Branch data Line data Source code
1 : : /* 2 : : * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. 3 : : * 4 : : * Licensed under the Apache License, Version 2.0 (the "License"). 5 : : * You may not use this file except in compliance with the License. 6 : : * A copy of the License is located at 7 : : * 8 : : * http://aws.amazon.com/apache2.0 9 : : * 10 : : * or in the "license" file accompanying this file. This file is distributed 11 : : * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either 12 : : * express or implied. See the License for the specific language governing 13 : : * permissions and limitations under the License. 14 : : */ 15 : : 16 : : #include "crypto/s2n_mldsa.h" 17 : : 18 : : #include "crypto/s2n_hash.h" 19 : : #include "utils/s2n_safety.h" 20 : : 21 : : bool s2n_mldsa_is_supported() 22 : 20 : { 23 : : #if S2N_LIBCRYPTO_SUPPORTS_MLDSA 24 : : return s2n_hash_supports_shake(); 25 : : #else 26 : 20 : return false; 27 : 20 : #endif 28 : 20 : } 29 : : 30 : : /* 31 : : * TLS uses pure ML-DSA, as opposed to pre-hash ML-DSA. However, pure ML-DSA 32 : : * still supports a form of pre-hashing referred to as "external mu". 33 : : * 34 : : * "ExternalMu-ML-DSA" is defined in Appendix D of the ML-DSA PKI RFC: 35 : : * https://www.ietf.org/archive/id/draft-ietf-lamps-dilithium-certificates-07.html#appendix-D 36 : : * 37 : : * However, the AWS-LC codebase includes a much clearer description: 38 : : * https://github.com/aws/aws-lc/blob/07e2e1e9ccce0a1101f14e453dbdb1304c2f3472/crypto/fipsmodule/evp/p_pqdsa.c#L172-L177 39 : : * 40 : : * So in summary: 41 : : * mu = SHAKE256(SHAKE256(pk, 64) || 0 || ctx_len || ctx || M, 64) 42 : : * where: 43 : : * pk is the raw bytes of the public key. 44 : : * 0 represents the "mode" of pure ML-DSA, as opposed to pre-hash ML-DSA. 45 : : * ctx_len is the length of the context, which is zero for TLS. 46 : : * ctx is the context, which is zero-length for TLS. 47 : : * M is the data to be hashed. 48 : : * 64 is the length of the SHAKE256 digest. 49 : : */ 50 : : #define S2N_MLDSA_DIGEST_LENGTH 64 51 : : const uint8_t mode_and_ctx[] = { 0, 0 }; 52 : : S2N_RESULT s2n_mldsa_init_mu_hash(struct s2n_hash_state *state, const struct s2n_pkey *pub_key) 53 : 0 : { 54 [ # # ][ # # ]: 0 : RESULT_ENSURE_REF(state); 55 [ # # ][ # # ]: 0 : RESULT_ENSURE_REF(pub_key); 56 [ # # ][ # # ]: 0 : RESULT_ENSURE_REF(pub_key->pkey); 57 : : 58 : : /* The required prefix must be the first data added to the hash */ 59 : 0 : uint64_t currently_in_hash = 0; 60 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_get_currently_in_hash_total(state, ¤tly_in_hash)); 61 [ # # ][ # # ]: 0 : RESULT_ENSURE(currently_in_hash == 0, S2N_ERR_HASH_NOT_READY); 62 : : 63 : : /* Get the raw bytes of the public key */ 64 : 0 : uint8_t public_key_bytes[S2N_MLDSA_MAX_PUB_KEY_SIZE] = { 0 }; 65 : 0 : size_t public_key_size = sizeof(public_key_bytes); 66 : : #if S2N_LIBCRYPTO_SUPPORTS_MLDSA 67 : : RESULT_GUARD_OSSL(EVP_PKEY_get_raw_public_key(pub_key->pkey, public_key_bytes, &public_key_size), 68 : : S2N_ERR_HASH_INIT_FAILED); 69 : : #else 70 [ # # ]: 0 : RESULT_BAIL(S2N_ERR_INVALID_SIGNATURE_ALGORITHM); 71 : 0 : #endif 72 : : 73 : : /* Get the digest of the raw bytes of the public key. 74 : : * We can use the current hash state. We'll reset it afterwards. */ 75 : 0 : uint8_t public_key_digest[S2N_MLDSA_DIGEST_LENGTH] = { 0 }; 76 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_update(state, public_key_bytes, public_key_size)); 77 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_digest(state, public_key_digest, S2N_MLDSA_DIGEST_LENGTH)); 78 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_reset(state)); 79 : : 80 : : /* Add all the required prefix data */ 81 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_update(state, public_key_digest, S2N_MLDSA_DIGEST_LENGTH)); 82 [ # # ]: 0 : RESULT_GUARD_POSIX(s2n_hash_update(state, mode_and_ctx, sizeof(mode_and_ctx))); 83 : : 84 : 0 : return S2N_RESULT_OK; 85 : 0 : }