Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl36/providers/implementations/signature/slh_dsa_sig.c
Line
Count
Source
1
/*
2
 * Copyright 2024-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
/* clang-format off */
10
11
/* clang-format on */
12
13
#include <openssl/core_names.h>
14
#include <openssl/err.h>
15
#include <openssl/rand.h>
16
#include <openssl/proverr.h>
17
#include "prov/implementations.h"
18
#include "prov/providercommon.h"
19
#include "prov/provider_ctx.h"
20
#include "prov/der_slh_dsa.h"
21
#include "crypto/slh_dsa.h"
22
#include "internal/cryptlib.h"
23
#include "internal/sizes.h"
24
25
#define SLH_DSA_MAX_ADD_RANDOM_LEN 32
26
27
#define SLH_DSA_MESSAGE_ENCODE_RAW 0
28
2.07k
#define SLH_DSA_MESSAGE_ENCODE_PURE 1
29
30
static OSSL_FUNC_signature_sign_message_init_fn slh_dsa_sign_msg_init;
31
static OSSL_FUNC_signature_sign_fn slh_dsa_sign;
32
static OSSL_FUNC_signature_verify_message_init_fn slh_dsa_verify_msg_init;
33
static OSSL_FUNC_signature_verify_fn slh_dsa_verify;
34
static OSSL_FUNC_signature_digest_sign_init_fn slh_dsa_digest_signverify_init;
35
static OSSL_FUNC_signature_digest_sign_fn slh_dsa_digest_sign;
36
static OSSL_FUNC_signature_digest_verify_fn slh_dsa_digest_verify;
37
static OSSL_FUNC_signature_freectx_fn slh_dsa_freectx;
38
static OSSL_FUNC_signature_dupctx_fn slh_dsa_dupctx;
39
static OSSL_FUNC_signature_set_ctx_params_fn slh_dsa_set_ctx_params;
40
static OSSL_FUNC_signature_settable_ctx_params_fn slh_dsa_settable_ctx_params;
41
42
/*
43
 * NOTE: Any changes to this structure may require updating slh_dsa_dupctx().
44
 */
45
typedef struct {
46
    SLH_DSA_KEY *key; /* Note that the key is not owned by this object */
47
    SLH_DSA_HASH_CTX *hash_ctx;
48
    uint8_t context_string[SLH_DSA_MAX_CONTEXT_STRING_LEN];
49
    size_t context_string_len;
50
    uint8_t add_random[SLH_DSA_MAX_ADD_RANDOM_LEN];
51
    size_t add_random_len;
52
    int msg_encode;
53
    int deterministic;
54
    OSSL_LIB_CTX *libctx;
55
    char *propq;
56
    const char *alg;
57
    /* The Algorithm Identifier of the signature algorithm */
58
    uint8_t aid_buf[OSSL_MAX_ALGORITHM_ID_SIZE];
59
    size_t aid_len;
60
} PROV_SLH_DSA_CTX;
61
62
static void slh_dsa_freectx(void *vctx)
63
2.07k
{
64
2.07k
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
65
66
2.07k
    ossl_slh_dsa_hash_ctx_free(ctx->hash_ctx);
67
2.07k
    OPENSSL_free(ctx->propq);
68
2.07k
    OPENSSL_cleanse(ctx->add_random, ctx->add_random_len);
69
2.07k
    OPENSSL_free(ctx);
70
2.07k
}
71
72
static void *slh_dsa_newctx(void *provctx, const char *alg, const char *propq)
73
2.07k
{
74
2.07k
    PROV_SLH_DSA_CTX *ctx;
75
76
2.07k
    if (!ossl_prov_is_running())
77
0
        return NULL;
78
79
2.07k
    ctx = OPENSSL_zalloc(sizeof(PROV_SLH_DSA_CTX));
80
2.07k
    if (ctx == NULL)
81
0
        return NULL;
82
83
2.07k
    ctx->libctx = PROV_LIBCTX_OF(provctx);
84
2.07k
    if (propq != NULL && (ctx->propq = OPENSSL_strdup(propq)) == NULL)
85
0
        goto err;
86
2.07k
    ctx->alg = alg;
87
2.07k
    ctx->msg_encode = SLH_DSA_MESSAGE_ENCODE_PURE;
88
2.07k
    return ctx;
89
0
err:
90
0
    slh_dsa_freectx(ctx);
91
0
    return NULL;
92
2.07k
}
93
94
static void *slh_dsa_dupctx(void *vctx)
95
0
{
96
0
    PROV_SLH_DSA_CTX *src = (PROV_SLH_DSA_CTX *)vctx;
97
0
    PROV_SLH_DSA_CTX *ret;
98
99
0
    if (!ossl_prov_is_running())
100
0
        return NULL;
101
102
    /*
103
     * Note that the SLH_DSA_KEY is ref counted via EVP_PKEY so we can just copy
104
     * the key here.
