openssl/providers/implementations/encode_decode/ml_dsa_codecs.h

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

106 lines
3.5 KiB
C
Raw Normal View History

/*
* Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
* in the file LICENSE in the source distribution or at
* https://www.openssl.org/source/license.html
*/
#ifndef PROV_ML_DSA_CODECS_H
# define PROV_ML_DSA_CODECS_H
# pragma once
# ifndef OPENSSL_NO_ML_DSA
# include <openssl/e_os2.h>
# include "crypto/ml_dsa.h"
# include "prov/provider_ctx.h"
/*-
* The DER ASN.1 encoding of ML-KEM (and ML-DSA) public keys prepends 22 bytes
* to the encoded public key:
*
* - 4 byte outer sequence tag and length
* - 2 byte algorithm sequence tag and length
* - 2 byte algorithm OID tag and length
* - 9 byte algorithm OID (from NIST CSOR OID arc)
* - 4 byte bit string tag and length
* - 1 bitstring lead byte
*/
# define ML_DSA_SPKI_OVERHEAD 22
typedef struct {
const uint8_t asn1_prefix[ML_DSA_SPKI_OVERHEAD];
} ML_DSA_SPKI_FMT;
/*-
* For each parameter set we support a few PKCS#8 input formats, three
* corresponding to the "either or both" variants of:
*
* ML-DSA-PrivateKey ::= CHOICE {
* seed [0] IMPLICIT OCTET STRING (SIZE (32)),
* expandedKey OCTET STRING (SIZE (2560 | 4032 | 4896)),
* both SEQUENCE {
* seed OCTET STRING (SIZE (32)),
* expandedKey OCTET STRING (SIZE (2560 | 4032 | 4896)) } }
*
* one more for a historical OQS encoding:
*
* - OQS private + public key: OCTET STRING
* (The public key is ignored, just as with PKCS#8 v2.)
*
* and two more that are the minimal IETF non-ASN.1 seed encoding:
*
* - Bare seed (just the 32 bytes)
* - Bare priv (just the key bytes)
*
* A length of zero means that particular field is absent.
*
* The p8_shift is 0 when the top-level tag+length occupy four bytes, 2 when
* they occupy two byes, and 4 when no tag is used at all.
*/
typedef struct {
const char *p8_name; /* Format name */
size_t p8_bytes; /* Total P8 encoding length */
int p8_shift; /* 4 - (top-level tag + len) */
uint32_t p8_magic; /* The tag + len value */
uint16_t seed_magic; /* Interior tag + len for the seed */
size_t seed_offset; /* Seed offset from start */
size_t seed_length; /* Seed bytes */
uint32_t priv_magic; /* Interior tag + len for the key */
size_t priv_offset; /* Key offset from start */
size_t priv_length; /* Key bytes */
size_t pub_offset; /* Pubkey offset */
size_t pub_length; /* Pubkey bytes */
} ML_DSA_PKCS8_FMT;
typedef struct {
const ML_DSA_SPKI_FMT *spkifmt;
const ML_DSA_PKCS8_FMT *p8fmt;
} ML_DSA_CODEC;
typedef struct {
const ML_DSA_PKCS8_FMT *fmt;
int pref;
} ML_DSA_PKCS8_FMT_PREF;
__owur
ML_DSA_KEY *ossl_ml_dsa_d2i_PUBKEY(const uint8_t *pubenc, int publen,
int evp_type, PROV_CTX *provctx,
const char *propq);
__owur
ML_DSA_KEY *ossl_ml_dsa_d2i_PKCS8(const uint8_t *prvenc, int prvlen,
int evp_type, PROV_CTX *provctx,
const char *propq);
__owur
int ossl_ml_dsa_key_to_text(BIO *out, const ML_DSA_KEY *key, int selection);
__owur
__owur
int ossl_ml_dsa_i2d_pubkey(const ML_DSA_KEY *key, unsigned char **out);
__owur
__owur
int ossl_ml_dsa_i2d_prvkey(const ML_DSA_KEY *key, unsigned char **out,
PROV_CTX *provctx);
# endif /* OPENSSL_NO_ML_DSA */
#endif /* PROV_ML_DSA_CODECS_H */