|
| 1 | +=pod |
| 2 | + |
| 3 | +=head1 NAME |
| 4 | + |
| 5 | +EVP_SIGNATURE-SLH-DSA, |
| 6 | +EVP_SIGNATURE-SLH-DSA-SHA2-128s, EVP_SIGNATURE-SLH-DSA-SHA2-128f, |
| 7 | +EVP_SIGNATURE-SLH-DSA-SHA2-192s, EVP_SIGNATURE-SLH-DSA-SHA2-192f, |
| 8 | +EVP_SIGNATURE-SLH-DSA-SHA2-256s, EVP_SIGNATURE-SLH-DSA-SHA2-256f, |
| 9 | +EVP_SIGNATURE-SLH-DSA-SHAKE-128s, EVP_SIGNATURE-SLH-DSA-SHAKE-128f, |
| 10 | +EVP_SIGNATURE-SLH-DSA-SHAKE-192s, EVP_SIGNATURE-SLH-DSA-SHAKE-192f, |
| 11 | +EVP_SIGNATURE-SLH-DSA-SHAKE-256s, EVP_SIGNATURE-SLH-DSA-SHAKE-256f |
| 12 | +- EVP_PKEY SLH-DSA support |
| 13 | + |
| 14 | +=head1 DESCRIPTION |
| 15 | + |
| 16 | +The B<SLH-DSA-SHA2-128s>, B<EVP_PKEY-SLH-DSA-SHA2-128f>, |
| 17 | +B<SLH-DSA-SHA2-192s>, B<EVP_PKEY-SLH-DSA-SHA2-192f>, |
| 18 | +B<SLH-DSA-SHA2-256s>, B<EVP_PKEY-SLH-DSA-SHA2-256f>, |
| 19 | +B<SLH-DSA-SHAKE-128s>, B<EVP_PKEY-SLH-DSA-SHAKE-128f>, |
| 20 | +B<SLH-DSA-SHAKE-192s>, B<EVP_PKEY-SLH-DSA-SHAKE-192f>, |
| 21 | +B<SLH-DSA-SHAKE-256s> and B<EVP_PKEY-SLH-DSA-SHAKE-256f> EVP_PKEY implementations |
| 22 | +supports key generation, one-shot sign and verify using the SLH-DSA |
| 23 | +signature schemes described in FIPS 205. |
| 24 | + |
| 25 | +The different algorithms names correspond to the parameter sets defined in |
| 26 | +FIPS 205 Section 11 Table 2. |
| 27 | +'s' types have smaller signature sizes, and the 'f' variants are faster, |
| 28 | +(The signatures range from ~8K to ~50K depending on the type chosen). There are |
| 29 | +3 different security categories also depending on the type. |
| 30 | + |
| 31 | +L<EVP_SIGNATURE_fetch(3)> can be used to explicitely fetch one of the 12 |
| 32 | +algorithms which can then be used with L<EVP_PKEY_sign_init_ex2(3)>, |
| 33 | +L<EVP_PKEY_sign(3)>, L<EVP_PKEY_verify_init_ex2(3)>, and |
| 34 | +L<EVP_PKEY_verify(3)> to sign or verify one-shot messages. |
| 35 | + |
| 36 | +The normal signing process (called Pure SLH-DSA Signature Generation) |
| 37 | +encodes the message internally as 0x00 || len(ctx) || ctx || message. |
| 38 | +where B<ctx> is some optional value of size 0x00..0xFF. |
| 39 | +OpenSSL also allows the message to not be encoded which is required for |
| 40 | +testing. OpenSSL does not support Pre Hash SLH-DSA Signature Generation, but this |
| 41 | +may be done by the user by doing Pre hash encoding externally and then chosing |
| 42 | +the option to not encode the message. |
| 43 | + |
| 44 | +=head2 SLH-DSA Signature Parameters |
| 45 | + |
| 46 | +The following parameter can be used for both signing and verification. |
| 47 | +it may be set by passing an OSSL_PARAM array to L<EVP_PKEY_sign_init_ex2(3)> or |
| 48 | +L<EVP_PKEY_verify_init_ex2(3)> |
| 49 | + |
| 50 | +=over 4 |
| 51 | + |
| 52 | +=item "context-string" (B<OSSL_SIGNATURE_PARAM_CONTEXT_STRING>) <octet string> |
| 53 | + |
| 54 | +A string of octets with length at most 255. By default it is the empty string. |
| 55 | + |
| 56 | +=back |
| 57 | + |
| 58 | +The following parameters can be used when signing: |
