39 insertions, 0 deletions
diff --git a/src/lib/libcrypto/mlkem/mlkem_internal.h b/src/lib/libcrypto/mlkem/mlkem_internal.h
index 3ef877f6d1..3141160ac2 100644
--- a/src/lib/libcrypto/mlkem/mlkem_internal.h
+++ b/src/lib/libcrypto/mlkem/mlkem_internal.h
@@ -69,6 +69,45 @@ void MLKEM768_encap_external_entropy(
69 const struct MLKEM768_public_key *public_key, 69 const struct MLKEM768_public_key *public_key,
70 const uint8_t entropy[MLKEM_ENCAP_ENTROPY]); 70 const uint8_t entropy[MLKEM_ENCAP_ENTROPY]);
71 71
72/*
73 * MLKEM1024_generate_key_external_entropy is a deterministic function to create a
74 * pair of ML-KEM 1024 keys, using the supplied entropy. The entropy needs to be
75 * uniformly random generated. This function is should only be used for tests,
76 * regular callers should use the non-deterministic |MLKEM_generate_key|
77 * directly.
78 */
79void MLKEM1024_generate_key_external_entropy(
80 uint8_t out_encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES],
81 struct MLKEM1024_private_key *out_private_key,
82 const uint8_t entropy[MLKEM_SEED_BYTES]);
83
84/*
85 * MLKEM1024_PRIVATE_KEY_BYTES is the length of the data produced by
86 * |MLKEM1024_marshal_private_key|.
87 */
88#define MLKEM1024_PRIVATE_KEY_BYTES 3168
89
90/*
91 * MLKEM1024_marshal_private_key serializes |private_key| to |out| in the
92 * standard format for ML-KEM private keys. It returns one on success or zero on
93 * allocation error.
94 */
95int MLKEM1024_marshal_private_key(CBB *out,
96 const struct MLKEM1024_private_key *private_key);
97
98/*
99 * MLKEM_encap_external_entropy behaves like |MLKEM_encap|, but uses
100 * |MLKEM_ENCAP_ENTROPY| bytes of |entropy| for randomization. The decapsulating
101 * side will be able to recover |entropy| in full. This function should only be
102 * used for tests, regular callers should use the non-deterministic
103 * |MLKEM_encap| directly.
104 */
105void MLKEM1024_encap_external_entropy(
106 uint8_t out_ciphertext[MLKEM1024_CIPHERTEXT_BYTES],
107 uint8_t out_shared_secret[MLKEM_SHARED_SECRET_BYTES],
108 const struct MLKEM1024_public_key *public_key,
109 const uint8_t entropy[MLKEM_ENCAP_ENTROPY]);
110
72__END_HIDDEN_DECLS 111__END_HIDDEN_DECLS
73 112
74#if defined(__cplusplus) 113#if defined(__cplusplus)