mldsa.h
All headers- MLDSA_SEED_BYTES
- MLDSA_MU_BYTES
- ML-DSA-65
- MLDSA65_private_key
- MLDSA65_public_key
- MLDSA65_prehash
- MLDSA65_PRIVATE_KEY_BYTES
- MLDSA65_PUBLIC_KEY_BYTES
- MLDSA65_SIGNATURE_BYTES
- MLDSA65_generate_key
- MLDSA65_private_key_from_seed
- MLDSA65_public_from_private
- MLDSA65_sign
- MLDSA65_verify
- MLDSA65_prehash_init
- MLDSA65_prehash_update
- MLDSA65_prehash_finalize
- MLDSA65_sign_message_representative
- MLDSA65_marshal_public_key
- MLDSA65_parse_public_key
- ML-DSA-87
- MLDSA87_private_key
- MLDSA87_public_key
- MLDSA87_prehash
- MLDSA87_PRIVATE_KEY_BYTES
- MLDSA87_PUBLIC_KEY_BYTES
- MLDSA87_SIGNATURE_BYTES
- MLDSA87_generate_key
- MLDSA87_private_key_from_seed
- MLDSA87_public_from_private
- MLDSA87_sign
- MLDSA87_verify
- MLDSA87_prehash_init
- MLDSA87_prehash_update
- MLDSA87_prehash_finalize
- MLDSA87_sign_message_representative
- MLDSA87_marshal_public_key
- MLDSA87_parse_public_key
- ML-DSA-44
- MLDSA44_private_key
- MLDSA44_public_key
- MLDSA44_prehash
- MLDSA44_PRIVATE_KEY_BYTES
- MLDSA44_PUBLIC_KEY_BYTES
- MLDSA44_SIGNATURE_BYTES
- MLDSA44_generate_key
- MLDSA44_private_key_from_seed
- MLDSA44_public_from_private
- MLDSA44_sign
- MLDSA44_verify
- MLDSA44_prehash_init
- MLDSA44_prehash_update
- MLDSA44_prehash_finalize
- MLDSA44_sign_message_representative
- MLDSA44_marshal_public_key
- MLDSA44_parse_public_key
MLDSA_SEED_BYTES is the number of bytes in an ML-DSA seed value.
#define MLDSA_SEED_BYTES 32
MLDSA_MU_BYTES is the number of bytes in an ML-DSA mu value.
#define MLDSA_MU_BYTES 64
ML-DSA-65.
MLDSA65_private_key contains an ML-DSA-65 private key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA65_private_key { union { uint8_t bytes[32 + 32 + 64 + 256 * 4 * (5 + 6 + 6)]; uint32_t alignment; } opaque; };
MLDSA65_public_key contains an ML-DSA-65 public key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA65_public_key { union { uint8_t bytes[32 + 64 + 256 * 4 * 6]; uint32_t alignment; } opaque; };
MLDSA65_prehash contains a pre-hash context for ML-DSA-65. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA65_prehash { union { uint8_t bytes[200 + 4 + 4 + 4 * sizeof(size_t)]; uint64_t alignment; } opaque; };
MLDSA65_PRIVATE_KEY_BYTES is the number of bytes in an encoded ML-DSA-65 private key.
#define MLDSA65_PRIVATE_KEY_BYTES 4032
MLDSA65_PUBLIC_KEY_BYTES is the number of bytes in an encoded ML-DSA-65 public key.
#define MLDSA65_PUBLIC_KEY_BYTES 1952
MLDSA65_SIGNATURE_BYTES is the number of bytes in an encoded ML-DSA-65 signature.
#define MLDSA65_SIGNATURE_BYTES 3309
MLDSA65_generate_key generates a random public/private key pair, writes the encoded public key to out_encoded_public_key, writes the seed to out_seed, and sets out_private_key to the private key. Returns 1 on success and 0 on allocation failure.
OPENSSL_EXPORT int MLDSA65_generate_key( uint8_t out_encoded_public_key[MLDSA65_PUBLIC_KEY_BYTES], uint8_t out_seed[MLDSA_SEED_BYTES], struct MLDSA65_private_key *out_private_key);
MLDSA65_private_key_from_seed regenerates a private key from a seed value that was generated by MLDSA65_generate_key. Returns 1 on success and 0 on allocation failure or if seed_len is incorrect.
OPENSSL_EXPORT int MLDSA65_private_key_from_seed( struct MLDSA65_private_key *out_private_key, const uint8_t *seed, size_t seed_len);
MLDSA65_public_from_private sets *out_public_key to the public key that corresponds to private_key. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA65_public_from_private( struct MLDSA65_public_key *out_public_key, const struct MLDSA65_private_key *private_key);
MLDSA65_sign generates a signature for the message msg of length msg_len using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The context argument is also signed over and can be used to include implicit contextual information that isn't included in msg. The same value of context must be presented to MLDSA65_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA65_sign( uint8_t out_encoded_signature[MLDSA65_SIGNATURE_BYTES], const struct MLDSA65_private_key *private_key, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA65_verify verifies that signature constitutes a valid signature for the message msg of length msg_len using public_key. The value of context must equal the value that was passed to MLDSA65_sign when the signature was generated. Returns 1 on success or 0 on error.