105
     */
106
0
    ret = OPENSSL_memdup(src, sizeof(*src));
107
0
    if (ret == NULL)
108
0
        return NULL;
109
0
    ret->propq = NULL;
110
0
    ret->hash_ctx = NULL;
111
0
    if (src->propq != NULL && (ret->propq = OPENSSL_strdup(src->propq)) == NULL)
112
0
        goto err;
113
0
    ret->hash_ctx = ossl_slh_dsa_hash_ctx_dup(src->hash_ctx);
114
0
    if (ret->hash_ctx == NULL)
115
0
        goto err;
116
117
0
    return ret;
118
0
err:
119
0
    slh_dsa_freectx(ret);
120
0
    return NULL;
121
0
}
122
123
static int slh_dsa_set_alg_id_buffer(PROV_SLH_DSA_CTX *ctx)
124
2.07k
{
125
2.07k
    int ret;
126
2.07k
    WPACKET pkt;
127
2.07k
    uint8_t *aid = NULL;
128
129
    /*
130
     * We do not care about DER writing errors.
131
     * All it really means is that for some reason, there's no
132
     * AlgorithmIdentifier to be had, but the operation itself is
133
     * still valid, just as long as it's not used to construct
134
     * anything that needs an AlgorithmIdentifier.
135
     */
136
2.07k
    ctx->aid_len = 0;
137
2.07k
    ret = WPACKET_init_der(&pkt, ctx->aid_buf, sizeof(ctx->aid_buf));
138
2.07k
    ret = ret && ossl_DER_w_algorithmIdentifier_SLH_DSA(&pkt, -1, ctx->key);
139
2.07k
    if (ret && WPACKET_finish(&pkt)) {
140
2.07k
        WPACKET_get_total_written(&pkt, &ctx->aid_len);
141
2.07k
        aid = WPACKET_get_curr(&pkt);
142
2.07k
    }
143
2.07k
    WPACKET_cleanup(&pkt);
144
2.07k
    if (aid != NULL && ctx->aid_len != 0)
145
2.07k
        memmove(ctx->aid_buf, aid, ctx->aid_len);
146
2.07k
    return 1;
147
2.07k
}
148
149
static int slh_dsa_signverify_msg_init(void *vctx, void *vkey,
150
    const OSSL_PARAM params[], int operation,
151
    const char *desc)
152
2.07k
{
153
2.07k
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
154
2.07k
    SLH_DSA_KEY *key = vkey;
155
156
2.07k
    if (!ossl_prov_is_running()
157
2.07k
        || ctx == NULL)
158
0
        return 0;
159
160
2.07k
    if (vkey == NULL && ctx->key == NULL) {
161
0
        ERR_raise(ERR_LIB_PROV, PROV_R_NO_KEY_SET);
162
0
        return 0;
163
0
    }
164
165
2.07k
    if (key != NULL) {
166
2.07k
        if (!ossl_slh_dsa_key_type_matches(key, ctx->alg))
167
0
            return 0;
168
2.07k
        ctx->hash_ctx = ossl_slh_dsa_hash_ctx_new(key);
169
2.07k
        if (ctx->hash_ctx == NULL)
170
0
            return 0;
171
2.07k
        ctx->key = vkey;
172
2.07k
    }
173
174
2.07k
    slh_dsa_set_alg_id_buffer(ctx);
175
2.07k
    if (!slh_dsa_set_ctx_params(ctx, params))
176
117
        return 0;
177
1.95k
    return 1;
178
2.07k
}
179
180
static int slh_dsa_sign_msg_init(void *vctx, void *vkey, const OSSL_PARAM params[])
181
1.09k
{
182
1.09k
    return slh_dsa_signverify_msg_init(vctx, vkey, params,
183
1.09k
        EVP_PKEY_OP_SIGN, "SLH_DSA Sign Init");
184
1.09k
}
185
186
static int slh_dsa_digest_signverify_init(void *vctx, const char *mdname,
187
    void *vkey, const OSSL_PARAM params[])
188
0
{
189
0
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
190
191
0
    if (mdname != NULL && mdname[0] != '\0') {
192
0
        ERR_raise_data(ERR_LIB_PROV, PROV_R_INVALID_DIGEST,
193
0
            "Explicit digest not supported for SLH-DSA operations");
194
0
        return 0;
195
0
    }
196
197
0
    if (vkey == NULL && ctx->key != NULL)
198
0
        return slh_dsa_set_ctx_params(ctx, params);
199
200
0
    return slh_dsa_signverify_msg_init(vctx, vkey, params,
201
0
        EVP_PKEY_OP_SIGN, "SLH_DSA Sign Init");
202
0
}
203
204
static int slh_dsa_sign(void *vctx, unsigned char *sig, size_t *siglen,
205
    size_t sigsize, const unsigned char *msg, size_t msg_len)
206
1.95k
{
207
1.95k
    int ret = 0;
208
1.95k
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
209
1.95k
    uint8_t add_rand[SLH_DSA_MAX_ADD_RANDOM_LEN], *opt_rand = NULL;
210
1.95k
    size_t n = 0;
211
212
1.95k
    if (!ossl_prov_is_running())
213
0
        return 0;
214
215
1.95k
    if (sig != NULL) {
216
977
