-
Notifications
You must be signed in to change notification settings - Fork 387
test: commit, delete me later #822
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
feat: temporary commit with cache feat: remove cache
* feat: duplicate m4 files, still using NID from EDDSA Update dockerfile to use --with-slhdsa * feat: duplicate SLH(Public|Private)Key.(cpp|h) * feat: duplicate OSSLSLH(Public|Private)Key.(cpp|h) * feat: duplicate OSSLSLHKeypair.(cpp|h) * feat: add SLHDSA mech and algo to AsymmetricAlgorithm.h * feat: duplicate OSSLSLHDSA.(cpp|h) * feat: duplicate on OSSLCryptoFactory.cpp * feat: OSSLUtil.(cpp|h), duplication by definition * feat: add duplicated files to crypto/CMakeLists.txt * feat: duplicate P11ED(Public|Private)KeyObj for slhdsa PTAL on EC params, update it later, CKK_EC_EDWARDS * feat: duplicate softhsm2-util-ossl.(cpp|h) * feat: duplicate SoftHSM.(cpp|h) * fix: force disable eddsa to avoid conflict with cases and tables * fix: compilation error by add crypto/Makefile.am cpp new files grep -r OSSLEDDSA * feat: add syslog to container * fix: key gen on SLH-DSA * fix: add default log level info * refactor: use separated pkcs constants (with same value) for slh-dsa * feat(pkcs11): add ibm implementation to access cryptographic tokens
* feat: update slh-dsa pkcs11 params, use different numbers * docs: add links about oid ed25519 * refactor: replace ec to slh on generateSLH * chore(logs): added to C_GenerateKeyPair flow structure found where problems in key generation is: EC_PARAMS must be duplicated to SLH_PARAMS PKCS11 constant is raising error on P11Object::saveTemplate * feat(pkcs11): update input params for public key to SLH_DSA_PARAMS * feat: duplication ECParameters to SLHParameters * feat: update SLH(Public|Priavte)Key, remove EC and use der for attribs * feat: update OSSLSLH(Public|Priavte)Key classes * feat: update softhsm2-util-ossl.(cpp|h) * feat: update P11Attributes.(cpp|h) + P11Objects.cpp * feat: make changes on OSSLSLHDSA and SoftHSM to store keys add logs either * fix: getOrderLength and setDer(Public|Private)Key setup name when setDer(Public|Private)Key to get the signature length on OSSLSLH(Private|Public )Key.cpp * fix: getOrderLength for private and public key not multiply by 2 * fix: OSSLSLHPublicKey, remove ED key len variables * fix: OSSLSLHPublicKey use inPKEY instead pkey * fix: pkcs11-slhdsa.c signature size to 7856 * fix: OSSLSLHPublicKey verification of pkey * chore: add some debug logs on OSSLSLHDSA and SoftHSM files * test: add pkcs11-slhdsa.c test cases for all signatures with slh-dsa add as well data.txt * fix: file OSSLSLHDSA.cpp get back macro with_slhdsa replace printf and use ERROR_MSG * chore: dockerfile enable eddsa either * fix: remove macro slh-dsa for nid functions * fix: update m4 files to disable slh-dsa for older versions of OSSL disable SLH-DSA for Botan either * fix: warning of unused variable get slhdsaMin/Maxsize oly if slh-dsa is enabled
|
Caution Review failedThe pull request is closed. WalkthroughAdds SLH-DSA (SLHDSA) algorithm support across SoftHSM: PKCS#11 constants, attributes, objects, mechanisms, OpenSSL-backed crypto implementation, key generation and import/export, and utility support. Introduces build-time detection and gating via Autoconf. Adds multiple PKCS#11 sample programs and vendor headers. Provides a multi-stage Dockerfile to build a SoftHSM/OpenSSL toolchain. Changes
Sequence Diagram(s)sequenceDiagram
autonumber
actor User
participant App as Sample App
participant P11 as PKCS#11 Module (SoftHSM)
participant SH as SoftHSM Core
participant CF as CryptoFactory
participant SLH as OSSLSLHDSA
participant OSSL as OpenSSL EVP
rect rgb(240,248,255)
note right of App: Key generation (CKM_SLH_KEY_PAIR_GEN)
User->>App: Run sample (generate SLH keypair)
App->>P11: C_GenerateKeyPair(mech=CKM_SLH_KEY_PAIR_GEN, templates)
P11->>SH: generateSLH(...)
SH->>CF: getAsymmetricAlgorithm(SLHDSA)
CF-->>SH: OSSLSLHDSA instance
SH->>SLH: generateKeyPair(params)
SLH->>OSSL: EVP_PKEY_CTX_new_from_name + keygen
OSSL-->>SLH: EVP_PKEY*
SLH-->>SH: Keys
SH-->>P11: Handles (pub, priv)
P11-->>App: CKR_OK + handles
end
rect rgb(245,255,240)
note right of App: Sign/Verify (CKM_SLHDSA)
App->>P11: C_SignInit(handle_priv, CKM_SLHDSA)
App->>P11: C_Sign(data)
P11->>SH: sign(...)
SH->>SLH: sign(privateKey, data, CKM_SLHDSA)
SLH->>OSSL: EVP_DigestSignInit/Sign
OSSL-->>SLH: signature
SLH-->>SH: signature
SH-->>P11: signature
P11-->>App: signature
App->>P11: C_VerifyInit(handle_pub, CKM_SLHDSA)
App->>P11: C_Verify(data, signature)
P11->>SH: verify(...)
SH->>SLH: verify(publicKey, data, sig, CKM_SLHDSA)
SLH->>OSSL: EVP_DigestVerifyInit/Verify
OSSL-->>SLH: result
SLH-->>SH: CKR_OK/FAIL
SH-->>P11: status
P11-->>App: CKR_OK
end
Estimated code review effort🎯 5 (Critical) | ⏱️ ~120 minutes Possibly related PRs
Suggested labels
Suggested reviewers
Poem
✨ Finishing touches
🧪 Generate unit tests (beta)
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (48)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary by CodeRabbit
New Features
Documentation
Build