blob: 98d1941d5343d13149887e53e4b4080ac47bb5a6 [file] [log] [blame]
Raef Coles8ff6df52021-07-21 12:42:15 +01001/**
2 * \file lmots.h
3 *
4 * \brief This file provides an API for the LM-OTS post-quantum-safe one-time
Raef Coles2ad6e612022-08-24 13:33:35 +01005 * public-key signature scheme as defined in RFC8554 and NIST.SP.200-208.
6 * This implementation currently only supports a single parameter set
7 * MBEDTLS_LMOTS_SHA256_N32_W8 in order to reduce complexity.
Raef Coles8ff6df52021-07-21 12:42:15 +01008 */
9/*
10 * Copyright The Mbed TLS Contributors
11 * SPDX-License-Identifier: Apache-2.0
12 *
13 * Licensed under the Apache License, Version 2.0 (the "License"); you may
14 * not use this file except in compliance with the License.
15 * You may obtain a copy of the License at
16 *
17 * http://www.apache.org/licenses/LICENSE-2.0
18 *
19 * Unless required by applicable law or agreed to in writing, software
20 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
21 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
22 * See the License for the specific language governing permissions and
23 * limitations under the License.
24 */
25
26#ifndef MBEDTLS_LMOTS_H
27#define MBEDTLS_LMOTS_H
28
Raef Coles01c71a12022-08-31 15:55:00 +010029#include "mbedtls/build_info.h"
Raef Coles8ff6df52021-07-21 12:42:15 +010030
Raef Colesc8f96042022-08-25 13:49:54 +010031#include "psa/crypto.h"
32
Raef Colesab300f12022-09-28 17:12:41 +010033#include "mbedtls/lms.h"
34
Raef Coles8ff6df52021-07-21 12:42:15 +010035#include <stdint.h>
36#include <stddef.h>
37
Raef Coles8ff6df52021-07-21 12:42:15 +010038
Raef Colese9479a02022-09-01 16:06:35 +010039#define MBEDTLS_LMOTS_PUBLIC_KEY_LEN(type) (MBEDTLS_LMOTS_TYPE_LEN + \
40 MBEDTLS_LMOTS_I_KEY_ID_LEN + \
41 MBEDTLS_LMOTS_Q_LEAF_ID_LEN + \
42 MBEDTLS_LMOTS_N_HASH_LEN(type))
Raef Coles8ff6df52021-07-21 12:42:15 +010043
Raef Coles01c71a12022-08-31 15:55:00 +010044#define MBEDTLS_LMOTS_SIG_TYPE_OFFSET (0)
Raef Coles9c9027b2022-09-02 18:26:31 +010045#define MBEDTLS_LMOTS_SIG_C_RANDOM_OFFSET (MBEDTLS_LMOTS_SIG_TYPE_OFFSET + \
46 MBEDTLS_LMOTS_TYPE_LEN)
47#define MBEDTLS_LMOTS_SIG_SIGNATURE_OFFSET(type) (MBEDTLS_LMOTS_SIG_C_RANDOM_OFFSET + \
48 MBEDTLS_LMOTS_C_RANDOM_VALUE_LEN(type))
Raef Coles8ff6df52021-07-21 12:42:15 +010049
50#ifdef __cplusplus
51extern "C" {
52#endif
53
Raef Coles01c71a12022-08-31 15:55:00 +010054
Raef Coles40158e12022-09-27 10:23:53 +010055#if defined(MBEDTLS_TEST_HOOKS)
Gilles Peskine449bd832023-01-11 14:50:10 +010056extern int (*mbedtls_lmots_sign_private_key_invalidated_hook)(unsigned char *);
Raef Coles40158e12022-09-27 10:23:53 +010057#endif /* defined(MBEDTLS_TEST_HOOKS) */
58
Raef Coles01c71a12022-08-31 15:55:00 +010059/**
60 * \brief This function converts an unsigned int into a
61 * network-byte-order (big endian) string.
62 *
63 * \param val The unsigned integer value
64 * \param len The length of the string.
65 * \param bytes The string to output into.
Raef Coles01c71a12022-08-31 15:55:00 +010066 */
Gilles Peskine449bd832023-01-11 14:50:10 +010067void mbedtls_lms_unsigned_int_to_network_bytes(unsigned int val, size_t len,
68 unsigned char *bytes);
Raef Coles01c71a12022-08-31 15:55:00 +010069
70/**
71 * \brief This function converts a network-byte-order
72 * (big endian) string into an unsigned integer.