        if (ctx->add_random_len != 0) {
217
0
            opt_rand = ctx->add_random;
218
977
        } else if (ctx->deterministic == 0) {
219
856
            n = ossl_slh_dsa_key_get_n(ctx->key);
220
856
            if (RAND_priv_bytes_ex(ctx->libctx, add_rand, n, 0) <= 0)
221
0
                return 0;
222
856
            opt_rand = add_rand;
223
856
        }
224
977
    }
225
1.95k
    ret = ossl_slh_dsa_sign(ctx->hash_ctx, msg, msg_len,
226
1.95k
        ctx->context_string, ctx->context_string_len,
227
1.95k
        opt_rand, ctx->msg_encode,
228
1.95k
        sig, siglen, sigsize);
229
1.95k
    if (opt_rand != add_rand)
230
1.09k
        OPENSSL_cleanse(opt_rand, n);
231
1.95k
    return ret;
232
1.95k
}
233
234
static int slh_dsa_digest_sign(void *vctx, uint8_t *sig, size_t *siglen, size_t sigsize,
235
    const uint8_t *tbs, size_t tbslen)
236
0
{
237
0
    return slh_dsa_sign(vctx, sig, siglen, sigsize, tbs, tbslen);
238
0
}
239
240
static int slh_dsa_verify_msg_init(void *vctx, void *vkey, const OSSL_PARAM params[])
241
977
{
242
977
    return slh_dsa_signverify_msg_init(vctx, vkey, params, EVP_PKEY_OP_VERIFY,
243
977
        "SLH_DSA Verify Init");
244
977
}
245
246
static int slh_dsa_verify(void *vctx, const uint8_t *sig, size_t siglen,
247
    const uint8_t *msg, size_t msg_len)
248
977
{
249
977
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
250
251
977
    if (!ossl_prov_is_running())
252
0
        return 0;
253
977
    return ossl_slh_dsa_verify(ctx->hash_ctx, msg, msg_len,
254
977
        ctx->context_string, ctx->context_string_len,
255
977
        ctx->msg_encode, sig, siglen);
256
977
}
257
static int slh_dsa_digest_verify(void *vctx, const uint8_t *sig, size_t siglen,
258
    const uint8_t *tbs, size_t tbslen)
259
0
{
260
0
    return slh_dsa_verify(vctx, sig, siglen, tbs, tbslen);
261
0
}
262
263
/* clang-format off */
264
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
265
#ifndef slh_dsa_set_ctx_params_list
266
static const OSSL_PARAM slh_dsa_set_ctx_params_list[] = {
267
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_CONTEXT_STRING, NULL, 0),
268
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_TEST_ENTROPY, NULL, 0),
269
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_DETERMINISTIC, NULL),
270
    OSSL_PARAM_int(OSSL_SIGNATURE_PARAM_MESSAGE_ENCODING, NULL),
271
    OSSL_PARAM_END
272
};
273
#endif
274
275
#ifndef slh_dsa_set_ctx_params_st
276
struct slh_dsa_set_ctx_params_st {
277
    OSSL_PARAM *context;
278
    OSSL_PARAM *det;
279
    OSSL_PARAM *entropy;
280
    OSSL_PARAM *msgenc;
281
};
282
#endif
283
284
#ifndef slh_dsa_set_ctx_params_decoder
285
static int slh_dsa_set_ctx_params_decoder
286
    (const OSSL_PARAM *p, struct slh_dsa_set_ctx_params_st *r)
287
1.35k
{
288
1.35k
    const char *s;
289
290
1.35k
    memset(r, 0, sizeof(*r));
291
1.35k
    if (p != NULL)
292
2.85k
        for (; (s = p->key) != NULL; p++)
293
1.49k
            switch(s[0]) {
294
0
            default:
295
0
                break;
296
358
            case 'c':
297
358
                if (ossl_likely(strcmp("ontext-string", s + 1) == 0)) {
298
                    /* OSSL_SIGNATURE_PARAM_CONTEXT_STRING */
299
358
                    if (ossl_unlikely(r->context != NULL)) {
300
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
301
0
                                       "param %s is repeated", s);
302
0
                        return 0;
303
0
                    }
304
358
                    r->context = (OSSL_PARAM *)p;
305
358
                }
306
358
                break;
307
678
            case 'd':
308
678
                if (ossl_likely(strcmp("eterministic", s + 1) == 0)) {
309
                    /* OSSL_SIGNATURE_PARAM_DETERMINISTIC */
310
678
                    if (ossl_unlikely(r->det != NULL)) {
311
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
312
0
                                       "param %s is repeated", s);
313
0
                        return 0;
314
0
                    }
315
678
                    r->det = (OSSL_PARAM *)p;
316
678
                }
317
678
                break;
318
678
            case 'm':
319
461
                if (ossl_likely(strcmp("essage-encoding", s + 1) == 0)) {
320
                    /* OSSL_SIGNATURE_PARAM_MESSAGE_ENCODING */
321
461
                    if (ossl_unlikely(r->msgenc != NULL)) {
322
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
323
0
                                       "param %s is repeated", s);
324
0
                        return 0;
325
0
                    }
326
461
                    r->msgenc = (OSSL_PARAM *)p;
327
461
                }
328
461
                break;
329
461
            case 't':
330
0
                if (ossl_likely(strcmp("est-entropy", s + 1) == 0)) {
331
                    /* OSSL_SIGNATURE_PARAM_TEST_ENTROPY */
332
0
                    if (ossl_unlikely(r->entropy != NULL)) {
333
0
                        ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
334
0
                                       "param %s is repeated", s);
335
0
                        return 0;
336
0
                    }
337
0
                    r->entropy = (OSSL_PARAM *)p;
338
0
                }
339
1.49k
            }
340
1.35k
    return 1;
341
1.35k
}
342
#endif
343
/* End of machine generated */
344
/* clang-format on */
345
346
static int slh_dsa_set_ctx_params(void *vctx, const OSSL_PARAM params[])
347
1.35k
{
348
1.35k
    PROV_SLH_DSA_CTX *pctx = (PROV_SLH_DSA_CTX *)vctx;
349
1.35k
    struct slh_dsa_set_ctx_params_st p;
350
351
1.35k
    if (pctx == NULL || !slh_dsa_set_ctx_params_decoder(params, &p))
352
0
        return 0;
353
354
1.35k
    if (p.context != NULL) {
355
358
        void *vp = pctx->context_string;
356
357
358
        if (!OSSL_PARAM_get_octet_string(p.context, &vp,
358
358
                sizeof(pctx->context_string),
359
358
                &(pctx->context_string_len))) {
360
80
            pctx->context_string_len = 0;
361
80
            return 0;
362
80
        }
363
358
    }
364
365
1.27k
    if (p.entropy != NULL) {
366
0
        void *vp = pctx->add_random;
367
0
        size_t n = ossl_slh_dsa_key_get_n(pctx->key);
368
369
0
        if (!OSSL_PARAM_get_octet_string(p.entropy, &vp, n, &(pctx->add_random_len))
370
0
            || pctx->add_random_len != n) {
371
0
            pctx->add_random_len = 0;
372
0
            return 0;
373
0
        }
374
0
    }
375
376
1.27k
    if (p.det != NULL && !OSSL_PARAM_get_int(p.det, &pctx->deterministic))
377
0
        return 0;
378
379
1.27k
    if (p.msgenc != NULL && !OSSL_PARAM_get_int(p.msgenc, &pctx->msg_encode))
380
0
        return 0;
381
1.27k
    return 1;
382
1.27k
}
383
384
static const OSSL_PARAM *slh_dsa_settable_ctx_params(void *vctx,
385
    ossl_unused void *provctx)
386
12
{
387
12
    return slh_dsa_set_ctx_params_list;
388
12
}
389
390
/* clang-format off */
391
/* Machine generated by util/perl/OpenSSL/paramnames.pm */
392
#ifndef slh_dsa_get_ctx_params_list
393
static const OSSL_PARAM slh_dsa_get_ctx_params_list[] = {
394
    OSSL_PARAM_octet_string(OSSL_SIGNATURE_PARAM_ALGORITHM_ID, NULL, 0),
395
    OSSL_PARAM_END
396
};
397
#endif
398
399
#ifndef slh_dsa_get_ctx_params_st
400
struct slh_dsa_get_ctx_params_st {
401
    OSSL_PARAM *algid;
402
};
403
#endif
404
405
#ifndef slh_dsa_get_ctx_params_decoder
406
static int slh_dsa_get_ctx_params_decoder
407
    (const OSSL_PARAM *p, struct slh_dsa_get_ctx_params_st *r)
408
0
{
409
0
    const char *s;
410
411
0
    memset(r, 0, sizeof(*r));
412
0
    if (p != NULL)
413
0
        for (; (s = p->key) != NULL; p++)
414
0
            if (ossl_likely(strcmp("algorithm-id", s + 0) == 0)) {
415
                /* OSSL_SIGNATURE_PARAM_ALGORITHM_ID */
416
0
                if (ossl_unlikely(r->algid != NULL)) {
417
0
                    ERR_raise_data(ERR_LIB_PROV, PROV_R_REPEATED_PARAMETER,
418
0
                                   "param %s is repeated", s);
