Skip to content

MLDSA for Pingora#497

Open
kornelski wants to merge 3 commits intomasterfrom
mldsa
Open

MLDSA for Pingora#497
kornelski wants to merge 3 commits intomasterfrom
mldsa

Conversation

@kornelski
Copy link
Copy Markdown
Collaborator

No description provided.

@kornelski kornelski requested a review from rushilmehra April 21, 2026 18:32
Copy link
Copy Markdown
Collaborator

@cjpatton cjpatton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks pretty good. I'll note that BoringSSL has also integrated MLDSA into X.509, but this has happened after the commit we've currently checked out. I'm working on bumping BoringSSL in #498.

Comment thread boring/src/mldsa.rs
Comment on lines +3 to +4
//! ML-DSA-65 is the recommended parameter set, offering NIST security level 3
//! (roughly equivalent to AES-192).
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Recommended by whom? ML-DSA-44 is more likely than -65 to get used in TLS.

Comment thread boring/src/mldsa.rs
}

/// Regenerates a private key from a seed value.
pub fn from_seed(algorithm: Algorithm, seed: &MlDsaSeed) -> Result<Self, ErrorStack> {
Copy link
Copy Markdown
Collaborator

@cjpatton cjpatton Apr 21, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note: RFC 9881 specifies a slightly more complicated DER encoding of MLDSA private keys that would be incompatible with the encoding here. We might need to at least partially implemented the complicated encoding, i.e., extract the seed and fail if the seed isn't present. This is what we're doing for internal use cases for Go. (happy to provide a reference.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants