Implement PCT for EDDSA
authorpohsingwu <pohsingwu@synology.com>
Sun, 28 Jan 2024 10:18:02 +0000 (18:18 +0800)
committerTomas Mraz <tomas@openssl.org>
Fri, 1 Mar 2024 10:06:03 +0000 (11:06 +0100)
commitfbce6ebf706cdd273f2569edfea7ade106426e0b
tree2d598acb71f57e2fe8af34857e00126020e8cbb6
parentc18c301deb44deb27f35c199e8bf44ca8b80e579
Implement PCT for EDDSA

According to FIPS 140-3 IG 10.3.A Additonal Comment 1, a PCT shall be
performed consistent with the intended use of the keys.

This commit implements PCT for EDDSA via performing sign and verify
operations after key generated.

Also use the same pairwise test logic in EVP_PKEY_keygen and
EVP_PKEY_pairwise_check for EDDSA in FIPS_MODULE.

Add OSSL_SELF_TEST_DESC_PCT_EDDSA to OSSL_PROVIDER-FIPS page.

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/23408)
doc/man7/OSSL_PROVIDER-FIPS.pod
include/openssl/self_test.h
providers/implementations/keymgmt/ecx_kmgmt.c
test/pairwise_fail_test.c
test/recipes/30-test_pairwise_fail.t