419
0
                    return 0;
420
0
                }
421
0
                r->algid = (OSSL_PARAM *)p;
422
0
            }
423
0
    return 1;
424
0
}
425
#endif
426
/* End of machine generated */
427
/* clang-format on */
428
429
static const OSSL_PARAM *slh_dsa_gettable_ctx_params(ossl_unused void *vctx,
430
    ossl_unused void *provctx)
431
0
{
432
0
    return slh_dsa_get_ctx_params_list;
433
0
}
434
435
static int slh_dsa_get_ctx_params(void *vctx, OSSL_PARAM *params)
436
0
{
437
0
    PROV_SLH_DSA_CTX *ctx = (PROV_SLH_DSA_CTX *)vctx;
438
0
    struct slh_dsa_get_ctx_params_st p;
439
440
0
    if (ctx == NULL || !slh_dsa_get_ctx_params_decoder(params, &p))
441
0
        return 0;
442
443
0
    if (p.algid != NULL
444
0
        && !OSSL_PARAM_set_octet_string(p.algid,
445
0
            ctx->aid_len == 0 ? NULL : ctx->aid_buf,
446
0
            ctx->aid_len))
447
0
        return 0;
448
449
0
    return 1;
450
0
}
451
452
#define MAKE_SIGNATURE_FUNCTIONS(alg, fn)                                               \
453
    static OSSL_FUNC_signature_newctx_fn slh_dsa_##fn##_newctx;                         \
454
    static void *slh_dsa_##fn##_newctx(void *provctx, const char *propq)                \
455
2.07k
    {                                                                                   \
456
2.07k
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
2.07k
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_128s_newctx
Line
Count
Source
455
218
    {                                                                                   \
456
218
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
218
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_128f_newctx
Line
Count
Source
455
410
    {                                                                                   \
456
410
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
410
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_192s_newctx
Line
Count
Source
455
54
    {                                                                                   \
456
54
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
54
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_192f_newctx
Line
Count
Source
455
363
    {                                                                                   \
456
363
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
363
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_256s_newctx
Line
Count
Source
455
159
    {                                                                                   \
456
159
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
159
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_sha2_256f_newctx
Line
Count
Source
455
192
    {                                                                                   \
456
192
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
192
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_128s_newctx
Line
Count
Source
455
47
    {                                                                                   \
456
47
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
47
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_128f_newctx
Line
Count
Source
455
72
    {                                                                                   \
456
72
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
72
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_192s_newctx
Line
Count
Source
455
67
    {                                                                                   \
456
67
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
67
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_192f_newctx
Line
Count
Source
455
246
    {                                                                                   \
456
246
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
246
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_256s_newctx
Line
Count
Source
455
120
