mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
crypto/internal/mlkem768: move to crypto/internal/fips/mlkem
In the process, replace out-of-module imports with their FIPS versions. For #69536 Change-Id: I83e900b7c38ecf760382e5dca7fd0b1eaa5a5589 Reviewed-on: https://go-review.googlesource.com/c/go/+/626879 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Russ Cox <rsc@golang.org> Auto-Submit: Filippo Valsorda <filippo@golang.org> Reviewed-by: Daniel McCarney <daniel@binaryparadox.net> Reviewed-by: Michael Knyszek <mknyszek@google.com>
This commit is contained in:
parent
d1f74ada56
commit
0eeabaa9d7
5 changed files with 18 additions and 18 deletions
|
@ -10,9 +10,9 @@ import (
|
||||||
"crypto"
|
"crypto"
|
||||||
"crypto/ecdsa"
|
"crypto/ecdsa"
|
||||||
"crypto/ed25519"
|
"crypto/ed25519"
|
||||||
|
"crypto/internal/fips/mlkem"
|
||||||
"crypto/internal/fips/tls13"
|
"crypto/internal/fips/tls13"
|
||||||
"crypto/internal/hpke"
|
"crypto/internal/hpke"
|
||||||
"crypto/internal/mlkem768"
|
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/subtle"
|
"crypto/subtle"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
|
@ -160,11 +160,11 @@ func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echCon
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
seed := make([]byte, mlkem768.SeedSize)
|
seed := make([]byte, mlkem.SeedSize)
|
||||||
if _, err := io.ReadFull(config.rand(), seed); err != nil {
|
if _, err := io.ReadFull(config.rand(), seed); err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
keyShareKeys.kyber, err = mlkem768.NewDecapsulationKey768(seed)
|
keyShareKeys.kyber, err = mlkem.NewDecapsulationKey768(seed)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, nil, err
|
return nil, nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,8 +10,8 @@ import (
|
||||||
"crypto"
|
"crypto"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/internal/fips/hkdf"
|
"crypto/internal/fips/hkdf"
|
||||||
|
"crypto/internal/fips/mlkem"
|
||||||
"crypto/internal/fips/tls13"
|
"crypto/internal/fips/tls13"
|
||||||
"crypto/internal/mlkem768"
|
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/subtle"
|
"crypto/subtle"
|
||||||
"errors"
|
"errors"
|
||||||
|
@ -481,7 +481,7 @@ func (hs *clientHandshakeStateTLS13) establishHandshakeKeys() error {
|
||||||
|
|
||||||
ecdhePeerData := hs.serverHello.serverShare.data
|
ecdhePeerData := hs.serverHello.serverShare.data
|
||||||
if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
|
if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
|
||||||
if len(ecdhePeerData) != x25519PublicKeySize+mlkem768.CiphertextSize768 {
|
if len(ecdhePeerData) != x25519PublicKeySize+mlkem.CiphertextSize768 {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: invalid server key share")
|
return errors.New("tls: invalid server key share")
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,8 +9,8 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"crypto"
|
"crypto"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
|
"crypto/internal/fips/mlkem"
|
||||||
"crypto/internal/fips/tls13"
|
"crypto/internal/fips/tls13"
|
||||||
"crypto/internal/mlkem768"
|
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"errors"
|
"errors"
|
||||||
"hash"
|
"hash"
|
||||||
|
@ -223,7 +223,7 @@ func (hs *serverHandshakeStateTLS13) processClientHello() error {
|
||||||
ecdhData := clientKeyShare.data
|
ecdhData := clientKeyShare.data
|
||||||
if selectedGroup == x25519Kyber768Draft00 {
|
if selectedGroup == x25519Kyber768Draft00 {
|
||||||
ecdhGroup = X25519
|
ecdhGroup = X25519
|
||||||
if len(ecdhData) != x25519PublicKeySize+mlkem768.EncapsulationKeySize768 {
|
if len(ecdhData) != x25519PublicKeySize+mlkem.EncapsulationKeySize768 {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: invalid Kyber client key share")
|
return errors.New("tls: invalid Kyber client key share")
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,13 +7,12 @@ package tls
|
||||||
import (
|
import (
|
||||||
"crypto/ecdh"
|
"crypto/ecdh"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
|
"crypto/internal/fips/mlkem"
|
||||||
|
"crypto/internal/fips/sha3"
|
||||||
"crypto/internal/fips/tls13"
|
"crypto/internal/fips/tls13"
|
||||||
"crypto/internal/mlkem768"
|
|
||||||
"errors"
|
"errors"
|
||||||
"hash"
|
"hash"
|
||||||
"io"
|
"io"
|
||||||
|
|
||||||
"golang.org/x/crypto/sha3"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// This file contains the functions necessary to compute the TLS 1.3 key
|
// This file contains the functions necessary to compute the TLS 1.3 key
|
||||||
|
@ -54,11 +53,11 @@ func (c *cipherSuiteTLS13) exportKeyingMaterial(s *tls13.MasterSecret, transcrip
|
||||||
type keySharePrivateKeys struct {
|
type keySharePrivateKeys struct {
|
||||||
curveID CurveID
|
curveID CurveID
|
||||||
ecdhe *ecdh.PrivateKey
|
ecdhe *ecdh.PrivateKey
|
||||||
kyber *mlkem768.DecapsulationKey768
|
kyber *mlkem.DecapsulationKey768
|
||||||
}
|
}
|
||||||
|
|
||||||
// kyberDecapsulate implements decapsulation according to Kyber Round 3.
