diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libcrypto/mlkem/mlkem.h | 285 |
1 files changed, 0 insertions, 285 deletions
diff --git a/src/lib/libcrypto/mlkem/mlkem.h b/src/lib/libcrypto/mlkem/mlkem.h deleted file mode 100644 index 055d92290e..0000000000 --- a/src/lib/libcrypto/mlkem/mlkem.h +++ /dev/null | |||
@@ -1,285 +0,0 @@ | |||
1 | /* $OpenBSD: mlkem.h,v 1.5 2025/03/28 12:17:16 tb Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2024, Google Inc. | ||
4 | * | ||
5 | * Permission to use, copy, modify, and/or distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY | ||
12 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | ||
14 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | ||
15 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | #ifndef OPENSSL_HEADER_MLKEM_H | ||
19 | #define OPENSSL_HEADER_MLKEM_H | ||
20 | |||
21 | #include <sys/types.h> | ||
22 | #include <stdint.h> | ||
23 | |||
24 | #if defined(__cplusplus) | ||
25 | extern "C" { | ||
26 | #endif | ||
27 | |||
28 | /* Hack for now */ | ||
29 | struct cbs_st; | ||
30 | struct cbb_st; | ||
31 | |||
32 | /* | ||
33 | * ML-KEM-768 | ||
34 | * | ||
35 | * This implements the Module-Lattice-Based Key-Encapsulation Mechanism from | ||
36 | * https://csrc.nist.gov/pubs/fips/204/final | ||
37 | */ | ||
38 | |||
39 | /* | ||
40 | * MLKEM768_public_key contains a ML-KEM-768 public key. The contents of this | ||
41 | * object should never leave the address space since the format is unstable. | ||
42 | */ | ||
43 | struct MLKEM768_public_key { | ||
44 | union { | ||
45 | uint8_t bytes[512 * (3 + 9) + 32 + 32]; | ||
46 | uint16_t alignment; | ||
47 | } opaque; | ||
48 | }; | ||
49 | |||
50 | /* | ||
51 | * MLKEM768_private_key contains a ML-KEM-768 private key. The contents of this | ||
52 | * object should never leave the address space since the format is unstable. | ||
53 | */ | ||
54 | struct MLKEM768_private_key { | ||
55 | union { | ||
56 | uint8_t bytes[512 * (3 + 3 + 9) + 32 + 32 + 32]; | ||
57 | uint16_t alignment; | ||
58 | } opaque; | ||
59 | }; | ||
60 | |||
61 | /* | ||
62 | * MLKEM768_PUBLIC_KEY_BYTES is the number of bytes in an encoded ML-KEM768 public | ||
63 | * key. | ||
64 | */ | ||
65 | #define MLKEM768_PUBLIC_KEY_BYTES 1184 | ||
66 | |||
67 | /* MLKEM_SEED_BYTES is the number of bytes in an ML-KEM seed. */ | ||
68 | #define MLKEM_SEED_BYTES 64 | ||
69 | |||
70 | /* | ||
71 | * MLKEM_SHARED_SECRET_BYTES is the number of bytes in the ML-KEM768 shared | ||
72 | * secret. Although the round-3 specification has a variable-length output, the | ||
73 | * final ML-KEM construction is expected to use a fixed 32-byte output. To | ||
74 | * simplify the future transition, we apply the same restriction. | ||
75 | */ | ||
76 | #define MLKEM_SHARED_SECRET_BYTES 32 | ||
77 | |||
78 | /* | ||
79 | * MLKEM_generate_key generates a random public/private key pair, writes the | ||
80 | * encoded public key to |out_encoded_public_key| and sets |out_private_key| to | ||
81 | * the private key. If |optional_out_seed| is not NULL then the seed used to | ||
82 | * generate the private key is written to it. | ||
83 | */ | ||
84 | void MLKEM768_generate_key( | ||
85 | uint8_t out_encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES], | ||
86 | uint8_t optional_out_seed[MLKEM_SEED_BYTES], | ||
87 | struct MLKEM768_private_key *out_private_key); | ||
88 | |||
89 | /* | ||
90 | * MLKEM768_private_key_from_seed derives a private key from a seed that was | ||
91 | * generated by |MLKEM768_generate_key|. It fails and returns 0 if |seed_len| is | ||
92 | * incorrect, otherwise it writes |*out_private_key| and returns 1. | ||
93 | */ | ||
94 | int MLKEM768_private_key_from_seed(struct MLKEM768_private_key *out_private_key, | ||
95 | const uint8_t *seed, size_t seed_len); | ||
96 | |||
97 | /* | ||
98 | * MLKEM_public_from_private sets |*out_public_key| to the public key that | ||
99 | * corresponds to |private_key|. (This is faster than parsing the output of | ||
100 | * |MLKEM_generate_key| if, for some reason, you need to encapsulate to a key | ||
101 | * that was just generated.) | ||
102 | */ | ||
103 | void MLKEM768_public_from_private(struct MLKEM768_public_key *out_public_key, | ||
104 | const struct MLKEM768_private_key *private_key); | ||
105 | |||
106 | /* MLKEM768_CIPHERTEXT_BYTES is number of bytes in the ML-KEM768 ciphertext. */ | ||
107 | #define MLKEM768_CIPHERTEXT_BYTES 1088 | ||
108 | |||
109 | /* | ||
110 | * MLKEM768_encap encrypts a random shared secret for |public_key|, writes the | ||
111 | * ciphertext to |out_ciphertext|, and writes the random shared secret to | ||
112 | * |out_shared_secret|. | ||
113 | */ | ||
114 | void MLKEM768_encap(uint8_t out_ciphertext[MLKEM768_CIPHERTEXT_BYTES], | ||
115 | uint8_t out_shared_secret[MLKEM_SHARED_SECRET_BYTES], | ||
116 | const struct MLKEM768_public_key *public_key); | ||
117 | |||
118 | /* | ||
119 | * MLKEM768_decap decrypts a shared secret from |ciphertext| using |private_key| | ||
120 | * and writes it to |out_shared_secret|. If |ciphertext_len| is incorrect it | ||
121 | * returns 0, otherwise it rreturns 1. If |ciphertext| is invalid, | ||
122 | * |out_shared_secret| is filled with a key that will always be the same for the | ||
123 | * same |ciphertext| and |private_key|, but which appears to be random unless | ||
124 | * one has access to |private_key|. These alternatives occur in constant time. | ||
125 | * Any subsequent symmetric encryption using |out_shared_secret| must use an | ||
126 | * authenticated encryption scheme in order to discover the decapsulation | ||
127 | * failure. | ||
128 | */ | ||
129 | int MLKEM768_decap(uint8_t out_shared_secret[MLKEM_SHARED_SECRET_BYTES], | ||
130 | const uint8_t *ciphertext, size_t ciphertext_len, | ||
131 | const struct MLKEM768_private_key *private_key); | ||
132 | |||
133 | /* Serialisation of keys. */ | ||
134 | |||
135 | /* | ||
136 | * MLKEM768_marshal_public_key serializes |public_key| to |out| in the standard | ||
137 | * format for ML-KEM public keys. It returns one on success or zero on allocation | ||
138 | * error. | ||
139 | */ | ||
140 | int MLKEM768_marshal_public_key(struct cbb_st *out, | ||
141 | const struct MLKEM768_public_key *public_key); | ||
142 | |||
143 | /* | ||
144 | * MLKEM768_parse_public_key parses a public key, in the format generated by | ||
145 | * |MLKEM_marshal_public_key|, from |in| and writes the result to | ||
146 | * |out_public_key|. It returns one on success or zero on parse error or if | ||
147 | * there are trailing bytes in |in|. | ||
148 | */ | ||
