[gnutls-devel] GnuTLS | nettle: support deriving ML-DSA public key from expanded secret key (!2088)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Mon Apr 13 01:34:48 CEST 2026
Daiki Ueno commented on a discussion on lib/nettle/pk.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/2088#note_3243318549
> }
> break;
>
> + case GNUTLS_PK_MLDSA44:
> + case GNUTLS_PK_MLDSA65:
> + case GNUTLS_PK_MLDSA87:
> + if (params->raw_pub.data == NULL) {
> + ret = ml_dsa_privkey_to_pubkey(algo, ¶ms->raw_priv,
> + ¶ms->raw_pub);
> + if (ret < 0 && ret != GNUTLS_E_UNIMPLEMENTED_FEATURE)
Yes, that is intentional. Since `pk_fixup` is called upon importing private key, failing here means to prevent subsequent operations with expanded-only ML-DSA private keys. I added a debug log there.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/2088#note_3243318549
You're receiving this email because of your account on gitlab.com. Unsubscribe from this thread: https://gitlab.com/-/sent_notifications/4-2d3ld5pwunsc2aa8a10w0jkex-a84t7/unsubscribe | Manage all notifications: https://gitlab.com/-/profile/notifications | Help: https://gitlab.com/help
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20260412/f9ecc3f2/attachment.html>
More information about the Gnutls-devel
mailing list