73 *
74 * \param len The length of the string.
75 * \param bytes The string.
76 *
77 * \return The corresponding LMS error code.
78 */
Gilles Peskine449bd832023-01-11 14:50:10 +010079unsigned int mbedtls_lms_network_bytes_to_unsigned_int(size_t len,
80 const unsigned char *bytes);
Raef Coles8ff6df52021-07-21 12:42:15 +010081
Andrzej Kurek8a045ce2022-12-23 11:00:06 -050082#if !defined(MBEDTLS_DEPRECATED_REMOVED)
Raef Colesc8f96042022-08-25 13:49:54 +010083/**
84 * \brief This function converts a \ref psa_status_t to a
85 * low-level LMS error code.
86 *
87 * \param status The psa_status_t to convert
88 *
89 * \return The corresponding LMS error code.
90 */
Andrzej Kurek8a045ce2022-12-23 11:00:06 -050091int MBEDTLS_DEPRECATED mbedtls_lms_error_from_psa(psa_status_t status);
92#endif
Raef Coles8ff6df52021-07-21 12:42:15 +010093
94/**
Raef Coles01c71a12022-08-31 15:55:00 +010095 * \brief This function initializes a public LMOTS context
Raef Coles8ff6df52021-07-21 12:42:15 +010096 *
97 * \param ctx The uninitialized LMOTS context that will then be
98 * initialized.
99 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100100void mbedtls_lmots_public_init(mbedtls_lmots_public_t *ctx);
Raef Coles8ff6df52021-07-21 12:42:15 +0100101
102/**
Raef Coles01c71a12022-08-31 15:55:00 +0100103 * \brief This function uninitializes a public LMOTS context
Raef Coles8ff6df52021-07-21 12:42:15 +0100104 *
105 * \param ctx The initialized LMOTS context that will then be
106 * uninitialized.
107 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100108void mbedtls_lmots_public_free(mbedtls_lmots_public_t *ctx);
Raef Coles8ff6df52021-07-21 12:42:15 +0100109
110/**
Raef Coles01c71a12022-08-31 15:55:00 +0100111 * \brief This function imports an LMOTS public key into a
112 * LMOTS context.
Raef Coles8ff6df52021-07-21 12:42:15 +0100113 *
Raef Coles01c71a12022-08-31 15:55:00 +0100114 * \note Before this function is called, the context must
115 * have been initialized.
Raef Coles8ff6df52021-07-21 12:42:15 +0100116 *
Raef Coles01c71a12022-08-31 15:55:00 +0100117 * \note See IETF RFC8554 for details of the encoding of
118 * this public key.
119 *
120 * \param ctx The initialized LMOTS context store the key in.
121 * \param key The buffer from which the key will be read.
Raef Coles366d67d2022-09-01 17:23:12 +0100122 * #MBEDTLS_LMOTS_PUBLIC_KEY_LEN bytes will be read
123 * from this.
Raef Colesc8f96042022-08-25 13:49:54 +0100124 *
125 * \return \c 0 on success.
126 * \return A non-zero error code on failure.
Raef Coles8ff6df52021-07-21 12:42:15 +0100127 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100128int mbedtls_lmots_import_public_key(mbedtls_lmots_public_t *ctx,
129 const unsigned char *key, size_t key_size);
Raef Coles8ff6df52021-07-21 12:42:15 +0100130
131/**
Raef Coles370cc432022-10-07 16:07:33 +0100132 * \brief This function exports an LMOTS public key from a
133 * LMOTS context that already contains a public key.
134 *
135 * \note Before this function is called, the context must
136 * have been initialized and the context must contain
137 * a public key.
138 *
139 * \note See IETF RFC8554 for details of the encoding of
140 * this public key.
141 *
142 * \param ctx The initialized LMOTS context that contains the
Tom Cosgrove1797b052022-12-04 17:19:59 +0000143 * public key.
Raef Coles370cc432022-10-07 16:07:33 +0100144 * \param key The buffer into which the key will be output. Must
145 * be at least #MBEDTLS_LMOTS_PUBLIC_KEY_LEN in size.
146 *
147 * \return \c 0 on success.
148 * \return A non-zero error code on failure.
149 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100150int mbedtls_lmots_export_public_key(const mbedtls_lmots_public_t *ctx,
151 unsigned char *key, size_t key_size,
152 size_t *key_len);
Raef Coles370cc432022-10-07 16:07:33 +0100153
154/**
Raef Coles8ff6df52021-07-21 12:42:15 +0100155 * \brief This function creates a candidate public key from
156 * an LMOTS signature. This can then be compared to
157 * the real public key to determine the validity of
158 * the signature.
159 *
160 * \note This function is exposed publicly to be used in LMS
161 * signature verification, it is expected that
162 * mbedtls_lmots_verify will be used for LMOTS
163 * signature verification.
164 *
Raef Coles01c71a12022-08-31 15:55:00 +0100165 * \param params The LMOTS parameter set, q and I values as an
166 * mbedtls_lmots_parameters_t struct.
Raef Coles8ff6df52021-07-21 12:42:15 +0100167 * \param msg The buffer from which the message will be read.
Raef Coles01c71a12022-08-31 15:55:00 +0100168 * \param msg_size The size of the message that will be read.
Raef Coles2ad6e612022-08-24 13:33:35 +0100169 * \param sig The buffer from which the signature will be read.
Raef Coles366d67d2022-09-01 17:23:12 +0100170 * #MBEDTLS_LMOTS_SIG_LEN bytes will be read from
171 * this.
Raef Coles8ff6df52021-07-21 12:42:15 +0100172 * \param out The buffer where the candidate public key will be
173 * stored. Must be at least #MBEDTLS_LMOTS_N_HASH_LEN
174 * bytes in size.
175 *
176 * \return \c 0 on success.
177 * \return A non-zero error code on failure.
178 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100179int mbedtls_lmots_calculate_public_key_candidate(const mbedtls_lmots_parameters_t *params,
180 const unsigned char *msg,
181 size_t msg_size,
182 const unsigned char *sig,
183 size_t sig_size,
184 unsigned char *out,
185 size_t out_size,
186 size_t *out_len);
Raef Coles8ff6df52021-07-21 12:42:15 +0100187
188/**
Raef Coles01c71a12022-08-31 15:55:00 +0100189 * \brief This function verifies a LMOTS signature, using a
190 * LMOTS context that contains a public key.
191 *
192 * \warning This function is **not intended for use in
193 * production**, due to as-yet unsolved problems with
Raef Coles9b0daf62022-10-10 14:25:39 +0100194 * handling stateful keys. The API for this function
195 * may change considerably in future versions.
Raef Coles01c71a12022-08-31 15:55:00 +0100196 *
197 * \note Before this function is called, the context must
198 * have been initialized and must contain a public key
Raef Coles366d67d2022-09-01 17:23:12 +0100199 * (either by import or calculation from a private
200 * key).
Raef Coles01c71a12022-08-31 15:55:00 +0100201 *
202 * \param ctx The initialized LMOTS context from which the public
203 * key will be read.
204 * \param msg The buffer from which the message will be read.
205 * \param msg_size The size of the message that will be read.
206 * \param sig The buf from which the signature will be read.
207 * #MBEDTLS_LMOTS_SIG_LEN bytes will be read from
208 * this.
209 *
210 * \return \c 0 on successful verification.
211 * \return A non-zero error code on failure.
212 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100213int mbedtls_lmots_verify(const mbedtls_lmots_public_t *ctx,
214 const unsigned char *msg,
215 size_t msg_size, const unsigned char *sig,
216 size_t sig_size);
Raef Coles01c71a12022-08-31 15:55:00 +0100217
Raef Coles5127e852022-10-07 10:35:56 +0100218#if defined(MBEDTLS_LMS_PRIVATE)
Raef Colesab4f8742022-09-01 12:24:31 +0100219
Raef Coles01c71a12022-08-31 15:55:00 +0100220/**
221 * \brief This function initializes a private LMOTS context
222 *
223 * \param ctx The uninitialized LMOTS context that will then be
224 * initialized.
225 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100226void mbedtls_lmots_private_init(mbedtls_lmots_private_t *ctx);
Raef Coles01c71a12022-08-31 15:55:00 +0100227
228/**
229 * \brief This function uninitializes a private LMOTS context
230 *
231 * \param ctx The initialized LMOTS context that will then be
232 * uninitialized.