OPENSSL_EXPORT int MLDSA65_verify(const struct MLDSA65_public_key *public_key, const uint8_t *signature, size_t signature_len, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA65_prehash_init initializes a pre-hashing state using public_key. The context argument can be used to include implicit contextual information that isn't included in the message. The same value of context must be presented to MLDSA65_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure (if the context is too long).
OPENSSL_EXPORT int MLDSA65_prehash_init( struct MLDSA65_prehash *out_state, const struct MLDSA65_public_key *public_key, const uint8_t *context, size_t context_len);
MLDSA65_prehash_update incorporates the given msg of length msg_len into the pre-hashing state. This can be called multiple times on successive chunks of the message. This should be called after MLDSA65_prehash_init and before MLDSA65_prehash_finalize.
OPENSSL_EXPORT void MLDSA65_prehash_update(struct MLDSA65_prehash *inout_state, const uint8_t *msg, size_t msg_len);
MLDSA65_prehash_finalize extracts a pre-hashed message representative from the given pre-hashing state. This should be called after MLDSA65_prehash_init and MLDSA65_prehash_update. The resulting out_msg_rep should then be passed to MLDSA65_sign_message_representative to obtain a signature.
OPENSSL_EXPORT void MLDSA65_prehash_finalize( uint8_t out_msg_rep[MLDSA_MU_BYTES], struct MLDSA65_prehash *inout_state);
MLDSA65_sign_message_representative generates a signature for the pre-hashed message msg_rep using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The msg_rep should be obtained via calls to MLDSA65_prehash_init, MLDSA65_prehash_update and MLDSA65_prehash_finalize using the public key from the same key pair, otherwise the signature will not verify. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA65_sign_message_representative( uint8_t out_encoded_signature[MLDSA65_SIGNATURE_BYTES], const struct MLDSA65_private_key *private_key, const uint8_t msg_rep[MLDSA_MU_BYTES]);
MLDSA65_marshal_public_key serializes public_key to out in the standard format for ML-DSA-65 public keys. It returns 1 on success or 0 on allocation error.
OPENSSL_EXPORT int MLDSA65_marshal_public_key( CBB *out, const struct MLDSA65_public_key *public_key);
MLDSA65_parse_public_key parses a public key, in the format generated by MLDSA65_marshal_public_key, from in and writes the result to out_public_key. It returns 1 on success or 0 on parse error or if there are trailing bytes in in.
OPENSSL_EXPORT int MLDSA65_parse_public_key( struct MLDSA65_public_key *public_key, CBS *in);
ML-DSA-87.
ML-DSA-87 is excessively and unnecessarily large. Use -65 unless you are specifically attempting to achieve CNSA 2.0 compliance.
MLDSA87_private_key contains an ML-DSA-87 private key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA87_private_key { union { uint8_t bytes[32 + 32 + 64 + 256 * 4 * (7 + 8 + 8)]; uint32_t alignment; } opaque; };
MLDSA87_public_key contains an ML-DSA-87 public key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA87_public_key { union { uint8_t bytes[32 + 64 + 256 * 4 * 8]; uint32_t alignment; } opaque; };
MLDSA87_prehash contains a pre-hash context for ML-DSA-87. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA87_prehash { union { uint8_t bytes[200 + 4 + 4 + 4 * sizeof(size_t)]; uint64_t alignment; } opaque; };
MLDSA87_PRIVATE_KEY_BYTES is the number of bytes in an encoded ML-DSA-87 private key.
#define MLDSA87_PRIVATE_KEY_BYTES 4896
MLDSA87_PUBLIC_KEY_BYTES is the number of bytes in an encoded ML-DSA-87 public key.
#define MLDSA87_PUBLIC_KEY_BYTES 2592
MLDSA87_SIGNATURE_BYTES is the number of bytes in an encoded ML-DSA-87 signature.
#define MLDSA87_SIGNATURE_BYTES 4627
MLDSA87_generate_key generates a random public/private key pair, writes the encoded public key to out_encoded_public_key, writes the seed to out_seed, and sets out_private_key to the private key. Returns 1 on success and 0 on allocation failure.
OPENSSL_EXPORT int MLDSA87_generate_key( uint8_t out_encoded_public_key[MLDSA87_PUBLIC_KEY_BYTES], uint8_t out_seed[MLDSA_SEED_BYTES], struct MLDSA87_private_key *out_private_key);
MLDSA87_private_key_from_seed regenerates a private key from a seed value that was generated by MLDSA87_generate_key. Returns 1 on success and 0 on allocation failure or if seed_len is incorrect.
