]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
slh-dsa: change the seed parameter name from entropy to seed
authorPauli <ppzgs1@gmail.com>
Sun, 16 Feb 2025 22:53:10 +0000 (09:53 +1100)
committerPauli <ppzgs1@gmail.com>
Thu, 20 Feb 2025 00:17:40 +0000 (11:17 +1100)
This brings it inline with the same parameter for ML-KEM and ML-DSA.

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/26750)

doc/man7/EVP_PKEY-SLH-DSA.pod
providers/fips/self_test_data.inc
providers/implementations/keymgmt/slh_dsa_kmgmt.c
test/slh_dsa_test.c
util/perl/OpenSSL/paramnames.pm

index 1ebce2996c4ea2cc6fb9b29f6cda2fbc40becbd2..31709ec600fc2a68a43f5076e2e464d5916a529c 100644 (file)
@@ -35,7 +35,7 @@ elements randomly, the final public key element is computed from these values.
 
 =over 4
 
-=item "entropy" (B<OOSSL_PKEY_PARAM_SLH_DSA_ENTROPY>) <octet string>
+=item "seed" (B<OSSL_PKEY_PARAM_SLH_DSA_SEED>) <octet string>
 
 Supplies values to use for the private seed, private prf and
 public seed instead of generating random values. This is used for testing
index 73719299c2db249847fddd77d78af02de07cb3d0..8ad7eff4926cc86199b2064016eee010a8f60090 100644 (file)
@@ -2872,7 +2872,7 @@ static const uint8_t slh_dsa_sha2_128s_keygen_pub[] = {
     0xca, 0xe3, 0xd1, 0x86, 0x52, 0x15, 0xe3, 0xd3, 0x85, 0x0e, 0x8c, 0x1b, 0x82, 0x92, 0xbf, 0x42,
 };
 static const ST_KAT_PARAM slh_dsa_sha2_128s_keygen_init_params[] = {
-    ST_KAT_PARAM_OCTET(OSSL_PKEY_PARAM_SLH_DSA_ENTROPY,
+    ST_KAT_PARAM_OCTET(OSSL_PKEY_PARAM_SLH_DSA_SEED,
                        slh_dsa_sha2_128s_keygen_entropy),
     ST_KAT_PARAM_END()
 };
index e7ef60871b570468ce842372d74d1e6d9e3fa4af..27fee6c2b868b97e3ad7a5bb6fbb4424dc019a5f 100644 (file)
@@ -363,7 +363,7 @@ static int slh_dsa_gen_set_params(void *genctx, const OSSL_PARAM params[])
     if (gctx == NULL)
         return 0;
 
-    p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_SLH_DSA_ENTROPY);
+    p = OSSL_PARAM_locate_const(params, OSSL_PKEY_PARAM_SLH_DSA_SEED);
     if (p != NULL) {
         void *vp = gctx->entropy;
         size_t len = sizeof(gctx->entropy);
@@ -391,7 +391,7 @@ static const OSSL_PARAM *slh_dsa_gen_settable_params(ossl_unused void *genctx,
 {
     static OSSL_PARAM settable[] = {
         OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_PROPERTIES, NULL, 0),
-        OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_SLH_DSA_ENTROPY, NULL, 0),
+        OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_SLH_DSA_SEED, NULL, 0),
         OSSL_PARAM_END
     };
     return settable;
index 7f5a4e54d31eb3f9254f75e6c1ab76338c38ba23..561a7171effbc9d50073a4960006092f81aa1845 100644 (file)
@@ -296,15 +296,15 @@ err:
 }
 
 static EVP_PKEY *do_gen_key(const char *alg,
-                            const uint8_t *entropy, size_t entropy_len)
+                            const uint8_t *seed, size_t seed_len)
 {
     EVP_PKEY *pkey = NULL;
     EVP_PKEY_CTX *ctx = NULL;
     OSSL_PARAM params[2], *p = params;
 
-    if (entropy_len != 0)
-        *p++ = OSSL_PARAM_construct_octet_string(OSSL_PKEY_PARAM_SLH_DSA_ENTROPY,
-                                                 (char *)entropy, entropy_len);
+    if (seed_len != 0)
+        *p++ = OSSL_PARAM_construct_octet_string(OSSL_PKEY_PARAM_SLH_DSA_SEED,
+                                                 (char *)seed, seed_len);
     *p = OSSL_PARAM_construct_end();
 
     if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(lib_ctx, alg, NULL))
index be5b8c027ac9175ebad787ba18a0db477259c05c..91bff80e3fa8b1988a2170748d2e54e8b806f316 100644 (file)
@@ -446,7 +446,7 @@ my %params = (
     'PKEY_PARAM_ML_DSA_OUTPUT_FORMATS' =>   "ml-dsa.output_formats",
 
 # SLH_DSA Key generation parameters
-    'PKEY_PARAM_SLH_DSA_ENTROPY' =>         "entropy",
+    'PKEY_PARAM_SLH_DSA_SEED' =>              "seed",
 
 # Key Exchange parameters
     'EXCHANGE_PARAM_PAD' =>                   "pad",# uint