Skip to content

Conversation

@pamaury
Copy link
Contributor

@pamaury pamaury commented Jan 26, 2026

Backport #27131

CloudKMS requires the `public_key_format` parameter when retrieving PQC
public key material.

Signed-off-by: Chris Frantz <[email protected]>
(cherry picked from commit 6aadfdf)
Some HSMs/backends require specifying the SLH-DSA signing domain that a
key will use during keygen.  Adjust the SPX trait and implementations
to take the domain during keygen and import, and to return the
associated domain during "key info" operations.

Signed-off-by: Chris Frantz <[email protected]>
(cherry picked from commit 4feca91)
@pamaury pamaury requested a review from a team as a code owner January 26, 2026 18:59
@pamaury pamaury requested review from cfrantz and jwnrt and removed request for a team January 26, 2026 18:59
CloudKMS is adding support for SLH-DSA signatures using the prehashed
domain.  Add support for keygen, sign and verify with prehashing.

1. Check the domain during keygen.  CloudKMS encodes both the algorithm
   and domain into their notion of algorithm, so you must provide the
   domain at keygen time.
2. Check that the `domain` given for sign and verify matches the domain
   for which the key was generated.

Signed-off-by: Chris Frantz <[email protected]>
(cherry picked from commit 57fd70b)
@pamaury pamaury added this pull request to the merge queue Jan 28, 2026
Merged via the queue into lowRISC:master with commit c59ef68 Jan 28, 2026
47 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants