#!/bin/sh # $OpenBSD: mlkem768.sh,v 1.5 2025/11/13 05:13:06 djm Exp $ # Placed in the Public Domain. # #WANT_LIBCRUX_REVISION="origin/main" WANT_LIBCRUX_REVISION="core-models-v0.0.4" BASE="libcrux/libcrux-ml-kem/extracts/c_header_only/generated" FILES=" $BASE/eurydice_glue.h $BASE/libcrux_mlkem_core.h $BASE/libcrux_ct_ops.h $BASE/libcrux_sha3_portable.h $BASE/libcrux_mlkem768_portable.h " START="$PWD" die() { echo "$@" 1>&2 exit 1 } set -xeuo pipefail test -d libcrux || git clone https://github.com/cryspen/libcrux cd libcrux test `git diff | wc -l` -ne 0 && die "tree has unstaged changes" git fetch git checkout -B extract 1>&2 git reset --hard $WANT_LIBCRUX_REVISION 1>&2 LIBCRUX_REVISION=`git rev-parse HEAD` set +x cd $START ( printf '/* $Open'; printf 'BSD$ */\n' # Sigh echo echo "/* Extracted from libcrux revision $LIBCRUX_REVISION */" echo echo '/*' cat libcrux/LICENSE-MIT | sed 's/^/ * /;s/ *$//' echo ' */' echo LSHIFT="<<" cat << _EOF #if !defined(__GNUC__) || (__GNUC__ < 2) # define __attribute__(x) #endif #define KRML_MUSTINLINE inline #define KRML_NOINLINE __attribute__((noinline, unused)) #define KRML_HOST_EPRINTF(...) #define KRML_HOST_EXIT(x) fatal_f("internal error") static inline void store64_le(uint8_t dst[8], uint64_t src) { dst[0] = src & 0xff; dst[1] = (src >> 8) & 0xff; dst[2] = (src >> 16) & 0xff; dst[3] = (src >> 24) & 0xff; dst[4] = (src >> 32) & 0xff; dst[5] = (src >> 40) & 0xff; dst[6] = (src >> 48) & 0xff; dst[7] = (src >> 56) & 0xff; } static inline void store32_le(uint8_t dst[4], uint32_t src) { dst[0] = src & 0xff; dst[1] = (src >> 8) & 0xff; dst[2] = (src >> 16) & 0xff; dst[3] = (src >> 24) & 0xff; } static inline void store32_be(uint8_t dst[4], uint32_t src) { dst[0] = (src >> 24) & 0xff; dst[1] = (src >> 16) & 0xff; dst[2] = (src >> 8) & 0xff; dst[3] = src & 0xff; } static inline uint64_t load64_le(uint8_t src[8]) { return (uint64_t)(src[0]) | ((uint64_t)(src[1]) $LSHIFT 8) | ((uint64_t)(src[2]) $LSHIFT 16) | ((uint64_t)(src[3]) $LSHIFT 24) | ((uint64_t)(src[4]) $LSHIFT 32) | ((uint64_t)(src[5]) $LSHIFT 40) | ((uint64_t)(src[6]) $LSHIFT 48) | ((uint64_t)(src[7]) $LSHIFT 56); } static inline uint32_t load32_le(uint8_t src[4]) { return (uint32_t)(src[0]) | ((uint32_t)(src[1]) $LSHIFT 8) | ((uint32_t)(src[2]) $LSHIFT 16) | ((uint32_t)(src[3]) $LSHIFT 24); } #ifdef MISSING_BUILTIN_POPCOUNT static inline unsigned int __builtin_popcount(unsigned int num) { const int v[16] = { 0, 1, 1, 2, 1, 2, 2, 3, 1, 2, 2, 3, 2, 3, 3, 4 }; return v[num & 0xf] + v[(num >> 4) & 0xf]; } #endif _EOF for i in $FILES; do echo "/* from $i */" # Changes to all files: # - remove all includes, we inline everything required. # - cleanup whitespace sed -e "/#include/d" \ -e 's/[ ]*$//' \ $i | \ case "$i" in */eurydice_glue.h) # Replace endian function for consistency. perl -0777 -pe 's/(static inline void core_num__u32__to_be_bytes.*\n)([^}]*\n)/\1 store32_be(dst, src);\n/' ;; # Default: pass through. *) cat ;; esac echo done echo echo '/* rename some types to be a bit more ergonomic */' echo '#define libcrux_mlkem768_keypair libcrux_ml_kem_mlkem768_MlKem768KeyPair_s' echo '#define libcrux_mlkem768_pk libcrux_ml_kem_types_MlKemPublicKey_30_s' echo '#define libcrux_mlkem768_sk libcrux_ml_kem_types_MlKemPrivateKey_d9_s' echo '#define libcrux_mlkem768_ciphertext libcrux_ml_kem_mlkem768_MlKem768Ciphertext_s' echo '#define libcrux_mlkem768_enc_result tuple_c2_s' ) > libcrux_mlkem768_sha3.h_new # Do some checks on the resultant file cat > libcrux_mlkem768_sha3_check.c << _EOF #include #include #include #include #include #include #include #include #include "crypto_api.h" #define fatal_f(x) exit(1) #include "libcrux_mlkem768_sha3.h_new" int main(void) { struct libcrux_mlkem768_keypair keypair = {0}; struct libcrux_mlkem768_pk pk = {0}; struct libcrux_mlkem768_sk sk = {0}; struct libcrux_mlkem768_ciphertext ct = {0}; struct libcrux_mlkem768_enc_result enc_result = {0}; uint8_t kp_seed[64] = {0}, enc_seed[32] = {0}; uint8_t shared_key[crypto_kem_mlkem768_BYTES]; if (sizeof(keypair.pk.value) != crypto_kem_mlkem768_PUBLICKEYBYTES) errx(1, "keypair.pk bad"); if (sizeof(keypair.sk.value) != crypto_kem_mlkem768_SECRETKEYBYTES) errx(1, "keypair.sk bad"); if (sizeof(pk.value) != crypto_kem_mlkem768_PUBLICKEYBYTES) errx(1, "pk bad"); if (sizeof(sk.value) != crypto_kem_mlkem768_SECRETKEYBYTES) errx(1, "sk bad"); if (sizeof(ct.value) != crypto_kem_mlkem768_CIPHERTEXTBYTES) errx(1, "ct bad"); if (sizeof(enc_result.fst.value) != crypto_kem_mlkem768_CIPHERTEXTBYTES) errx(1, "enc_result ct bad"); if (sizeof(enc_result.snd) != crypto_kem_mlkem768_BYTES) errx(1, "enc_result shared key bad"); keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(kp_seed); if (!libcrux_ml_kem_mlkem768_portable_validate_public_key(&keypair.pk)) errx(1, "valid smoke failed"); enc_result = libcrux_ml_kem_mlkem768_portable_encapsulate(&keypair.pk, enc_seed); libcrux_ml_kem_mlkem768_portable_decapsulate(&keypair.sk, &enc_result.fst, shared_key); if (memcmp(shared_key, enc_result.snd, sizeof(shared_key)) != 0) errx(1, "smoke failed"); return 0; } _EOF cc -Wall -Wextra -Wno-unused-parameter -I . -o libcrux_mlkem768_sha3_check \ libcrux_mlkem768_sha3_check.c ./libcrux_mlkem768_sha3_check # Extract PRNG inputs; there's no nice #defines for these key_pair_rng_len=`grep '^libcrux_ml_kem_mlkem768_portable_generate_key_pair.*randomness' libcrux_mlkem768_sha3.h_new | sed 's/.*randomness[[]//;s/\].*//'` enc_rng_len=`sed -e '/^static inline tuple_c2 libcrux_ml_kem_mlkem768_portable_encapsulate[(]$/,/[)] {$/!d' < libcrux_mlkem768_sha3.h_new | grep 'uint8_t randomness\[[0-9]*U\][)]' | sed 's/.*randomness\[\([0-9]*\)U\].*/\1/'` test -z "$key_pair_rng_len" && die "couldn't find size of libcrux_ml_kem_mlkem768_portable_kyber_generate_key_pair randomness argument" test -z "$enc_rng_len" && die "couldn't find size of libcrux_ml_kem_mlkem768_portable_kyber_encapsulate randomness argument" ( echo "/* defines for PRNG inputs */" echo "#define LIBCRUX_ML_KEM_KEY_PAIR_PRNG_LEN $key_pair_rng_len" echo "#define LIBCRUX_ML_KEM_ENC_PRNG_LEN $enc_rng_len" ) >> libcrux_mlkem768_sha3.h_new mv libcrux_mlkem768_sha3.h_new libcrux_mlkem768_sha3.h rm libcrux_mlkem768_sha3_check libcrux_mlkem768_sha3_check.c echo 1>&2 echo "libcrux_mlkem768_sha3.h OK" 1>&2