| 59 | +They can be set by passing an OSSL_PARAM array to L<EVP_PKEY_sign_init_ex2(3)>. |
| 60 | + |
| 61 | +=over 4 |
| 62 | + |
| 63 | +=item "message-encoding" (B<OSSL_SIGNATURE_PARAM_MESSAGE_ENCODING>) <integer> |
| 64 | + |
| 65 | +The default value of 1 uses 'Pure SLH-DSA Signature Generation' as described |
| 66 | +above. Setting it to 0 does not encode the message, which is used for testing, |
| 67 | +but can also be used for 'Pre Hash SLH-DSA Signature Generation'. |
| 68 | + |
| 69 | +=item "additional-random" (B<OSSL_SIGNATURE_PARAM_ADD_RANDOM <octet string> |
| 70 | + |
| 71 | +Used for testing to pass a optional random value. |
| 72 | + |
| 73 | +=item "deterministic" (B<OSSL_SIGNATURE_PARAM_DETERMINISTIC>) <integer> |
| 74 | + |
| 75 | +The default value of 0 causes an randomly generated additional random value |
| 76 | +to be used when processing the message. Setting this to 1 causes the private key |
| 77 | +seed to be used instead. This value is ignored if "additional-random" is set. |
| 78 | + |
| 79 | +=back |
| 80 | + |
| 81 | +See L<EVP_PKEY-SLH-DSA(7)> for information related to B<SLH-DSA> keys. |
| 82 | + |
| 83 | + |
| 84 | +=head1 EXAMPLES |
| 85 | + |
| 86 | +To sign a message using an SLH-DSA EVP_PKEY structure: |
| 87 | + |
| 88 | + void do_sign(EVP_PKEY *key, unsigned char *msg, size_t msg_len) |
| 89 | + { |
| 90 | + size_t sig_len; |
| 91 | + unsigned char *sig = NULL; |
| 92 | + const OSSL_PARAM params[] = { |
| 93 | + OSSL_PARAM_octet_string("context-string", (unsigned char *)"A context string", 33), |
| 94 | + OSSL_PARAM_END |
| 95 | + }; |
| 96 | + EVP_PKEY_CTX *sctx = EVP_PKEY_CTX_new_from_pkey(NULL, pkey, NULL); |
| 97 | + EVP_SIGNATURE *sig_alg = EVP_SIGNATURE_fetch(NULL, "SLH-DSA-SHA2-128s", NULL); |
| 98 | + |
| 99 | + EVP_PKEY_sign_init_ex2(sctx, sig_alg, params); |
| 100 | + /* Calculate the required size for the signature by passing a NULL buffer. */ |
| 101 | + EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len); |
| 102 | + sig = OPENSSL_zalloc(sig_len); |
| 103 | + EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len); |
| 104 | + ... |
| 105 | + OPENSSL_free(sig); |
| 106 | + EVP_SIGNATURE(sig_alg); |
| 107 | + EVP_PKEY_CTX_free(sctx); |
| 108 | + } |
| 109 | + |
| 110 | +=head1 SEE ALSO |
| 111 | + |
| 112 | +L<EVP_PKEY-SLH-DSA(7)> |
| 113 | +L<provider-signature(7)>, |
| 114 | +L<EVP_PKEY_sign(3)>, |
| 115 | +L<EVP_PKEY_verify(3)>, |
| 116 | + |
| 117 | +=head1 HISTORY |
| 118 | + |
| 119 | +This functionality was added in OpenSSL 3.5. |
| 120 | + |
| 121 | +=head1 COPYRIGHT |
| 122 | + |
| 123 | +Copyright 2024 The OpenSSL Project Authors. All Rights Reserved. |
| 124 | + |
| 125 | +Licensed under the Apache License 2.0 (the "License"). You may not use |
| 126 | +this file except in compliance with the License. You can obtain a copy |
| 127 | +in the file LICENSE in the source distribution or at |
| 128 | +L<https://www.openssl.org/source/license.html>. |
| 129 | + |
| 130 | +=cut |
0 commit comments