    {                                                                                   \
456
120
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
120
    }                                                                                   \
slh_dsa_sig.c:slh_dsa_shake_256f_newctx
Line
Count
Source
455
123
    {                                                                                   \
456
123
        return slh_dsa_newctx(provctx, alg, propq);                                     \
457
123
    }                                                                                   \
458
    const OSSL_DISPATCH ossl_slh_dsa_##fn##_signature_functions[] = {                   \
459
        { OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))slh_dsa_##fn##_newctx },          \
460
        { OSSL_FUNC_SIGNATURE_SIGN_MESSAGE_INIT,                                        \
461
            (void (*)(void))slh_dsa_sign_msg_init },                                    \
462
        { OSSL_FUNC_SIGNATURE_SIGN, (void (*)(void))slh_dsa_sign },                     \
463
        { OSSL_FUNC_SIGNATURE_VERIFY_MESSAGE_INIT,                                      \
464
            (void (*)(void))slh_dsa_verify_msg_init },                                  \
465
        { OSSL_FUNC_SIGNATURE_VERIFY, (void (*)(void))slh_dsa_verify },                 \
466
        { OSSL_FUNC_SIGNATURE_DIGEST_SIGN_INIT,                                         \
467
            (void (*)(void))slh_dsa_digest_signverify_init },                           \
468
        { OSSL_FUNC_SIGNATURE_DIGEST_SIGN,                                              \
469
            (void (*)(void))slh_dsa_digest_sign },                                      \
470
        { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY_INIT,                                       \
471
            (void (*)(void))slh_dsa_digest_signverify_init },                           \
472
        { OSSL_FUNC_SIGNATURE_DIGEST_VERIFY,                                            \
473
            (void (*)(void))slh_dsa_digest_verify },                                    \
474
        { OSSL_FUNC_SIGNATURE_FREECTX, (void (*)(void))slh_dsa_freectx },               \
475
        { OSSL_FUNC_SIGNATURE_DUPCTX, (void (*)(void))slh_dsa_dupctx },                 \
476
        { OSSL_FUNC_SIGNATURE_SET_CTX_PARAMS, (void (*)(void))slh_dsa_set_ctx_params }, \
477
        { OSSL_FUNC_SIGNATURE_SETTABLE_CTX_PARAMS,                                      \
478
            (void (*)(void))slh_dsa_settable_ctx_params },                              \
479
        { OSSL_FUNC_SIGNATURE_GET_CTX_PARAMS,                                           \
480
            (void (*)(void))slh_dsa_get_ctx_params },                                   \
481
        { OSSL_FUNC_SIGNATURE_GETTABLE_CTX_PARAMS,                                      \
482
            (void (*)(void))slh_dsa_gettable_ctx_params },                              \
483
        OSSL_DISPATCH_END                                                               \
484
    }
485
486
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-128s", sha2_128s);
487
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-128f", sha2_128f);
488
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-192s", sha2_192s);
489
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-192f", sha2_192f);
490
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-256s", sha2_256s);
491
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHA2-256f", sha2_256f);
492
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-128s", shake_128s);
493
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-128f", shake_128f);
494
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-192s", shake_192s);
495
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-192f", shake_192f);
496
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-256s", shake_256s);
497
MAKE_SIGNATURE_FUNCTIONS("SLH-DSA-SHAKE-256f", shake_256f);