233 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100234void mbedtls_lmots_private_free(mbedtls_lmots_private_t *ctx);
Raef Coles01c71a12022-08-31 15:55:00 +0100235
236/**
Raef Coles2ac352a2022-10-07 11:12:27 +0100237 * \brief This function calculates an LMOTS private key, and
Raef Coles01c71a12022-08-31 15:55:00 +0100238 * stores in into an LMOTS context.
239 *
240 * \warning This function is **not intended for use in
241 * production**, due to as-yet unsolved problems with
Raef Coles9b0daf62022-10-10 14:25:39 +0100242 * handling stateful keys. The API for this function
243 * may change considerably in future versions.
Raef Coles01c71a12022-08-31 15:55:00 +0100244 *
245 * \note The seed must have at least 256 bits of entropy.
246 *
247 * \param ctx The initialized LMOTS context to generate the key
248 * into.
249 * \param I_key_identifier The key identifier of the key, as a 16-byte string.
250 * \param q_leaf_identifier The leaf identifier of key. If this LMOTS key is
251 * not being used as part of an LMS key, this should
252 * be set to 0.
253 * \param seed The seed used to deterministically generate the
254 * key.
255 * \param seed_size The length of the seed.
256 *
257 * \return \c 0 on success.
258 * \return A non-zero error code on failure.
259 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100260int mbedtls_lmots_generate_private_key(mbedtls_lmots_private_t *ctx,
261 mbedtls_lmots_algorithm_type_t type,
262 const unsigned char I_key_identifier[MBEDTLS_LMOTS_I_KEY_ID_LEN],
263 uint32_t q_leaf_identifier,
264 const unsigned char *seed,
265 size_t seed_size);
Raef Coles01c71a12022-08-31 15:55:00 +0100266
267/**
268 * \brief This function generates an LMOTS public key from a
269 * LMOTS context that already contains a private key.
270 *
271 * \note Before this function is called, the context must
272 * have been initialized and the context must contain
273 * a private key.
274 *
275 * \param ctx The initialized LMOTS context to generate the key
276 * from and store it into.
277 *
278 * \return \c 0 on success.
279 * \return A non-zero error code on failure.
280 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100281int mbedtls_lmots_calculate_public_key(mbedtls_lmots_public_t *ctx,
282 const mbedtls_lmots_private_t *priv_ctx);
Raef Coles01c71a12022-08-31 15:55:00 +0100283
Raef Coles01c71a12022-08-31 15:55:00 +0100284/**
Raef Coles8ff6df52021-07-21 12:42:15 +0100285 * \brief This function creates a LMOTS signature, using a
286 * LMOTS context that contains a private key.
287 *
288 * \note Before this function is called, the context must
289 * have been initialized and must contain a private
290 * key.
291 *
292 * \note LMOTS private keys can only be used once, otherwise
293 * attackers may be able to create forged signatures.
294 * If the signing operation is successful, the private
295 * key in the context will be erased, and no further
296 * signing will be possible until another private key
297 * is loaded
298 *
299 * \param ctx The initialized LMOTS context from which the
300 * private key will be read.
301 * \param f_rng The RNG function to be used for signature
302 * generation.
303 * \param p_rng The RNG context to be passed to f_rng
304 * \param msg The buffer from which the message will be read.
Raef Coles01c71a12022-08-31 15:55:00 +0100305 * \param msg_size The size of the message that will be read.
Raef Coles8ff6df52021-07-21 12:42:15 +0100306 * \param sig The buf into which the signature will be stored.
307 * Must be at least #MBEDTLS_LMOTS_SIG_LEN in size.
308 *
309 * \return \c 0 on success.
310 * \return A non-zero error code on failure.
311 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100312int mbedtls_lmots_sign(mbedtls_lmots_private_t *ctx,
313 int (*f_rng)(void *, unsigned char *, size_t),
314 void *p_rng, const unsigned char *msg, size_t msg_size,
315 unsigned char *sig, size_t sig_size, size_t *sig_len);
Raef Coles8ff6df52021-07-21 12:42:15 +0100316
Raef Coles5127e852022-10-07 10:35:56 +0100317#endif /* defined(MBEDTLS_LMS_PRIVATE) */
Raef Coles8ff6df52021-07-21 12:42:15 +0100318
319#ifdef __cplusplus
320}
321#endif
322
323#endif /* MBEDTLS_LMOTS_H */