Blame SOURCES/0021-COMMON-EP11-Allow-to-select-Dilithium-variant-via-mo.patch

971d89
From 57cd8cd4db0d68c08b123b669f1cf57bed0fe34d Mon Sep 17 00:00:00 2001
971d89
From: Ingo Franzki <ifranzki@linux.ibm.com>
971d89
Date: Thu, 17 Feb 2022 10:27:56 +0100
971d89
Subject: [PATCH 21/34] COMMON/EP11: Allow to select Dilithium variant via mode
971d89
 or key form attribute
971d89
971d89
Attributes CKA_IBM_DILITHIUM_KEYFORM or CKA_IBM_DILITHIUM_MODE can
971d89
be used to select the Dilithium variant to use.
971d89
971d89
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
971d89
---
971d89
 testcases/common/common.c          |   4 +-
971d89
 usr/lib/common/asn1.c              |  20 +-
971d89
 usr/lib/common/h_extern.h          |  11 +-
971d89
 usr/lib/common/key.c               | 443 +++++++++++++++++++++++--------------
971d89
 usr/lib/ep11_stdll/ep11_specific.c |  84 +++++--
971d89
 5 files changed, 375 insertions(+), 187 deletions(-)
971d89
971d89
diff --git a/testcases/common/common.c b/testcases/common/common.c
971d89
index 8ec5043b..fac9e4e6 100644
971d89
--- a/testcases/common/common.c
971d89
+++ b/testcases/common/common.c
971d89
@@ -629,7 +629,7 @@ CK_RV create_DilithiumPrivateKey(CK_SESSION_HANDLE session,
971d89
     CK_UTF8CHAR label[] = "A Dilithium private key object";
971d89
     CK_BYTE subject[] = {0};
971d89
     CK_BYTE id[] = { 123 };
971d89
-    CK_ULONG keyform = IBM_DILITHIUM_KEYFORM_ROUND2;
971d89
+    CK_ULONG keyform = CK_IBM_DILITHIUM_KEYFORM_ROUND2_65;
971d89
     CK_RV rc;
971d89
 
971d89
     CK_BBOOL true = TRUE;
971d89
@@ -678,7 +678,7 @@ CK_RV create_DilithiumPublicKey(CK_SESSION_HANDLE session,
971d89
     CK_KEY_TYPE keyType = CKK_IBM_PQC_DILITHIUM;
971d89
     CK_UTF8CHAR label[] = "A Dilithium public key object";
971d89
     CK_BBOOL true = TRUE;
971d89
-    CK_ULONG keyform = IBM_DILITHIUM_KEYFORM_ROUND2;
971d89
+    CK_ULONG keyform = CK_IBM_DILITHIUM_KEYFORM_ROUND2_65;
971d89
     CK_ATTRIBUTE template[] = {
971d89
         {CKA_CLASS, &class, sizeof(class)},
971d89
         {CKA_KEY_TYPE, &keyType, sizeof(keyType)},
971d89
diff --git a/usr/lib/common/asn1.c b/usr/lib/common/asn1.c
971d89
index dbf06dfd..85d3924c 100644
971d89
--- a/usr/lib/common/asn1.c
971d89
+++ b/usr/lib/common/asn1.c
971d89
@@ -3788,7 +3788,8 @@ CK_RV ber_decode_IBM_DilithiumPublicKey(CK_BYTE *data,
971d89
                                         CK_ULONG data_len,
971d89
                                         CK_ATTRIBUTE **rho_attr,
971d89
                                         CK_ATTRIBUTE **t1_attr,
971d89
-                                        CK_ATTRIBUTE **value_attr)
971d89
+                                        CK_ATTRIBUTE **value_attr,
971d89
+                                        const struct pqc_oid **oid)
971d89
 {
971d89
     CK_ATTRIBUTE *rho_attr_temp = NULL;
971d89
     CK_ATTRIBUTE *t1_attr_temp = NULL;
971d89
@@ -3818,8 +3819,8 @@ CK_RV ber_decode_IBM_DilithiumPublicKey(CK_BYTE *data,
971d89
        return rc;
971d89
     }
971d89
 
971d89
-    if (algoid_len != dilithium_r2_65_len ||
971d89
-        memcmp(algoid, dilithium_r2_65, dilithium_r2_65_len) != 0) {
971d89
+    *oid = find_pqc_by_oid(dilithium_oids, algoid, algoid_len);
971d89
+    if (*oid == NULL) {
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_FUNCTION_FAILED));
971d89
         return CKR_FUNCTION_FAILED;
971d89
     }
971d89
@@ -4155,7 +4156,8 @@ CK_RV ber_decode_IBM_DilithiumPrivateKey(CK_BYTE *data,
971d89
                                          CK_ATTRIBUTE **s2,
971d89
                                          CK_ATTRIBUTE **t0,
971d89
                                          CK_ATTRIBUTE **t1,
971d89
-                                         CK_ATTRIBUTE **value)
971d89
+                                         CK_ATTRIBUTE **value,
971d89
+                                         const struct pqc_oid **oid)
971d89
 {
971d89
     CK_ATTRIBUTE *rho_attr = NULL, *seed_attr = NULL;
971d89
     CK_ATTRIBUTE *tr_attr = NULL, *s1_attr = NULL, *s2_attr = NULL;
971d89
@@ -4175,8 +4177,14 @@ CK_RV ber_decode_IBM_DilithiumPrivateKey(CK_BYTE *data,
971d89
         return rc;
971d89
     }
971d89
 
971d89
-    if (len != dilithium_r2_65_len + ber_NULLLen ||
971d89
-        memcmp(algoid, dilithium_r2_65, dilithium_r2_65_len) != 0) {
971d89
+    if (len <= ber_NULLLen ||
971d89
+        memcmp(algoid + len - ber_NULLLen, ber_NULL, ber_NULLLen) != 0) {
971d89
+        TRACE_ERROR("%s\n", ock_err(ERR_FUNCTION_FAILED));
971d89
+        return CKR_FUNCTION_FAILED;
971d89
+    }
971d89
+    len -= ber_NULLLen;
971d89
+    *oid = find_pqc_by_oid(dilithium_oids, algoid, len);
971d89
+    if (*oid == NULL) {
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_FUNCTION_FAILED));
971d89
         return CKR_FUNCTION_FAILED;
971d89
     }
971d89
diff --git a/usr/lib/common/h_extern.h b/usr/lib/common/h_extern.h
971d89
index 53909e99..fdbcacd9 100644
971d89
--- a/usr/lib/common/h_extern.h
971d89
+++ b/usr/lib/common/h_extern.h
971d89
@@ -26,6 +26,7 @@
971d89
 #include <stdio.h>
971d89
 #include "dlist.h"
971d89
 #include "host_defs.h"
971d89
+#include "pqc_defs.h"
971d89
 
971d89
 #include <openssl/evp.h>
971d89
 
971d89
@@ -2504,6 +2505,10 @@ CK_RV ibm_dilithium_priv_unwrap(TEMPLATE *tmpl, CK_BYTE *data,
971d89
 CK_RV ibm_dilithium_priv_unwrap_get_data(TEMPLATE *tmpl,
971d89
                                          CK_BYTE *data, CK_ULONG total_length,
971d89
                                          CK_BBOOL add_value);
971d89
+const struct pqc_oid *ibm_pqc_get_keyform_mode(TEMPLATE *tmpl,
971d89
+                                               CK_MECHANISM_TYPE mech);
971d89
+CK_RV ibm_pqc_add_keyform_mode(TEMPLATE *tmpl, const struct pqc_oid *oid,
971d89
+                               CK_MECHANISM_TYPE mech);
971d89
 
971d89
 // diffie-hellman routines
971d89
 //
971d89
@@ -2750,7 +2755,8 @@ CK_RV ber_decode_IBM_DilithiumPublicKey(CK_BYTE *data,
971d89
                                         CK_ULONG data_len,
971d89
                                         CK_ATTRIBUTE **rho_attr,
971d89
                                         CK_ATTRIBUTE **t1_attr,
971d89
-                                        CK_ATTRIBUTE **value_attr);
971d89
+                                        CK_ATTRIBUTE **value_attr,
971d89
+                                        const struct pqc_oid **oid);
971d89
 
971d89
 CK_RV ber_encode_IBM_DilithiumPrivateKey(CK_BBOOL length_only,
971d89
                                          CK_BYTE **data,
971d89
@@ -2773,7 +2779,8 @@ CK_RV ber_decode_IBM_DilithiumPrivateKey(CK_BYTE *data,
971d89
                                          CK_ATTRIBUTE **s2,
971d89
                                          CK_ATTRIBUTE **t0,
971d89
                                          CK_ATTRIBUTE **t1,
971d89
-                                         CK_ATTRIBUTE **value);
971d89
+                                         CK_ATTRIBUTE **value,
971d89
+                                         const struct pqc_oid **oid);
971d89
 
971d89
 typedef CK_RV (*t_rsa_encrypt)(STDLL_TokData_t *, CK_BYTE *in_data,
971d89
                                CK_ULONG in_data_len, CK_BYTE *out_data,
971d89
diff --git a/usr/lib/common/key.c b/usr/lib/common/key.c
971d89
index b0050816..ba40cefd 100644
971d89
--- a/usr/lib/common/key.c
971d89
+++ b/usr/lib/common/key.c
971d89
@@ -2654,6 +2654,117 @@ error:
971d89
     return rc;
971d89
 }
971d89
 
971d89
+static CK_RV ibm_pqc_keyform_mode_attrs_by_mech(CK_MECHANISM_TYPE mech,
971d89
+                                                CK_ATTRIBUTE_TYPE *keyform_attr,
971d89
+                                                CK_ATTRIBUTE_TYPE *mode_attr,
971d89
+                                                const struct pqc_oid **oids)
971d89
+{
971d89
+    switch (mech) {
971d89
+    case CKM_IBM_DILITHIUM:
971d89
+        *keyform_attr = CKA_IBM_DILITHIUM_KEYFORM;
971d89
+        *mode_attr = CKA_IBM_DILITHIUM_MODE;
971d89
+        *oids = dilithium_oids;
971d89
+        break;
971d89
+    case CKM_IBM_KYBER:
971d89
+        *keyform_attr = CKA_IBM_KYBER_KEYFORM;
971d89
+        *mode_attr = CKA_IBM_KYBER_MODE;
971d89
+        *oids = kyber_oids;
971d89
+        break;
971d89
+    default:
971d89
+        TRACE_ERROR("Unsupported mechanims: 0x%lx\n", mech);
971d89
+        return CKR_MECHANISM_INVALID;
971d89
+    }
971d89
+
971d89
+    return CKR_OK;
971d89
+}
971d89
+
971d89
+const struct pqc_oid *ibm_pqc_get_keyform_mode(TEMPLATE *tmpl,
971d89
+                                               CK_MECHANISM_TYPE mech)
971d89
+{
971d89
+    CK_ATTRIBUTE *attr = NULL;
971d89
+    const struct pqc_oid *oids, *oid;
971d89
+    CK_ATTRIBUTE_TYPE keyform_attr;
971d89
+    CK_ATTRIBUTE_TYPE mode_attr;
971d89
+
971d89
+    if (ibm_pqc_keyform_mode_attrs_by_mech(mech, &keyform_attr,
971d89
+                                           &mode_attr, &oids) != CKR_OK)
971d89
+        return NULL;
971d89
+
971d89
+    if (template_attribute_find(tmpl, keyform_attr, &attr) &&
971d89
+        attr->ulValueLen == sizeof(CK_ULONG) && attr->pValue != NULL) {
971d89
+        oid = find_pqc_by_keyform(oids, *(CK_ULONG *)(attr->pValue));
971d89
+        if (oid == NULL) {
971d89
+            TRACE_ERROR("KEYFORM attribute specifies an invalid value: %lu\n",
971d89
+                        *(CK_ULONG *)(attr->pValue));
971d89
+            return NULL;
971d89
+        }
971d89
+        return oid;
971d89
+    }
971d89
+
971d89
+    if (template_attribute_find(tmpl, mode_attr, &attr) &&
971d89
+        attr->ulValueLen != 0 && attr->pValue != NULL) {
971d89
+        oid = find_pqc_by_oid(oids, attr->pValue, attr->ulValueLen);
971d89
+        if (oid == NULL) {
971d89
+            TRACE_ERROR("MODE attribute specifies an invalid value\n");
971d89
+            return NULL;
971d89
+        }
971d89
+        return oid;
971d89
+    }
971d89
+
971d89
+    TRACE_ERROR("Neither KEYFORM nor MODE found\n");
971d89
+    return NULL;
971d89
+}
971d89
+
971d89
+CK_RV ibm_pqc_add_keyform_mode(TEMPLATE *tmpl, const struct pqc_oid *oid,
971d89
+                               CK_MECHANISM_TYPE mech)
971d89
+{
971d89
+    CK_ATTRIBUTE *mode = NULL;
971d89
+    CK_ATTRIBUTE *keyform = NULL;
971d89
+    CK_RV rc;
971d89
+    CK_ATTRIBUTE_TYPE keyform_attr;
971d89
+    CK_ATTRIBUTE_TYPE mode_attr;
971d89
+    const struct pqc_oid *oids;
971d89
+
971d89
+    if (ibm_pqc_keyform_mode_attrs_by_mech(mech, &keyform_attr,
971d89
+                                           &mode_attr, &oids) != CKR_OK)
971d89
+        return CKR_MECHANISM_INVALID;
971d89
+
971d89
+    rc = build_attribute(mode_attr, (CK_BYTE *)oid->oid, oid->oid_len, &mode);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_DEVEL("build_attribute failed\n");
971d89
+        goto error;
971d89
+    }
971d89
+    rc = template_update_attribute(tmpl, mode);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_DEVEL("template_update_attribute failed.\n");
971d89
+        goto error;
971d89
+    }
971d89
+    mode = NULL;
971d89
+
971d89
+    rc = build_attribute(keyform_attr, (CK_BYTE *)&oid->keyform,
971d89
+                         sizeof(CK_ULONG), &keyform);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_DEVEL("build_attribute failed\n");
971d89
+        goto error;
971d89
+    }
971d89
+    rc = template_update_attribute(tmpl, keyform);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_DEVEL("template_update_attribute failed.\n");
971d89
+        goto error;
971d89
+    }
971d89
+    keyform = NULL;
971d89
+
971d89
+    return CKR_OK;
971d89
+
971d89
+error:
971d89
+    if (mode)
971d89
+        free(mode);
971d89
+    if (keyform)
971d89
+        free(keyform);
971d89
+
971d89
+    return rc;
971d89
+}
971d89
+
971d89
 /*
971d89
  * Extract the SubjectPublicKeyInfo from the Dilithium public key
971d89
  */
971d89
@@ -2662,21 +2773,12 @@ CK_RV ibm_dilithium_publ_get_spki(TEMPLATE *tmpl, CK_BBOOL length_only,
971d89
 {
971d89
     CK_ATTRIBUTE *rho = NULL;
971d89
     CK_ATTRIBUTE *t1 = NULL;
971d89
-    CK_ULONG keyform;
971d89
+    const struct pqc_oid *oid;
971d89
     CK_RV rc;
971d89
 
971d89
-    rc = template_attribute_get_ulong(tmpl, CKA_IBM_DILITHIUM_KEYFORM,
971d89
-                                      &keyform);
971d89
-    if (rc != CKR_OK) {
971d89
-        TRACE_ERROR("Could not find CKA_IBM_DILITHIUM_KEYFORM for the key.\n");
971d89
-        return rc;
971d89
-    }
971d89
-
971d89
-    if ( keyform != IBM_DILITHIUM_KEYFORM_ROUND2) {
971d89
-        TRACE_ERROR("This key has an unexpected CKA_IBM_DILITHIUM_KEYFORM: "
971d89
-                    "%ld \n", keyform);
971d89
-        return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-    }
971d89
+    oid = ibm_pqc_get_keyform_mode(tmpl, CKM_IBM_DILITHIUM);
971d89
+    if (oid == NULL)
971d89
+       return CKR_TEMPLATE_INCOMPLETE;
971d89
 
971d89
     rc = template_attribute_get_non_empty(tmpl, CKA_IBM_DILITHIUM_RHO, &rho);
971d89
     if (rc != CKR_OK) {
971d89
@@ -2690,8 +2792,7 @@ CK_RV ibm_dilithium_publ_get_spki(TEMPLATE *tmpl, CK_BBOOL length_only,
971d89
     }
971d89
 
971d89
     rc = ber_encode_IBM_DilithiumPublicKey(length_only, data, data_len,
971d89
-                                           dilithium_r2_65,
971d89
-                                           dilithium_r2_65_len,
971d89
+                                           oid->oid, oid->oid_len,
971d89
                                            rho, t1);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("ber_encode_IBM_DilithiumPublicKey failed.\n");
971d89
@@ -2709,23 +2810,12 @@ CK_RV ibm_dilithium_priv_wrap_get_data(TEMPLATE *tmpl,
971d89
     CK_ATTRIBUTE *rho = NULL, *seed = NULL;
971d89
     CK_ATTRIBUTE *tr = NULL, *s1 = NULL, *s2 = NULL;
971d89
     CK_ATTRIBUTE *t0 = NULL, *t1 = NULL;
971d89
-    CK_ULONG keyform;
971d89
+    const struct pqc_oid *oid;
971d89
     CK_RV rc;
971d89
 
971d89
-    /* A private Dilithium key must have a keyform value */
971d89
-    rc = template_attribute_get_ulong(tmpl, CKA_IBM_DILITHIUM_KEYFORM,
971d89
-                                      &keyform);
971d89
-    if (rc != CKR_OK) {
971d89
-        TRACE_ERROR("Could not find CKA_IBM_DILITHIUM_KEYFORM for the key.\n");
971d89
-        return rc;
971d89
-    }
971d89
-
971d89
-    /* Check if it's an expected keyform */
971d89
-    if (keyform != IBM_DILITHIUM_KEYFORM_ROUND2) {
971d89
-        TRACE_ERROR("This key has an unexpected CKA_IBM_DILITHIUM_KEYFORM: %ld\n",
971d89
-                    keyform);
971d89
-        return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-    }
971d89
+    oid = ibm_pqc_get_keyform_mode(tmpl, CKM_IBM_DILITHIUM);
971d89
+    if (oid == NULL)
971d89
+       return CKR_TEMPLATE_INCOMPLETE;
971d89
 
971d89
     rc = template_attribute_get_non_empty(tmpl, CKA_IBM_DILITHIUM_RHO, &rho);
971d89
     if (rc != CKR_OK) {
971d89
@@ -2770,8 +2860,7 @@ CK_RV ibm_dilithium_priv_wrap_get_data(TEMPLATE *tmpl,
971d89
     }
971d89
 
971d89
     rc = ber_encode_IBM_DilithiumPrivateKey(length_only, data, data_len,
971d89
-                                            dilithium_r2_65,
971d89
-                                            dilithium_r2_65_len,
971d89
+                                            oid->oid, oid->oid_len,
971d89
                                             rho, seed, tr, s1, s2, t0, t1);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_DEVEL("ber_encode_IBM_DilithiumPrivateKey failed\n");
971d89
@@ -2787,15 +2876,22 @@ CK_RV ibm_dilithium_priv_unwrap_get_data(TEMPLATE *tmpl, CK_BYTE *data,
971d89
     CK_ATTRIBUTE *rho = NULL;
971d89
     CK_ATTRIBUTE *t1 = NULL;
971d89
     CK_ATTRIBUTE *value = NULL;
971d89
+    const struct pqc_oid *oid;
971d89
     CK_RV rc;
971d89
 
971d89
     rc = ber_decode_IBM_DilithiumPublicKey(data, total_length, &rho, &t1,
971d89
-                                           &value);
971d89
+                                           &value, &oid;;
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("ber_decode_DilithiumPublicKey failed\n");
971d89
         return rc;
971d89
     }
971d89
 
971d89
+    rc = ibm_pqc_add_keyform_mode(tmpl, oid, CKM_IBM_DILITHIUM);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_ERROR("ibm_pqc_add_keyform_mode failed\n");
971d89
+        return rc;
971d89
+    }
971d89
+
971d89
     rc = template_update_attribute(tmpl, rho);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_DEVEL("template_update_attribute failed.\n");
971d89
@@ -2839,16 +2935,23 @@ CK_RV ibm_dilithium_priv_unwrap(TEMPLATE *tmpl, CK_BYTE *data,
971d89
 {
971d89
     CK_ATTRIBUTE *rho = NULL, *seed = NULL, *tr = NULL, *value = NULL;
971d89
     CK_ATTRIBUTE *s1 = NULL, *s2 = NULL, *t0 = NULL, *t1 = NULL;
971d89
+    const struct pqc_oid *oid;
971d89
     CK_RV rc;
971d89
 
971d89
     rc = ber_decode_IBM_DilithiumPrivateKey(data, total_length,
971d89
                                             &rho, &seed, &tr, &s1, &s2, &t0,
971d89
-                                            &t1, &value);
971d89
+                                            &t1, &value, &oid;;
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("der_decode_IBM_DilithiumPrivateKey failed\n");
971d89
         return rc;
971d89
     }
971d89
 
971d89
+    rc = ibm_pqc_add_keyform_mode(tmpl, oid, CKM_IBM_DILITHIUM);
971d89
+    if (rc != CKR_OK) {
971d89
+        TRACE_ERROR("ibm_pqc_add_keyform_mode failed\n");
971d89
+        return rc;
971d89
+    }
971d89
+
971d89
     rc = template_update_attribute(tmpl, rho);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("template_update_attribute failed\n");
971d89
@@ -4660,19 +4763,17 @@ CK_RV ibm_dilithium_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
     CK_ATTRIBUTE *type_attr = NULL;
971d89
     CK_ATTRIBUTE *rho_attr = NULL;
971d89
     CK_ATTRIBUTE *t1_attr = NULL;
971d89
-    CK_ATTRIBUTE *keyform_attr = NULL;
971d89
     CK_ATTRIBUTE *value_attr = NULL;
971d89
     CK_RV rc;
971d89
 
971d89
     publ_key_set_default_attributes(tmpl, mode);
971d89
 
971d89
     type_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE) + sizeof(CK_KEY_TYPE));
971d89
-    keyform_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE) + sizeof(CK_ULONG));
971d89
     rho_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
     t1_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
     value_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
 
971d89
-    if (!type_attr || !rho_attr || !t1_attr || !keyform_attr || !value_attr) {
971d89
+    if (!type_attr || !rho_attr || !t1_attr || !value_attr) {
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_HOST_MEMORY));
971d89
         rc = CKR_HOST_MEMORY;
971d89
         goto error;
971d89
@@ -4683,11 +4784,6 @@ CK_RV ibm_dilithium_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
     type_attr->pValue = (CK_BYTE *) type_attr + sizeof(CK_ATTRIBUTE);
971d89
     *(CK_KEY_TYPE *) type_attr->pValue = CKK_IBM_PQC_DILITHIUM;
971d89
 
971d89
-    keyform_attr->type = CKA_IBM_DILITHIUM_KEYFORM;
971d89
-    keyform_attr->ulValueLen = sizeof(CK_ULONG);
971d89
-    keyform_attr->pValue = (CK_BYTE *) keyform_attr + sizeof(CK_ATTRIBUTE);
971d89
-    *(CK_ULONG *) keyform_attr->pValue = IBM_DILITHIUM_KEYFORM_ROUND2;
971d89
-
971d89
     rho_attr->type = CKA_IBM_DILITHIUM_RHO;
971d89
     rho_attr->ulValueLen = 0;
971d89
     rho_attr->pValue = NULL;
971d89
@@ -4718,12 +4814,6 @@ CK_RV ibm_dilithium_publ_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
         goto error;
971d89
     }
971d89
     t1_attr = NULL;
971d89
-    rc = template_update_attribute(tmpl, keyform_attr);
971d89
-    if (rc != CKR_OK) {
971d89
-        TRACE_ERROR("template_update_attribute failed\n");
971d89
-        goto error;
971d89
-    }
971d89
-    keyform_attr = NULL;
971d89
     rc = template_update_attribute(tmpl, value_attr);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("template_update_attribute failed\n");
971d89
@@ -4740,8 +4830,6 @@ error:
971d89
         free(rho_attr);
971d89
     if (t1_attr)
971d89
         free(t1_attr);
971d89
-    if (keyform_attr)
971d89
-        free(keyform_attr);
971d89
     if (value_attr)
971d89
         free(value_attr);
971d89
 
971d89
@@ -4760,14 +4848,12 @@ CK_RV ibm_dilithium_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
     CK_ATTRIBUTE *s2_attr = NULL;
971d89
     CK_ATTRIBUTE *t0_attr = NULL;
971d89
     CK_ATTRIBUTE *t1_attr = NULL;
971d89
-    CK_ATTRIBUTE *keyform_attr = NULL;
971d89
     CK_ATTRIBUTE *value_attr = NULL;
971d89
     CK_RV rc;
971d89
 
971d89
     priv_key_set_default_attributes(tmpl, mode);
971d89
 
971d89
     type_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE) + sizeof(CK_KEY_TYPE));
971d89
-    keyform_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE) + sizeof(CK_ULONG));
971d89
     rho_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
     seed_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
     tr_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
@@ -4778,7 +4864,7 @@ CK_RV ibm_dilithium_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
     value_attr = (CK_ATTRIBUTE *) malloc(sizeof(CK_ATTRIBUTE));
971d89
 
971d89
     if (!type_attr || !rho_attr || !seed_attr || !tr_attr || !s1_attr
971d89
-        || !s2_attr || !t0_attr || !t1_attr || !keyform_attr || !value_attr) {
971d89
+        || !s2_attr || !t0_attr || !t1_attr || !value_attr) {
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_HOST_MEMORY));
971d89
         rc = CKR_HOST_MEMORY;
971d89
         goto error;
971d89
@@ -4789,11 +4875,6 @@ CK_RV ibm_dilithium_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
     type_attr->pValue = (CK_BYTE *) type_attr + sizeof(CK_ATTRIBUTE);
971d89
     *(CK_KEY_TYPE *) type_attr->pValue = CKK_IBM_PQC_DILITHIUM;
971d89
 
971d89
-    keyform_attr->type = CKA_IBM_DILITHIUM_KEYFORM;
971d89
-    keyform_attr->ulValueLen = sizeof(CK_ULONG);
971d89
-    keyform_attr->pValue = (CK_BYTE *) keyform_attr + sizeof(CK_ATTRIBUTE);
971d89
-    *(CK_ULONG *) keyform_attr->pValue = IBM_DILITHIUM_KEYFORM_ROUND2;
971d89
-
971d89
     rho_attr->type = CKA_IBM_DILITHIUM_RHO;
971d89
     rho_attr->ulValueLen = 0;
971d89
     rho_attr->pValue = NULL;
971d89
@@ -4832,12 +4913,6 @@ CK_RV ibm_dilithium_priv_set_default_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
         goto error;
971d89
     }
971d89
     type_attr = NULL;
971d89
-    rc = template_update_attribute(tmpl, keyform_attr);
971d89
-    if (rc != CKR_OK) {
971d89
-        TRACE_ERROR("template_update_attribute failed\n");
971d89
-        goto error;
971d89
-    }
971d89
-    keyform_attr = NULL;
971d89
     rc = template_update_attribute(tmpl, rho_attr);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("template_update_attribute failed\n");
971d89
@@ -4906,38 +4981,59 @@ error:
971d89
         free(t0_attr);
971d89
     if (t1_attr)
971d89
         free(t1_attr);
971d89
-    if (keyform_attr)
971d89
-        free(keyform_attr);
971d89
     if (value_attr)
971d89
         free(value_attr);
971d89
 
971d89
     return rc;
971d89
 }
971d89
 
971d89
-// ibm_dilithium_publ_check_required_attributes()
971d89
-//
971d89
-CK_RV ibm_dilithium_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
+static CK_RV ibm_pqc_check_attributes(TEMPLATE *tmpl, CK_ULONG mode,
971d89
+                                      CK_MECHANISM_TYPE mech,
971d89
+                                      CK_ULONG *req_attrs,
971d89
+                                      CK_ULONG num_req_attrs)
971d89
 {
971d89
+    CK_ATTRIBUTE_TYPE keyform_attr;
971d89
+    CK_ATTRIBUTE_TYPE mode_attr;
971d89
     CK_ATTRIBUTE *attr = NULL;
971d89
-    static CK_ULONG req_attrs[] = {
971d89
-        CKA_IBM_DILITHIUM_KEYFORM,
971d89
-        CKA_IBM_DILITHIUM_RHO,
971d89
-        CKA_IBM_DILITHIUM_T1,
971d89
-    };
971d89
+    CK_BBOOL keyform_present = FALSE;
971d89
+    CK_BBOOL mode_present = FALSE;
971d89
+    const struct pqc_oid *oids, *oid;
971d89
     CK_ULONG i;
971d89
     CK_RV rc;
971d89
 
971d89
+    if (ibm_pqc_keyform_mode_attrs_by_mech(mech, &keyform_attr,
971d89
+                                           &mode_attr, &oids) != CKR_OK)
971d89
+        return CKR_MECHANISM_INVALID;
971d89
+
971d89
+    if (template_attribute_find(tmpl, keyform_attr, &attr) &&
971d89
+        attr->ulValueLen == sizeof(CK_ULONG) && attr->pValue != NULL) {
971d89
+        oid = find_pqc_by_keyform(oids, *(CK_ULONG *)(attr->pValue));
971d89
+        if (oid == NULL) {
971d89
+            TRACE_ERROR("%s, attribute KEYFORM has an unsupported value.\n",
971d89
+                        ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+            return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
+        }
971d89
+        keyform_present = TRUE;
971d89
+    }
971d89
+
971d89
+    if (template_attribute_find(tmpl, mode_attr, &attr) &&
971d89
+        attr->ulValueLen > 0 && attr->pValue != NULL) {
971d89
+        oid = find_pqc_by_oid(oids, attr->pValue, attr->ulValueLen);
971d89
+        if (oid == NULL) {
971d89
+            TRACE_ERROR("%s, attribute MODE has an unsupported value.\n",
971d89
+                        ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+            return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
+        }
971d89
+        mode_present = TRUE;
971d89
+    }
971d89
+
971d89
     switch (mode) {
971d89
-    case MODE_KEYGEN:
971d89
-    case MODE_UNWRAP:
971d89
-        /* Attrs will be added during keygen/unwrap */
971d89
-        break;
971d89
     case MODE_CREATE:
971d89
         /* Either CKA_VALUE or all other attrs must be present */
971d89
         if (template_attribute_find(tmpl, CKA_VALUE, &attr) &&
971d89
             attr->ulValueLen > 0 && attr->pValue != NULL)
971d89
             break;
971d89
-        for (i = 0; i < sizeof(req_attrs) / sizeof(req_attrs[0]); i++) {
971d89
+        for (i = 0; i < num_req_attrs; i++) {
971d89
             rc = template_attribute_get_non_empty(tmpl, req_attrs[i], &attr);
971d89
             if (rc != CKR_OK) {
971d89
                 if (rc != CKR_ATTRIBUTE_VALUE_INVALID)
971d89
@@ -4946,27 +5042,58 @@ CK_RV ibm_dilithium_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode
971d89
                 return rc;
971d89
             }
971d89
         }
971d89
+        /* fallthrough */
971d89
+    case MODE_KEYGEN:
971d89
+        /* Either keyform or mode or none of it must be present */
971d89
+        if (keyform_present && mode_present) {
971d89
+            TRACE_ERROR("%s, only one of KEYFORM or MODE can be specified .\n",
971d89
+                        ock_err(ERR_TEMPLATE_INCONSISTENT));
971d89
+            return CKR_TEMPLATE_INCONSISTENT;
971d89
+        }
971d89
+        break;
971d89
+    case MODE_UNWRAP:
971d89
+        /* neither keyform or mode must be present */
971d89
+        if (keyform_present || mode_present) {
971d89
+            TRACE_ERROR("%s, none of KEYFORM or MODE can be specified .\n",
971d89
+                        ock_err(ERR_TEMPLATE_INCONSISTENT));
971d89
+            return CKR_TEMPLATE_INCONSISTENT;
971d89
+        }
971d89
         break;
971d89
     case MODE_COPY:
971d89
-        /* CKA_VALUE and all other attrs must be present */
971d89
-        if (!template_attribute_find(tmpl, CKA_VALUE, &attr) &&
971d89
-            attr->ulValueLen > 0 && attr->pValue != NULL) {
971d89
-            TRACE_ERROR("%s, attribute CKA_VALUE missing.\n",
971d89
+        /* All attributes must be present */
971d89
+        if (!keyform_present || !mode_present) {
971d89
+            TRACE_ERROR("%s, KEYFORM or MODE must be specified .\n",
971d89
                         ock_err(ERR_TEMPLATE_INCOMPLETE));
971d89
             return CKR_TEMPLATE_INCOMPLETE;
971d89
         }
971d89
-        for (i = 0; i < sizeof(req_attrs) / sizeof(req_attrs[0]); i++) {
971d89
-            rc = template_attribute_get_non_empty(tmpl, req_attrs[i], &attr);
971d89
-            if (rc != CKR_OK) {
971d89
-                if (rc != CKR_ATTRIBUTE_VALUE_INVALID)
971d89
-                    TRACE_ERROR("%s, attribute %08lX missing.\n",
971d89
-                               ock_err(ERR_TEMPLATE_INCOMPLETE), req_attrs[i]);
971d89
-                return rc;
971d89
+        for (i = 0; i < num_req_attrs; i++) {
971d89
+            if (!template_attribute_find(tmpl, req_attrs[i], &attr)) {
971d89
+                TRACE_ERROR("%s, attribute %08lX missing.\n",
971d89
+                            ock_err(ERR_TEMPLATE_INCOMPLETE), req_attrs[i]);
971d89
+                return CKR_TEMPLATE_INCOMPLETE;
971d89
             }
971d89
         }
971d89
         break;
971d89
     }
971d89
 
971d89
+    return CKR_OK;
971d89
+}
971d89
+
971d89
+// ibm_dilithium_publ_check_required_attributes()
971d89
+//
971d89
+CK_RV ibm_dilithium_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
+{
971d89
+    static CK_ULONG req_attrs[] = {
971d89
+        CKA_IBM_DILITHIUM_RHO,
971d89
+        CKA_IBM_DILITHIUM_T1,
971d89
+    };
971d89
+    CK_RV rc;
971d89
+
971d89
+    rc = ibm_pqc_check_attributes(tmpl, mode, CKM_IBM_DILITHIUM, req_attrs,
971d89
+                                  sizeof(req_attrs) / sizeof(req_attrs[0]));
971d89
+    if (rc != CKR_OK)
971d89
+        return rc;
971d89
+
971d89
     /* All required attrs found, check them */
971d89
     return publ_key_check_required_attributes(tmpl, mode);
971d89
 }
971d89
@@ -4975,9 +5102,7 @@ CK_RV ibm_dilithium_publ_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode
971d89
 //
971d89
 CK_RV ibm_dilithium_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode)
971d89
 {
971d89
-    CK_ATTRIBUTE *attr = NULL;
971d89
     static CK_ULONG req_attrs[] = {
971d89
-        CKA_IBM_DILITHIUM_KEYFORM,
971d89
         CKA_IBM_DILITHIUM_RHO,
971d89
         CKA_IBM_DILITHIUM_SEED,
971d89
         CKA_IBM_DILITHIUM_TR,
971d89
@@ -4986,52 +5111,62 @@ CK_RV ibm_dilithium_priv_check_required_attributes(TEMPLATE *tmpl, CK_ULONG mode
971d89
         CKA_IBM_DILITHIUM_T0,
971d89
         CKA_IBM_DILITHIUM_T1,
971d89
     };
971d89
-    CK_ULONG i;
971d89
     CK_RV rc;
971d89
 
971d89
-    switch (mode) {
971d89
-    case MODE_KEYGEN:
971d89
-    case MODE_UNWRAP:
971d89
-        /* Attrs will be added during keygen/unwrap */
971d89
-        break;
971d89
-    case MODE_CREATE:
971d89
-        /* Either CKA_VALUE or all other attrs must be present */
971d89
-        if (template_attribute_find(tmpl, CKA_VALUE, &attr) &&
971d89
-            attr->ulValueLen > 0 && attr->pValue != NULL)
971d89
-            break;
971d89
-        for (i = 0; i < sizeof(req_attrs) / sizeof(req_attrs[0]); i++) {
971d89
-            rc = template_attribute_get_non_empty(tmpl, req_attrs[i], &attr);
971d89
-            if (rc != CKR_OK) {
971d89
-                if (rc != CKR_ATTRIBUTE_VALUE_INVALID)
971d89
-                    TRACE_ERROR("%s, attribute %08lX missing.\n",
971d89
-                               ock_err(ERR_TEMPLATE_INCOMPLETE), req_attrs[i]);
971d89
-                return rc;
971d89
-            }
971d89
-        }
971d89
-        break;
971d89
-    case MODE_COPY:
971d89
-        /* CKA_VALUE and all other attrs must be present */
971d89
-        if (!template_attribute_find(tmpl, CKA_VALUE, &attr) &&
971d89
-            attr->ulValueLen > 0 && attr->pValue != NULL) {
971d89
-            TRACE_ERROR("%s, attribute CKA_VALUE missing.\n",
971d89
-                        ock_err(ERR_TEMPLATE_INCOMPLETE));
971d89
-            return CKR_TEMPLATE_INCOMPLETE;
971d89
+    rc = ibm_pqc_check_attributes(tmpl, mode, CKM_IBM_DILITHIUM, req_attrs,
971d89
+                                  sizeof(req_attrs) / sizeof(req_attrs[0]));
971d89
+    if (rc != CKR_OK)
971d89
+        return rc;
971d89
+
971d89
+    /* All required attrs found, check them */
971d89
+    return priv_key_check_required_attributes(tmpl, mode);
971d89
+}
971d89
+
971d89
+static CK_RV ibm_pqc_validate_keyform_mode(CK_ATTRIBUTE *attr, CK_ULONG mode,
971d89
+                                           CK_MECHANISM_TYPE mech)
971d89
+{
971d89
+    CK_ATTRIBUTE_TYPE keyform_attr;
971d89
+    CK_ATTRIBUTE_TYPE mode_attr;
971d89
+    const struct pqc_oid *oids, *oid;
971d89
 
971d89
+    if (ibm_pqc_keyform_mode_attrs_by_mech(mech, &keyform_attr,
971d89
+                                           &mode_attr, &oids) != CKR_OK)
971d89
+        return CKR_MECHANISM_INVALID;
971d89
+
971d89
+    if (attr->type == keyform_attr) {
971d89
+        if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
971d89
+            if (attr->ulValueLen != sizeof(CK_ULONG) || attr->pValue == NULL) {
971d89
+                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
+            }
971d89
+            oid = find_pqc_by_keyform(oids, *((CK_ULONG *)attr->pValue));
971d89
+            if (oid == NULL) {
971d89
+                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
+            }
971d89
+            return CKR_OK;
971d89
         }
971d89
-        for (i = 0; i < sizeof(req_attrs) / sizeof(req_attrs[0]); i++) {
971d89
-            rc = template_attribute_get_non_empty(tmpl, req_attrs[i], &attr);
971d89
-            if (rc != CKR_OK) {
971d89
-                if (rc != CKR_ATTRIBUTE_VALUE_INVALID)
971d89
-                    TRACE_ERROR("%s, attribute %08lX missing.\n",
971d89
-                               ock_err(ERR_TEMPLATE_INCOMPLETE), req_attrs[i]);
971d89
-                return rc;
971d89
+        TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
+        return CKR_ATTRIBUTE_READ_ONLY;
971d89
+    }
971d89
+    if (attr->type == mode_attr) {
971d89
+        if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
971d89
+            if (attr->ulValueLen == 0 || attr->pValue == NULL) {
971d89
+                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
+            }
971d89
+            oid = find_pqc_by_oid(oids, attr->pValue, attr->ulValueLen);
971d89
+            if (oid == NULL) {
971d89
+                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
+                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
             }
971d89
+            return CKR_OK;
971d89
         }
971d89
-        break;
971d89
+        TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
+        return CKR_ATTRIBUTE_READ_ONLY;
971d89
     }
971d89
 
971d89
-    /* All required attrs found, check them */
971d89
-    return priv_key_check_required_attributes(tmpl, mode);
971d89
+    return CKR_OK;
971d89
 }
971d89
 
971d89
 // ibm_dilithium_publ_validate_attribute()
971d89
@@ -5040,7 +5175,15 @@ CK_RV ibm_dilithium_publ_validate_attribute(STDLL_TokData_t *tokdata,
971d89
                                             TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
971d89
                                             CK_ULONG mode)
971d89
 {
971d89
+    CK_RV rc;
971d89
+
971d89
     switch (attr->type) {
971d89
+    case CKA_IBM_DILITHIUM_KEYFORM:
971d89
+    case CKA_IBM_DILITHIUM_MODE:
971d89
+        rc = ibm_pqc_validate_keyform_mode(attr, mode, CKM_IBM_DILITHIUM);
971d89
+        if (rc != CKR_OK)
971d89
+            return rc;
971d89
+        return CKR_OK;
971d89
     case CKA_IBM_DILITHIUM_RHO:
971d89
     case CKA_IBM_DILITHIUM_T1:
971d89
     case CKA_VALUE:
971d89
@@ -5048,22 +5191,6 @@ CK_RV ibm_dilithium_publ_validate_attribute(STDLL_TokData_t *tokdata,
971d89
             return CKR_OK;
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
         return CKR_ATTRIBUTE_READ_ONLY;
971d89
-    case CKA_IBM_DILITHIUM_KEYFORM:
971d89
-        if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
971d89
-            if (attr->ulValueLen != sizeof(CK_ULONG) || attr->pValue == NULL) {
971d89
-                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
-                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-            }
971d89
-            switch (*((CK_ULONG *)attr->pValue)) {
971d89
-            case IBM_DILITHIUM_KEYFORM_ROUND2:
971d89
-                return CKR_OK;
971d89
-            default:
971d89
-                TRACE_ERROR("%s\n", ock_err(CKR_ATTRIBUTE_VALUE_INVALID));
971d89
-                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-            }
971d89
-        }
971d89
-        TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
-        return CKR_ATTRIBUTE_READ_ONLY;
971d89
     default:
971d89
         return publ_key_validate_attribute(tokdata, tmpl, attr, mode);
971d89
     }
971d89
@@ -5075,7 +5202,15 @@ CK_RV ibm_dilithium_priv_validate_attribute(STDLL_TokData_t *tokdata,
971d89
                                             TEMPLATE *tmpl, CK_ATTRIBUTE *attr,
971d89
                                             CK_ULONG mode)
971d89
 {
971d89
+    CK_RV rc;
971d89
+
971d89
     switch (attr->type) {
971d89
+    case CKA_IBM_DILITHIUM_KEYFORM:
971d89
+    case CKA_IBM_DILITHIUM_MODE:
971d89
+        rc = ibm_pqc_validate_keyform_mode(attr, mode, CKM_IBM_DILITHIUM);
971d89
+        if (rc != CKR_OK)
971d89
+            return rc;
971d89
+        return CKR_OK;
971d89
     case CKA_IBM_DILITHIUM_RHO:
971d89
     case CKA_IBM_DILITHIUM_SEED:
971d89
     case CKA_IBM_DILITHIUM_TR:
971d89
@@ -5088,22 +5223,6 @@ CK_RV ibm_dilithium_priv_validate_attribute(STDLL_TokData_t *tokdata,
971d89
             return CKR_OK;
971d89
         TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
         return CKR_ATTRIBUTE_READ_ONLY;
971d89
-    case CKA_IBM_DILITHIUM_KEYFORM:
971d89
-        if (mode == MODE_CREATE || mode == MODE_KEYGEN) {
971d89
-            if (attr->ulValueLen != sizeof(CK_ULONG) || attr->pValue == NULL) {
971d89
-                TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_VALUE_INVALID));
971d89
-                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-            }
971d89
-            switch (*((CK_ULONG *)attr->pValue)) {
971d89
-            case IBM_DILITHIUM_KEYFORM_ROUND2:
971d89
-                return CKR_OK;
971d89
-            default:
971d89
-                TRACE_ERROR("%s\n", ock_err(CKR_ATTRIBUTE_VALUE_INVALID));
971d89
-                return CKR_ATTRIBUTE_VALUE_INVALID;
971d89
-            }
971d89
-        }
971d89
-        TRACE_ERROR("%s\n", ock_err(ERR_ATTRIBUTE_READ_ONLY));
971d89
-        return CKR_ATTRIBUTE_READ_ONLY;
971d89
     default:
971d89
         return priv_key_validate_attribute(tokdata, tmpl, attr, mode);
971d89
     }
971d89
diff --git a/usr/lib/ep11_stdll/ep11_specific.c b/usr/lib/ep11_stdll/ep11_specific.c
971d89
index 9221b8cd..c440cac5 100644
971d89
--- a/usr/lib/ep11_stdll/ep11_specific.c
971d89
+++ b/usr/lib/ep11_stdll/ep11_specific.c
971d89
@@ -158,8 +158,8 @@ const char label[] = "ep11tok";
971d89
 #define MAX_CSUMSIZE 64
971d89
 #define EP11_CSUMSIZE 3
971d89
 #define MAX_DIGEST_STATE_BYTES 1024
971d89
-#define MAX_CRYPT_STATE_BYTES 8192
971d89
-#define MAX_SIGN_STATE_BYTES 8192
971d89
+#define MAX_CRYPT_STATE_BYTES 12288
971d89
+#define MAX_SIGN_STATE_BYTES 12288
971d89
 #define MAX_APQN 256
971d89
 #define EP11_BLOB_WKID_OFFSET 32
971d89
 
971d89
@@ -1937,7 +1937,9 @@ static CK_BBOOL attr_applicable_for_ep11(STDLL_TokData_t * tokdata,
971d89
     case CKK_IBM_PQC_DILITHIUM:
971d89
         if (attr->type == CKA_ENCRYPT || attr->type == CKA_DECRYPT ||
971d89
             attr->type == CKA_WRAP || attr->type == CKA_UNWRAP ||
971d89
-            attr->type == CKA_DERIVE)
971d89
+            attr->type == CKA_DERIVE || 
971d89
+            attr->type == CKA_IBM_DILITHIUM_KEYFORM ||
971d89
+            attr->type == CKA_IBM_DILITHIUM_MODE)
971d89
             return CK_FALSE;
971d89
         break;
971d89
     default:
971d89
@@ -3587,6 +3589,7 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
     ep11_session_t *ep11_session = (ep11_session_t *) sess->private_data;
971d89
     CK_ATTRIBUTE *value_attr = NULL;
971d89
     CK_BBOOL data_alloced = TRUE;
971d89
+    const struct pqc_oid *oid;
971d89
 
971d89
     memcpy(iv, "1234567812345678", AES_BLOCK_SIZE);
971d89
 
971d89
@@ -3611,7 +3614,8 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
         /* Make an SPKI for the public IBM Dilithium key */
971d89
 
971d89
         /* A public IBM Dilithium key must either have a CKA_VALUE containing
971d89
-         * the SPKI, or must have a keyform value and the individual attributes
971d89
+         * the SPKI, or must have a keyform/mode value and the individual
971d89
+         * attributes
971d89
          */
971d89
         if (template_attribute_find(dilithium_key_obj->template,
971d89
                                     CKA_VALUE, &value_attr) &&
971d89
@@ -3621,7 +3625,10 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
             data_len = value_attr->ulValueLen;
971d89
             data_alloced = FALSE;
971d89
 
971d89
-            /* Decode SPKI and add public key attributes */
971d89
+            /*
971d89
+             * Decode SPKI and add public key attributes. This also adds the
971d89
+             * keyform and mode attributes to the template.
971d89
+             */
971d89
             rc = ibm_dilithium_priv_unwrap_get_data(dilithium_key_obj->template,
971d89
                                                     data, data_len, FALSE);
971d89
             if (rc != CKR_OK) {
971d89
@@ -3641,6 +3648,21 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
                            "data_len=0x%lx\n", __func__, class, rc, data_len);
971d89
             }
971d89
 
971d89
+            /* Ensure both, keyform and mode attributes are added */
971d89
+            oid = ibm_pqc_get_keyform_mode(dilithium_key_obj->template,
971d89
+                                           CKM_IBM_DILITHIUM);
971d89
+            if (oid == NULL) {
971d89
+                rc = CKR_TEMPLATE_INCOMPLETE;
971d89
+                goto done;
971d89
+            }
971d89
+
971d89
+            rc = ibm_pqc_add_keyform_mode(dilithium_key_obj->template,
971d89
+                                          oid, CKM_IBM_DILITHIUM);
971d89
+            if (rc != CKR_OK) {
971d89
+                TRACE_ERROR("ibm_pqc_add_keyform_mode failed\n");
971d89
+                goto done;
971d89
+            }
971d89
+
971d89
             /* Add SPKI as CKA_VALUE to public key (z/OS ICSF compatibility) */
971d89
             rc = build_attribute(CKA_VALUE, data, data_len, &value_attr);
971d89
             if (rc != CKR_OK) {
971d89
@@ -3677,8 +3699,8 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
         /* imported private IBM Dilithium key goes here */
971d89
 
971d89
         /* A public IBM Dilithium key must either have a CKA_VALUE containing
971d89
-         * the PKCS#8 encoded private key, or must have a keyform value and the
971d89
-         * individual attributes
971d89
+         * the PKCS#8 encoded private key, or must have a keyform/mode value
971d89
+         * and the individual attributes
971d89
          */
971d89
         if (template_attribute_find(dilithium_key_obj->template,
971d89
                                     CKA_VALUE, &value_attr) &&
971d89
@@ -3696,8 +3718,9 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
                 goto done;
971d89
             }
971d89
         } else {
971d89
-            /* extract the secret data to be wrapped
971d89
-             * since this is AES_CBC_PAD, padding is done in mechanism.
971d89
+            /* Extract the secret data to be wrapped since this is AES_CBC_PAD,
971d89
+             * padding is done in mechanism. This also adds the keyform and mode
971d89
+             * attributes to the template.
971d89
              */
971d89
             rc = ibm_dilithium_priv_wrap_get_data(dilithium_key_obj->template,
971d89
                                                   FALSE, &data, &data_len);
971d89
@@ -3705,6 +3728,21 @@ static CK_RV import_IBM_Dilithium_key(STDLL_TokData_t *tokdata, SESSION *sess,
971d89
                 TRACE_DEVEL("%s Dilithium wrap get data failed\n", __func__);
971d89
                 goto done;
971d89
             }
971d89
+
971d89
+            /* Ensure both, keyform and mode attributes are added */
971d89
+            oid = ibm_pqc_get_keyform_mode(dilithium_key_obj->template,
971d89
+                                           CKM_IBM_DILITHIUM);
971d89
+            if (oid == NULL) {
971d89
+                rc = CKR_TEMPLATE_INCOMPLETE;
971d89
+                goto done;
971d89
+            }
971d89
+
971d89
+            rc = ibm_pqc_add_keyform_mode(dilithium_key_obj->template,
971d89
+                                          oid, CKM_IBM_DILITHIUM);
971d89
+            if (rc != CKR_OK) {
971d89
+                TRACE_ERROR("ibm_pqc_add_keyform_mode failed\n");
971d89
+                goto done;
971d89
+            }
971d89
         }
971d89
 
971d89
         /* encrypt */
971d89
@@ -6456,8 +6494,7 @@ static CK_RV ibm_dilithium_generate_keypair(STDLL_TokData_t *tokdata,
971d89
     CK_ULONG new_publ_attrs_len = 0, new_priv_attrs_len = 0;
971d89
     CK_ATTRIBUTE *new_publ_attrs2 = NULL, *new_priv_attrs2 = NULL;
971d89
     CK_ULONG new_publ_attrs2_len = 0, new_priv_attrs2_len = 0;
971d89
-    const CK_BYTE dilithium_oid[] = { 0x06, 0x0b, 0x2b, 0x06, 0x01, 0x04, 0x01,
971d89
-                                      0x02, 0x82, 0x0b, 0x01, 0x06, 0x05 };
971d89
+    const struct pqc_oid *dilithium_oid;
971d89
 
971d89
     if (pMechanism->mechanism != CKM_IBM_DILITHIUM) {
971d89
         TRACE_ERROR("Invalid mechanism provided for %s\n ", __func__);
971d89
@@ -6480,9 +6517,25 @@ static CK_RV ibm_dilithium_generate_keypair(STDLL_TokData_t *tokdata,
971d89
         goto error;
971d89
     }
971d89
 
971d89
+    dilithium_oid = ibm_pqc_get_keyform_mode(publ_tmpl, CKM_IBM_DILITHIUM);
971d89
+    if (dilithium_oid == NULL)
971d89
+        dilithium_oid = ibm_pqc_get_keyform_mode(priv_tmpl, CKM_IBM_DILITHIUM);
971d89
+    if (dilithium_oid == NULL)
971d89
+        dilithium_oid = find_pqc_by_keyform(dilithium_oids,
971d89
+                                            CK_IBM_DILITHIUM_KEYFORM_ROUND2_65);
971d89
+    if (dilithium_oid == NULL) {
971d89
+        TRACE_ERROR("%s Failed to determine Dilithium OID\n", __func__);
971d89
+        rc = CKR_FUNCTION_FAILED;
971d89
+        goto error;
971d89
+    }
971d89
+
971d89
+    TRACE_INFO("%s Generate Dilithium key with keyform %lu\n", __func__,
971d89
+               dilithium_oid->keyform);
971d89
+
971d89
     rc = add_to_attribute_array(&new_publ_attrs, &new_publ_attrs_len,
971d89
-                                CKA_IBM_PQC_PARAMS, (CK_BYTE *)dilithium_oid,
971d89
-                                sizeof(dilithium_oid));
971d89
+                                CKA_IBM_PQC_PARAMS,
971d89
+                                (CK_BYTE *)dilithium_oid->oid,
971d89
+                                dilithium_oid->oid_len);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("%s add_to_attribute_array failed with rc=0x%lx\n",
971d89
                     __func__, rc);
971d89
@@ -6490,8 +6543,9 @@ static CK_RV ibm_dilithium_generate_keypair(STDLL_TokData_t *tokdata,
971d89
     }
971d89
 
971d89
     rc = add_to_attribute_array(&new_priv_attrs, &new_priv_attrs_len,
971d89
-                                CKA_IBM_PQC_PARAMS,(CK_BYTE *)dilithium_oid,
971d89
-                                sizeof(dilithium_oid));
971d89
+                                CKA_IBM_PQC_PARAMS,
971d89
+                                (CK_BYTE *)dilithium_oid->oid,
971d89
+                                dilithium_oid->oid_len);
971d89
     if (rc != CKR_OK) {
971d89
         TRACE_ERROR("%s add_to_attribute_array failed with rc=0x%lx\n",
971d89
                     __func__, rc);
971d89
-- 
971d89
2.16.2.windows.1
971d89