149 | int MLKEM768_parse_public_key(struct MLKEM768_public_key *out_public_key, | ||
150 | struct cbs_st *in); | ||
151 | |||
152 | /* | ||
153 | * MLKEM_parse_private_key parses a private key, in the format generated by | ||
154 | * |MLKEM_marshal_private_key|, from |in| and writes the result to | ||
155 | * |out_private_key|. It returns one on success or zero on parse error or if | ||
156 | * there are trailing bytes in |in|. This formate is verbose and should be avoided. | ||
157 | * Private keys should be stored as seeds and parsed using |MLKEM768_private_key_from_seed|. | ||
158 | */ | ||
159 | int MLKEM768_parse_private_key(struct MLKEM768_private_key *out_private_key, | ||
160 | struct cbs_st *in); | ||
161 | |||
162 | /* | ||
163 | * ML-KEM-1024 | ||
164 | * | ||
165 | * ML-KEM-1024 also exists. You should prefer ML-KEM-768 where possible. | ||
166 | */ | ||
167 | |||
168 | /* | ||
169 | * MLKEM1024_public_key contains an ML-KEM-1024 public key. The contents of this | ||
170 | * object should never leave the address space since the format is unstable. | ||
171 | */ | ||
172 | struct MLKEM1024_public_key { | ||
173 | union { | ||
174 | uint8_t bytes[512 * (4 + 16) + 32 + 32]; | ||
175 | uint16_t alignment; | ||
176 | } opaque; | ||
177 | }; | ||
178 | |||
179 | /* | ||
180 | * MLKEM1024_private_key contains a ML-KEM-1024 private key. The contents of | ||
181 | * this object should never leave the address space since the format is | ||
182 | * unstable. | ||
183 | */ | ||
184 | struct MLKEM1024_private_key { | ||
185 | union { | ||
186 | uint8_t bytes[512 * (4 + 4 + 16) + 32 + 32 + 32]; | ||
187 | uint16_t alignment; | ||
188 | } opaque; | ||
189 | }; | ||
190 | |||
191 | /* | ||
192 | * MLKEM1024_PUBLIC_KEY_BYTES is the number of bytes in an encoded ML-KEM-1024 | ||
193 | * public key. | ||
194 | */ | ||
195 | #define MLKEM1024_PUBLIC_KEY_BYTES 1568 | ||
196 | |||
197 | /* | ||
198 | * MLKEM1024_generate_key generates a random public/private key pair, writes the | ||
199 | * encoded public key to |out_encoded_public_key| and sets |out_private_key| to | ||
200 | * the private key. If |optional_out_seed| is not NULL then the seed used to | ||
201 | * generate the private key is written to it. | ||
202 | */ | ||
203 | void MLKEM1024_generate_key( | ||
204 | uint8_t out_encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES], | ||
205 | uint8_t optional_out_seed[MLKEM_SEED_BYTES], | ||
206 | struct MLKEM1024_private_key *out_private_key); | ||
207 | |||
208 | /* | ||
209 | * MLKEM1024_private_key_from_seed derives a private key from a seed that was | ||
210 | * generated by |MLKEM1024_generate_key|. It fails and returns 0 if |seed_len| | ||
211 | * is incorrect, otherwise it writes |*out_private_key| and returns 1. | ||
212 | */ | ||
213 | int MLKEM1024_private_key_from_seed( | ||
214 | struct MLKEM1024_private_key *out_private_key, const uint8_t *seed, | ||
215 | size_t seed_len); | ||
216 | |||
217 | /* | ||
218 | * MLKEM1024_public_from_private sets |*out_public_key| to the public key that | ||
219 | * corresponds to |private_key|. (This is faster than parsing the output of | ||
220 | * |MLKEM1024_generate_key| if, for some reason, you need to encapsulate to a | ||
221 | * key that was just generated.) | ||
222 | */ | ||
223 | void MLKEM1024_public_from_private(struct MLKEM1024_public_key *out_public_key, | ||
224 | const struct MLKEM1024_private_key *private_key); | ||
225 | |||
226 | /* MLKEM1024_CIPHERTEXT_BYTES is number of bytes in the ML-KEM-1024 ciphertext. */ | ||
227 | #define MLKEM1024_CIPHERTEXT_BYTES 1568 | ||
228 | |||
229 | /* | ||
230 | * MLKEM1024_encap encrypts a random shared secret for |public_key|, writes the | ||
231 | * ciphertext to |out_ciphertext|, and writes the random shared secret to | ||
232 | * |out_shared_secret|. | ||
233 | */ | ||
234 | void MLKEM1024_encap(uint8_t out_ciphertext[MLKEM1024_CIPHERTEXT_BYTES], | ||
235 | uint8_t out_shared_secret[MLKEM_SHARED_SECRET_BYTES], | ||
236 | const struct MLKEM1024_public_key *public_key); | ||
237 | |||
238 | /* | ||
239 | * MLKEM1024_decap decrypts a shared secret from |ciphertext| using | ||
240 | * |private_key| and writes it to |out_shared_secret|. If |ciphertext_len| is | ||
241 | * incorrect it returns 0, otherwise it returns 1. If |ciphertext| is invalid | ||
242 | * (but of the correct length), |out_shared_secret| is filled with a key that | ||
243 | * will always be the same for the same |ciphertext| and |private_key|, but | ||
244 | * which appears to be random unless one has access to |private_key|. These | ||
245 | * alternatives occur in constant time. Any subsequent symmetric encryption | ||
246 | * using |out_shared_secret| must use an authenticated encryption scheme in | ||
247 | * order to discover the decapsulation failure. | ||
248 | */ | ||
249 | int MLKEM1024_decap(uint8_t out_shared_secret[MLKEM_SHARED_SECRET_BYTES], | ||
250 | const uint8_t *ciphertext, size_t ciphertext_len, | ||
251 | const struct MLKEM1024_private_key *private_key); | ||
252 | |||
253 | /* | ||
254 | * Serialisation of ML-KEM-1024 keys. | ||
255 | * MLKEM1024_marshal_public_key serializes |public_key| to |out| in the standard | ||
256 | * format for ML-KEM-1024 public keys. It returns one on success or zero on | ||
257 | * allocation error. | ||
258 | */ | ||
259 | int MLKEM1024_marshal_public_key(struct cbb_st *out, | ||
260 | const struct MLKEM1024_public_key *public_key); | ||
261 | |||
262 | /* | ||
263 | * MLKEM1024_parse_public_key parses a public key, in the format generated by | ||
264 | * |MLKEM1024_marshal_public_key|, from |in| and writes the result to | ||
265 | * |out_public_key|. It returns one on success or zero on parse error or if | ||
266 | * there are trailing bytes in |in|. | ||
267 | */ | ||
268 | int MLKEM1024_parse_public_key(struct MLKEM1024_public_key *out_public_key, | ||
269 | struct cbs_st *in); | ||
270 | |||
271 | /* | ||
272 | * MLKEM1024_parse_private_key parses a private key, in NIST's format for | ||
273 | * private keys, from |in| and writes the result to |out_private_key|. It | ||
274 | * returns one on success or zero on parse error or if there are trailing bytes | ||
275 | * in |in|. This format is verbose and should be avoided. Private keys should be | ||
276 | * stored as seeds and parsed using |MLKEM1024_private_key_from_seed|. | ||
277 | */ | ||
278 | int MLKEM1024_parse_private_key(struct MLKEM1024_private_key *out_private_key, | ||
279 | struct cbs_st *in); | ||
280 | |||
281 | #if defined(__cplusplus) | ||
282 | } | ||
283 | #endif | ||
284 | |||
285 | #endif /* OPENSSL_HEADER_MLKEM_H */ | ||