|
// kyberDecapsulate implements decapsulation according to Kyber Round 3.
|
||||||
func kyberDecapsulate(dk *mlkem768.DecapsulationKey768, c []byte) ([]byte, error) {
|
func kyberDecapsulate(dk *mlkem.DecapsulationKey768, c []byte) ([]byte, error) {
|
||||||
K, err := dk.Decapsulate(c)
|
K, err := dk.Decapsulate(c)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -68,7 +67,7 @@ func kyberDecapsulate(dk *mlkem768.DecapsulationKey768, c []byte) ([]byte, error
|
||||||
|
|
||||||
// kyberEncapsulate implements encapsulation according to Kyber Round 3.
|
// kyberEncapsulate implements encapsulation according to Kyber Round 3.
|
||||||
func kyberEncapsulate(ek []byte) (c, ss []byte, err error) {
|
func kyberEncapsulate(ek []byte) (c, ss []byte, err error) {
|
||||||
k, err := mlkem768.NewEncapsulationKey768(ek)
|
k, err := mlkem.NewEncapsulationKey768(ek)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
@ -77,13 +76,14 @@ func kyberEncapsulate(ek []byte) (c, ss []byte, err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func kyberSharedSecret(c, K []byte) []byte {
|
func kyberSharedSecret(c, K []byte) []byte {
|
||||||
// Package mlkem768 implements ML-KEM, which compared to Kyber removed a
|
// Package mlkem implements ML-KEM, which compared to Kyber removed a
|
||||||
// final hashing step. Compute SHAKE-256(K || SHA3-256(c), 32) to match Kyber.
|
// final hashing step. Compute SHAKE-256(K || SHA3-256(c), 32) to match Kyber.
|
||||||
// See https://words.filippo.io/mlkem768/#bonus-track-using-a-ml-kem-implementation-as-kyber-v3.
|
// See https://words.filippo.io/mlkem768/#bonus-track-using-a-ml-kem-implementation-as-kyber-v3.
|
||||||
h := sha3.NewShake256()
|
h := sha3.NewShake256()
|
||||||
h.Write(K)
|
h.Write(K)
|
||||||
ch := sha3.Sum256(c)
|
ch := sha3.New256()
|
||||||
h.Write(ch[:])
|
ch.Write(c)
|
||||||
|
h.Write(ch.Sum(nil))
|
||||||
out := make([]byte, 32)
|
out := make([]byte, 32)
|
||||||
h.Read(out)
|
h.Read(out)
|
||||||
return out
|
return out
|
||||||
|
|
|
@ -6,8 +6,8 @@ package tls
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"crypto/internal/fips/mlkem"
|
||||||
"crypto/internal/fips/tls13"
|
"crypto/internal/fips/tls13"
|
||||||
"crypto/internal/mlkem768"
|
|
||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
"encoding/hex"
|
"encoding/hex"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -120,7 +120,7 @@ func TestTrafficKey(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestKyberEncapsulate(t *testing.T) {
|
func TestKyberEncapsulate(t *testing.T) {
|
||||||
dk, err := mlkem768.GenerateKey768()
|
dk, err := mlkem.GenerateKey768()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue