lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <9ffd806d-1a90-46da-b9c6-3a5914ef1ba6@linux.ibm.com>
Date: Fri, 7 Nov 2025 13:32:52 -0500
From: Stefan Berger <stefanb@...ux.ibm.com>
To: David Howells <dhowells@...hat.com>,
        Herbert Xu <herbert@...dor.apana.org.au>
Cc: Eric Biggers <ebiggers@...nel.org>, Luis Chamberlain <mcgrof@...nel.org>,
        Petr Pavlu <petr.pavlu@...e.com>, Daniel Gomez <da.gomez@...nel.org>,
        Sami Tolvanen <samitolvanen@...gle.com>,
        "Jason A . Donenfeld" <Jason@...c4.com>,
        Ard Biesheuvel <ardb@...nel.org>,
        Stephan Mueller <smueller@...onox.de>, Lukas Wunner <lukas@...ner.de>,
        Ignat Korchagin <ignat@...udflare.com>, linux-crypto@...r.kernel.org,
        keyrings@...r.kernel.org, linux-modules@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v7 0/8] lib/crypto: Add ML-DSA signing

On 11/6/25 12:44 PM, David Howells wrote:
> Hi Herbert, Eric, et al.,
> 
> Building on the SHA-3 lib-crypto patches now in Eric's tree, here's a set of
> patches does the following:
> 
>   (1) Add SHAKE-256 crypto_sig support, generating 32-byte fixed output.  The
>       XOF features aren't available through this.  SHAKE-128 crypto_sig support
>       isn't required for ML-DSA, so I haven't implemented that at this time.
> 
>   (2) Add ML-DSA signature verification code, extracted from Stephan Mueller's
>       Leancrypto project.  It is accessed through crypto_sig.
> 
>   (3) Add a kunit test in three installments (due to size) to add some
>       testing for the three different levels of ML-DSA (44, 65 and 87).
> 
>   (4) Modify PKCS#7 support to allow kernel module signatures to carry
>       authenticatedAttributes as OpenSSL refuses to let them be opted out of
>       for ML-DSA (CMS_NOATTR).  This adds an extra digest calculation to the
>       process.
> 
>   (5) Modify PKCS#7 to pass the authenticatedAttributes directly to the
>       ML-DSA algorithm rather than passing over a digest as is done with RSA
>       as ML-DSA wants to do its own hashing and will add other stuff into
>       the hash.  We could use hashML-DSA or an external mu instead, but they
>       aren't standardised for CMS yet.
> 
>   (6) Add support to the PKCS#7 and X.509 parsers for ML-DSA.
> 
>   (7) Modify sign-file to handle OpenSSL not permitting CMS_NOATTR with
>       ML-DSA.
 > >   (8) Allow SHA-3 algorithms, including SHAKE256, to be used for 
the message
>       digest and add ML-DSA to the choice of algorithm with which to sign.

Hi David,

if you are interested in picking patches from my effort in this 
direction, let me know. I have a test suite in user space at

https://github.com/stefanberger/mldsa-testing

User space patches interfacing with the kernel (prefix 'keyctl:') are in 
this series here:

https://github.com/stefanberger/linux-ima-namespaces/commits/mldsa.10312025/

Either way, great work!

> 
> With that, ML-DSA signing appears to work.
> 
> This is based on Eric's libcrypto-next branch.
> 
> The patches can also be found here:
> 
> 	https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-pqc
> 
> David
> 
> Changes
> =======
> ver #7)
>   - Rebased on Eric's tree as that now contains all the necessary SHA-3
>     infrastructure and drop the SHA-3 patches from here.
>   - Added a minimal patch to provide shake256 support for crypto_sig.
>   - Got rid of the memory allocation wrappers.
>   - Removed the ML-DSA keypair generation code and the signing code, leaving
>     only the signature verification code.
>   - Removed the secret key handling code.
>   - Removed the secret keys from the kunit tests and the signing testing.
>   - Removed some unused bits from the ML-DSA code.
>   - Downgraded the kdoc comments to ordinary comments, but keep the markup
>     for easier comparison to Leancrypto.
> 
> ver #6)
>   - Added a patch to make the jitterentropy RNG use lib/sha3.
>   - Added back the crypto/sha3_generic changes.
>   - Added ML-DSA implementation (still needs more cleanup).
>   - Added kunit test for ML-DSA.
>   - Modified PKCS#7 to accommodate ML-DSA.
>   - Modified PKCS#7 and X.509 to allow ML-DSA to be specified and used.
>   - Modified sign-file to not use CMS_NOATTR with ML-DSA.
>   - Allowed SHA3 and SHAKE* algorithms for module signing default.
>   - Allowed ML-DSA-{44,65,87} to be selected as the module signing default.
> 
> ver #5)
>   - Fix gen-hash-testvecs.py to correctly handle algo names that contain a
>     dash.
>   - Fix gen-hash-testvecs.py to not generate HMAC for SHA3-* or SHAKE* as
>     these don't currently have HMAC variants implemented.
>   - Fix algo names to be correct.
>   - Fix kunit module description as it now tests all SHA3 variants.
> 
> ver #4)
>   - Fix a couple of arm64 build problems.
>   - Doc fixes:
>     - Fix the description of the algorithm to be closer to the NIST spec's
>       terminology.
>     - Don't talk of finialising the context for XOFs.
>     - Don't say "Return: None".
>     - Declare the "Context" to be "Any context" and make no mention of the
>       fact that it might use the FPU.
>     - Change "initialise" to "initialize".
>     - Don't warn that the context is relatively large for stack use.
>   - Use size_t for size parameters/variables.
>   - Make the module_exit unconditional.
>   - Dropped the crypto/ dir-affecting patches for the moment.
> 
> ver #3)
>   - Renamed conflicting arm64 functions.
>   - Made a separate wrapper API for each algorithm in the family.
>   - Removed sha3_init(), sha3_reinit() and sha3_final().
>   - Removed sha3_ctx::digest_size.
>   - Renamed sha3_ctx::partial to sha3_ctx::absorb_offset.
>   - Refer to the output of SHAKE* as "output" not "digest".
>   - Moved the Iota transform into the one-round function.
>   - Made sha3_update() warn if called after sha3_squeeze().
>   - Simplified the module-load test to not do update after squeeze.
>   - Added Return: and Context: kdoc statements and expanded the kdoc
>     headers.
>   - Added an API description document.
>   - Overhauled the kunit tests.
>     - Only have one kunit test.
>     - Only call the general hash tester on one algo.
>     - Add separate simple cursory checks for the other algos.
>     - Add resqueezing tests.
>     - Add some NIST example tests.
>   - Changed crypto/sha3_generic to use this
>   - Added SHAKE128/256 to crypto/sha3_generic and crypto/testmgr
>   - Folded struct sha3_state into struct sha3_ctx.
> 
> ver #2)
>    - Simplify the endianness handling.
>    - Rename sha3_final() to sha3_squeeze() and don't clear the context at the
>      end as it's permitted to continue calling sha3_final() to extract
>      continuations of the digest (needed by ML-DSA).
>    - Don't reapply the end marker to the hash state in continuation
>      sha3_squeeze() unless sha3_update() gets called again (needed by
>      ML-DSA).
>    - Give sha3_squeeze() the amount of digest to produce as a parameter
>      rather than using ctx->digest_size and don't return the amount digested.
>    - Reimplement sha3_final() as a wrapper around sha3_squeeze() that
>      extracts ctx->digest_size amount of digest and then zeroes out the
>      context.  The latter is necessary to avoid upsetting
>      hash-test-template.h.
>    - Provide a sha3_reinit() function to clear the state, but to leave the
>      parameters that indicate the hash properties unaffected, allowing for
>      reuse.
>    - Provide a sha3_set_digestsize() function to change the size of the
>      digest to be extracted by sha3_final().  sha3_squeeze() takes a
>      parameter for this instead.
>    - Don't pass the digest size as a parameter to shake128/256_init() but
>      rather default to 128/256 bits as per the function name.
>    - Provide a sha3_clear() function to zero out the context.
> 
> David Howells (8):
>    crypto: Add support for shake256 through crypto_shash
>    crypto: Add ML-DSA/Dilithium verify support
>    crypto: Add ML-DSA-44 pure rejection test vectors as a kunit test
>    crypto: Add ML-DSA-65 pure rejection test vectors as a kunit test
>    crypto: Add ML-DSA-87 pure rejection test vectors as a kunit test
>    pkcs7: Allow the signing algo to calculate the digest itself
>    pkcs7, x509: Add ML-DSA support
>    modsign: Enable ML-DSA module signing
> 
>   Documentation/admin-guide/module-signing.rst  |   15 +-
>   certs/Kconfig                                 |   24 +
>   certs/Makefile                                |    3 +
>   crypto/Kconfig                                |    1 +
>   crypto/Makefile                               |    1 +
>   crypto/asymmetric_keys/pkcs7_parser.c         |   19 +-
>   crypto/asymmetric_keys/pkcs7_verify.c         |   52 +-
>   crypto/asymmetric_keys/public_key.c           |    7 +
>   crypto/asymmetric_keys/x509_cert_parser.c     |   24 +
>   crypto/ml_dsa/Kconfig                         |   32 +
>   crypto/ml_dsa/Makefile                        |   20 +
>   crypto/ml_dsa/dilithium.h                     |  547 ++
>   crypto/ml_dsa/dilithium_44.c                  |   33 +
>   crypto/ml_dsa/dilithium_44.h                  |  282 +
>   crypto/ml_dsa/dilithium_65.c                  |   33 +
>   crypto/ml_dsa/dilithium_65.h                  |  282 +
>   crypto/ml_dsa/dilithium_87.c                  |   33 +
>   crypto/ml_dsa/dilithium_87.h                  |  282 +
>   crypto/ml_dsa/dilithium_api.c                 |  429 ++
>   crypto/ml_dsa/dilithium_debug.h               |   49 +
>   crypto/ml_dsa/dilithium_ntt.c                 |   89 +
>   crypto/ml_dsa/dilithium_ntt.h                 |   35 +
>   crypto/ml_dsa/dilithium_pack.h                |  119 +
>   crypto/ml_dsa/dilithium_poly.c                |  377 +
>   crypto/ml_dsa/dilithium_poly.h                |  181 +
>   crypto/ml_dsa/dilithium_poly_c.h              |  141 +
>   crypto/ml_dsa/dilithium_poly_common.h         |   35 +
>   crypto/ml_dsa/dilithium_polyvec.h             |  343 +
>   crypto/ml_dsa/dilithium_polyvec_c.h           |   81 +
>   .../dilithium_pure_rejection_vectors_44.h     |  489 ++
>   .../dilithium_pure_rejection_vectors_65.h     | 4741 ++++++++++++
>   .../dilithium_pure_rejection_vectors_87.h     | 6456 +++++++++++++++++
>   crypto/ml_dsa/dilithium_reduce.h              |   85 +
>   crypto/ml_dsa/dilithium_rounding.c            |  128 +
>   crypto/ml_dsa/dilithium_selftest.c            |  142 +
>   crypto/ml_dsa/dilithium_service_helpers.h     |   99 +
>   crypto/ml_dsa/dilithium_sig.c                 |  334 +
>   crypto/ml_dsa/dilithium_signature_c.c         |  102 +
>   crypto/ml_dsa/dilithium_signature_c.h         |   37 +
>   crypto/ml_dsa/dilithium_signature_helper.c    |   97 +
>   crypto/ml_dsa/dilithium_signature_impl.h      |  370 +
>   crypto/ml_dsa/dilithium_type.h                |  102 +
>   crypto/ml_dsa/dilithium_zetas.c               |   67 +
>   crypto/ml_dsa/signature_domain_separation.c   |  203 +
>   crypto/ml_dsa/signature_domain_separation.h   |   30 +
>   crypto/sha3.c                                 |   42 +
>   include/crypto/public_key.h                   |    1 +
>   include/linux/oid_registry.h                  |    5 +
>   kernel/module/Kconfig                         |    5 +
>   scripts/sign-file.c                           |   26 +-
>   50 files changed, 17094 insertions(+), 36 deletions(-)
>   create mode 100644 crypto/ml_dsa/Kconfig
>   create mode 100644 crypto/ml_dsa/Makefile
>   create mode 100644 crypto/ml_dsa/dilithium.h
>   create mode 100644 crypto/ml_dsa/dilithium_44.c
>   create mode 100644 crypto/ml_dsa/dilithium_44.h
>   create mode 100644 crypto/ml_dsa/dilithium_65.c
>   create mode 100644 crypto/ml_dsa/dilithium_65.h
>   create mode 100644 crypto/ml_dsa/dilithium_87.c
>   create mode 100644 crypto/ml_dsa/dilithium_87.h
>   create mode 100644 crypto/ml_dsa/dilithium_api.c
>   create mode 100644 crypto/ml_dsa/dilithium_debug.h
>   create mode 100644 crypto/ml_dsa/dilithium_ntt.c
>   create mode 100644 crypto/ml_dsa/dilithium_ntt.h
>   create mode 100644 crypto/ml_dsa/dilithium_pack.h
>   create mode 100644 crypto/ml_dsa/dilithium_poly.c
>   create mode 100644 crypto/ml_dsa/dilithium_poly.h
>   create mode 100644 crypto/ml_dsa/dilithium_poly_c.h
>   create mode 100644 crypto/ml_dsa/dilithium_poly_common.h
>   create mode 100644 crypto/ml_dsa/dilithium_polyvec.h
>   create mode 100644 crypto/ml_dsa/dilithium_polyvec_c.h
>   create mode 100644 crypto/ml_dsa/dilithium_pure_rejection_vectors_44.h
>   create mode 100644 crypto/ml_dsa/dilithium_pure_rejection_vectors_65.h
>   create mode 100644 crypto/ml_dsa/dilithium_pure_rejection_vectors_87.h
>   create mode 100644 crypto/ml_dsa/dilithium_reduce.h
>   create mode 100644 crypto/ml_dsa/dilithium_rounding.c
>   create mode 100644 crypto/ml_dsa/dilithium_selftest.c
>   create mode 100644 crypto/ml_dsa/dilithium_service_helpers.h
>   create mode 100644 crypto/ml_dsa/dilithium_sig.c
>   create mode 100644 crypto/ml_dsa/dilithium_signature_c.c
>   create mode 100644 crypto/ml_dsa/dilithium_signature_c.h
>   create mode 100644 crypto/ml_dsa/dilithium_signature_helper.c
>   create mode 100644 crypto/ml_dsa/dilithium_signature_impl.h
>   create mode 100644 crypto/ml_dsa/dilithium_type.h
>   create mode 100644 crypto/ml_dsa/dilithium_zetas.c
>   create mode 100644 crypto/ml_dsa/signature_domain_separation.c
>   create mode 100644 crypto/ml_dsa/signature_domain_separation.h
> 
> 



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