OPENSSL_EXPORT int MLDSA87_private_key_from_seed( struct MLDSA87_private_key *out_private_key, const uint8_t *seed, size_t seed_len);
MLDSA87_public_from_private sets *out_public_key to the public key that corresponds to private_key. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA87_public_from_private( struct MLDSA87_public_key *out_public_key, const struct MLDSA87_private_key *private_key);
MLDSA87_sign generates a signature for the message msg of length msg_len using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The context argument is also signed over and can be used to include implicit contextual information that isn't included in msg. The same value of context must be presented to MLDSA87_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA87_sign( uint8_t out_encoded_signature[MLDSA87_SIGNATURE_BYTES], const struct MLDSA87_private_key *private_key, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA87_verify verifies that signature constitutes a valid signature for the message msg of length msg_len using public_key. The value of context must equal the value that was passed to MLDSA87_sign when the signature was generated. Returns 1 on success or 0 on error.
OPENSSL_EXPORT int MLDSA87_verify(const struct MLDSA87_public_key *public_key, const uint8_t *signature, size_t signature_len, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA87_prehash_init initializes a pre-hashing state using public_key. The context argument can be used to include implicit contextual information that isn't included in the message. The same value of context must be presented to MLDSA87_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure (if the context is too long).
OPENSSL_EXPORT int MLDSA87_prehash_init( struct MLDSA87_prehash *out_state, const struct MLDSA87_public_key *public_key, const uint8_t *context, size_t context_len);
MLDSA87_prehash_update incorporates the given msg of length msg_len into the pre-hashing state. This can be called multiple times on successive chunks of the message. This should be called after MLDSA87_prehash_init and before MLDSA87_prehash_finalize.
OPENSSL_EXPORT void MLDSA87_prehash_update(struct MLDSA87_prehash *inout_state, const uint8_t *msg, size_t msg_len);
MLDSA87_prehash_finalize extracts a pre-hashed message representative from the given pre-hashing state. This should be called after MLDSA87_prehash_init and MLDSA87_prehash_update. The resulting out_msg_rep should then be passed to MLDSA87_sign_message_representative to obtain a signature.
OPENSSL_EXPORT void MLDSA87_prehash_finalize( uint8_t out_msg_rep[MLDSA_MU_BYTES], struct MLDSA87_prehash *inout_state);
MLDSA87_sign_message_representative generates a signature for the pre-hashed message msg_rep using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The msg_rep should be obtained via calls to MLDSA87_prehash_init, MLDSA87_prehash_update and MLDSA87_prehash_finalize using the public key from the same key pair, otherwise the signature will not verify. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA87_sign_message_representative( uint8_t out_encoded_signature[MLDSA87_SIGNATURE_BYTES], const struct MLDSA87_private_key *private_key, const uint8_t msg_rep[MLDSA_MU_BYTES]);
MLDSA87_marshal_public_key serializes public_key to out in the standard format for ML-DSA-87 public keys. It returns 1 on success or 0 on allocation error.
OPENSSL_EXPORT int MLDSA87_marshal_public_key( CBB *out, const struct MLDSA87_public_key *public_key);
MLDSA87_parse_public_key parses a public key, in the format generated by MLDSA87_marshal_public_key, from in and writes the result to out_public_key. It returns 1 on success or 0 on parse error or if there are trailing bytes in in.
OPENSSL_EXPORT int MLDSA87_parse_public_key( struct MLDSA87_public_key *public_key, CBS *in);
ML-DSA-44.
MLDSA44_private_key contains an ML-DSA-44 private key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA44_private_key { union { uint8_t bytes[32 + 32 + 64 + 256 * 4 * (4 + 4 + 4)]; uint32_t alignment; } opaque; };
MLDSA44_public_key contains an ML-DSA-44 public key. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA44_public_key { union { uint8_t bytes[32 + 64 + 256 * 4 * 4]; uint32_t alignment; } opaque; };
MLDSA44_prehash contains a pre-hash context for ML-DSA-44. The contents of this object should never leave the address space since the format is unstable.
struct MLDSA44_prehash { union { uint8_t bytes[200 + 4 + 4 + 4 * sizeof(size_t)]; uint64_t alignment; } opaque; };
MLDSA44_PRIVATE_KEY_BYTES is the number of bytes in an encoded ML-DSA-44 private key.
#define MLDSA44_PRIVATE_KEY_BYTES 2560
MLDSA44_PUBLIC_KEY_BYTES is the number of bytes in an encoded ML-DSA-44 public key.
#define MLDSA44_PUBLIC_KEY_BYTES 1312
MLDSA44_SIGNATURE_BYTES is the number of bytes in an encoded ML-DSA-44 signature.
#define MLDSA44_SIGNATURE_BYTES 2420
MLDSA44_generate_key generates a random public/private key pair, writes the encoded public key to out_encoded_public_key, writes the seed to out_seed, and sets out_private_key to the private key. Returns 1 on success and 0 on allocation failure.
OPENSSL_EXPORT int MLDSA44_generate_key( uint8_t out_encoded_public_key[MLDSA44_PUBLIC_KEY_BYTES], uint8_t out_seed[MLDSA_SEED_BYTES], struct MLDSA44_private_key *out_private_key);
MLDSA44_private_key_from_seed regenerates a private key from a seed value that was generated by MLDSA44_generate_key. Returns 1 on success and 0 on allocation failure or if seed_len is incorrect.
OPENSSL_EXPORT int MLDSA44_private_key_from_seed( struct MLDSA44_private_key *out_private_key, const uint8_t *seed, size_t seed_len);
MLDSA44_public_from_private sets *out_public_key to the public key that corresponds to private_key. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA44_public_from_private( struct MLDSA44_public_key *out_public_key, const struct MLDSA44_private_key *private_key);
MLDSA44_sign generates a signature for the message msg of length msg_len using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The context argument is also signed over and can be used to include implicit contextual information that isn't included in msg. The same value of context must be presented to MLDSA44_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA44_sign( uint8_t out_encoded_signature[MLDSA44_SIGNATURE_BYTES], const struct MLDSA44_private_key *private_key, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA44_verify verifies that signature constitutes a valid signature for the message msg of length msg_len using public_key. The value of context must equal the value that was passed to MLDSA44_sign when the signature was generated. Returns 1 on success or 0 on error.
OPENSSL_EXPORT int MLDSA44_verify(const struct MLDSA44_public_key *public_key, const uint8_t *signature, size_t signature_len, const uint8_t *msg, size_t msg_len, const uint8_t *context, size_t context_len);
MLDSA44_prehash_init initializes a pre-hashing state using public_key. The context argument can be used to include implicit contextual information that isn't included in the message. The same value of context must be presented to MLDSA44_verify in order for the generated signature to be considered valid. context and context_len may be NULL and 0 to use an empty context (this is common). Returns 1 on success and 0 on failure (if the context is too long).
OPENSSL_EXPORT int MLDSA44_prehash_init( struct MLDSA44_prehash *out_state, const struct MLDSA44_public_key *public_key, const uint8_t *context, size_t context_len);
MLDSA44_prehash_update incorporates the given msg of length msg_len into the pre-hashing state. This can be called multiple times on successive chunks of the message. This should be called after MLDSA44_prehash_init and before MLDSA44_prehash_finalize.
OPENSSL_EXPORT void MLDSA44_prehash_update(struct MLDSA44_prehash *inout_state, const uint8_t *msg, size_t msg_len);
MLDSA44_prehash_finalize extracts a pre-hashed message representative from the given pre-hashing state. This should be called after MLDSA44_prehash_init and MLDSA44_prehash_update. The resulting out_msg_rep should then be passed to MLDSA44_sign_message_representative to obtain a signature.
OPENSSL_EXPORT void MLDSA44_prehash_finalize( uint8_t out_msg_rep[MLDSA_MU_BYTES], struct MLDSA44_prehash *inout_state);
MLDSA44_sign_message_representative generates a signature for the pre-hashed message msg_rep using private_key (following the randomized algorithm), and writes the encoded signature to out_encoded_signature. The msg_rep should be obtained via calls to MLDSA44_prehash_init, MLDSA44_prehash_update and MLDSA44_prehash_finalize using the public key from the same key pair, otherwise the signature will not verify. Returns 1 on success and 0 on failure.
OPENSSL_EXPORT int MLDSA44_sign_message_representative( uint8_t out_encoded_signature[MLDSA44_SIGNATURE_BYTES], const struct MLDSA44_private_key *private_key, const uint8_t msg_rep[MLDSA_MU_BYTES]);
MLDSA44_marshal_public_key serializes public_key to out in the standard format for ML-DSA-44 public keys. It returns 1 on success or 0 on allocation error.
OPENSSL_EXPORT int MLDSA44_marshal_public_key( CBB *out, const struct MLDSA44_public_key *public_key);
MLDSA44_parse_public_key parses a public key, in the format generated by MLDSA44_marshal_public_key, from in and writes the result to out_public_key. It returns 1 on success or 0 on parse error or if there are trailing bytes in in.
OPENSSL_EXPORT int MLDSA44_parse_public_key( struct MLDSA44_public_key *public_key, CBS *in);
ML-DSA.
This implements the Module-Lattice-Based Digital Signature Standard from https://csrc.nist.gov/pubs/fips/204/final