[gnutls-devel] GnuTLS | nettle: support deriving ML-DSA public key from expanded secret key (!2088)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Mon Apr 13 01:34:48 CEST 2026




Daiki Ueno commented on a discussion on lib/nettle/pk.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/2088#note_3243318549

 >  		}
 >  		break;
 >  
 > +	case GNUTLS_PK_MLDSA44:
 > +	case GNUTLS_PK_MLDSA65:
 > +	case GNUTLS_PK_MLDSA87:
 > +		if (params->raw_pub.data == NULL) {
 > +			ret = ml_dsa_privkey_to_pubkey(algo, &params->raw_priv,
 > +						       &params->raw_pub);
 > +			if (ret < 0 && ret != GNUTLS_E_UNIMPLEMENTED_FEATURE)

Yes, that is intentional. Since `pk_fixup` is called upon importing private key, failing here means to prevent subsequent operations with expanded-only ML-DSA private keys. I added a debug log there.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/2088#note_3243318549
You're receiving this email because of your account on gitlab.com. Unsubscribe from this thread: https://gitlab.com/-/sent_notifications/4-2d3ld5pwunsc2aa8a10w0jkex-a84t7/unsubscribe | Manage all notifications: https://gitlab.com/-/profile/notifications | Help: https://gitlab.com/help


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20260412/f9ecc3f2/attachment.html>


More information about the Gnutls-devel mailing list