openssl/test/recipes/15-test_ml_dsa_codecs.t
Jon Spillett 58d548d84e Use text compare for PEM and text files
- Fix ml_dsa_codecs test
- Fix ml_kem_codecs test
- Fix pkey test
- Fix dsaparam test
- Fix dhparam test
- Fix pkcs8 test

Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Shane Lontis <shane.lontis@oracle.com>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27082)
2025-03-19 11:48:49 +01:00

214 lines
9.4 KiB
Perl

#! /usr/bin/env perl
# Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
use strict;
use warnings;
use File::Spec;
use File::Copy;
use File::Compare qw/compare_text compare/;
use OpenSSL::Glob;
use OpenSSL::Test qw/:DEFAULT data_file srctop_file bldtop_dir/;
use OpenSSL::Test::Utils;
setup("test_ml_dsa_codecs");
my @algs = qw(44 65 87);
my @formats = qw(seed-priv priv-only seed-only oqskeypair bare-seed bare-priv);
plan skip_all => "ML-DSA isn't supported in this build"
if disabled("ml-dsa");
plan tests => @algs * (23 + 10 * @formats);
my $seed = join ("", map {sprintf "%02x", $_} (0..31));
my $weed = join ("", map {sprintf "%02x", $_} (1..32));
my $ikme = join ("", map {sprintf "%02x", $_} (0..31));
my %alg = ("44" => [4, 4, 2560], "65" => [6, 5, 4032], "87" => [8, 7, 4896]);
foreach my $alg (@algs) {
my $pub = sprintf("pub-%s.pem", $alg);
my %formats = map { ($_, sprintf("prv-%s-%s.pem", $alg, $_)) } @formats;
my ($k, $l, $sk_len) = @{$alg{$alg}};
# The number of low-bits |d| in t_0 is 13 across all the variants
my $t0_len = $k * 13 * 32;
# (1 + 6 * @formats) tests
my $i = 0;
my $in0 = data_file($pub);
my $der0 = sprintf("pub-%s.%d.der", $alg, $i++);
ok(run(app(['openssl', 'pkey', '-pubin', '-in', $in0,
'-outform', 'DER', '-out', $der0])));
foreach my $f (keys %formats) {
my $kf = $formats{$f};
my %pruned = %formats;
delete $pruned{$f};
my $rest = join(", ", keys %pruned);
my $in = data_file($kf);
my $der = sprintf("pub-%s.%d.der", $alg, $i);
#
# Compare expected DER public key with DER public key of private
ok(run(app(['openssl', 'pkey', '-in', $in, '-pubout',
'-outform', 'DER', '-out', $der])));
ok(!compare($der0, $der),
sprintf("pubkey DER match: %s, %s", $alg, $f));
#
# Compare expected PEM private key with regenerated key
my $pem = sprintf("prv-%s-%s.%d.pem", $alg, $f, $i++);
ok(run(app(['openssl', 'genpkey', '-out', $pem,
'-pkeyopt', "hexseed:$seed", '-algorithm', "ml-dsa-$alg",
'-provparam', "ml-dsa.output_formats=$f"])));
ok(!compare_text($in, $pem),
sprintf("prvkey PEM match: %s, %s", $alg, $f));
ok(run(app(['openssl', 'pkey', '-in', $in, '-noout',
'-provparam', "ml-dsa.input_formats=$f"])));
ok(!run(app(['openssl', 'pkey', '-in', $in, '-noout',
'-provparam', "ml-dsa.input_formats=$rest"])));
}
# (1 + 2 * @formats) tests
# Perform sign/verify PCT
$i = 0;
my $refsig = data_file(sprintf("sig-%s.dat", $alg));
my $sig = sprintf("sig-%s.%d.dat", $alg, $i);
ok(run(app([qw(openssl pkeyutl -verify -rawin -pubin -inkey),
$in0, '-in', $der0, '-sigfile', $refsig],
sprintf("Signature verify with pubkey: %s", $alg))));
while (my ($f, $kf) = each %formats) {
my $sk = data_file($kf);
my $s = sprintf("sig-%s.%d.dat", $alg, $i++);
ok(run(app([qw(openssl pkeyutl -sign -rawin -inkey), $sk, '-in', $der0,
qw(-pkeyopt deterministic:1 -out), $s])));
ok(!compare($s, $refsig),
sprintf("Signature blob match %s with %s", $alg, $f));
}
# 6 tests
# Test keygen seed suppression via the command-line and config file.
my $seedless = sprintf("seedless-%s.gen.cli.pem", $alg);
ok(run(app([qw(openssl genpkey -provparam ml-dsa.retain_seed=no),
'-algorithm', "ml-dsa-$alg", '-pkeyopt', "hexseed:$seed",
'-out', $seedless])));
ok(!compare_text(data_file($formats{'priv-only'}), $seedless),
sprintf("seedless via cli key match: %s", $alg));
{
local $ENV{'OPENSSL_CONF'} = data_file("ml-dsa.cnf");
local $ENV{'RETAIN_SEED'} = "no";
$seedless = sprintf("seedless-%s.gen.cnf.pem", $alg);
ok(run(app(['openssl', 'genpkey',
'-algorithm', "ml-dsa-$alg", '-pkeyopt', "hexseed:$seed",
'-out', $seedless])));
ok(!compare_text(data_file($formats{'priv-only'}), $seedless),
sprintf("seedless via config match: %s", $alg));
my $seedfull = sprintf("seedfull-%s.gen.conf+cli.pem", $alg);
ok(run(app(['openssl', 'genpkey', '-provparam', 'ml-dsa.retain_seed=yes',
'-algorithm', "ml-dsa-$alg", '-pkeyopt', "hexseed:$seed",
'-out', $seedfull])));
ok(!compare_text(data_file($formats{'seed-priv'}), $seedfull),
sprintf("seedfull via cli vs. conf key match: %s", $alg));
}
# 6 tests
# Test decoder seed suppression via the config file and command-line.
$seedless = sprintf("seedless-%s.dec.cli.pem", $alg);
ok(run(app(['openssl', 'pkey', '-provparam', 'ml-dsa.retain_seed=no',
'-in', data_file($formats{'seed-only'}), '-out', $seedless])));
ok(!compare_text(data_file($formats{'priv-only'}), $seedless),
sprintf("seedless via provparam key match: %s", $alg));
{
local $ENV{'OPENSSL_CONF'} = data_file("ml-dsa.cnf");
local $ENV{'RETAIN_SEED'} = "no";
$seedless = sprintf("seedless-%s.dec.cnf.pem", $alg);
ok(run(app(['openssl', 'pkey',
'-in', data_file($formats{'seed-only'}), '-out', $seedless])));
ok(!compare_text(data_file($formats{'priv-only'}), $seedless),
sprintf("seedless via config match: %s", $alg));
my $seedfull = sprintf("seedfull-%s.dec.conf+cli.pem", $alg);
ok(run(app(['openssl', 'pkey', '-provparam', 'ml-dsa.retain_seed=yes',
'-in', data_file($formats{'seed-only'}), '-out', $seedfull])));
ok(!compare_text(data_file($formats{'seed-priv'}), $seedfull),
sprintf("seedfull via cli vs. conf key match: %s", $alg));
}
# 2 tests
# Test decoder seed non-preference via the command-line.
my $privpref = sprintf("privpref-%s.dec.cli.pem", $alg);
ok(run(app(['openssl', 'pkey', '-provparam', 'ml-dsa.prefer_seed=no',
'-in', data_file($formats{'seed-priv'}), '-out', $privpref])));
ok(!compare_text(data_file($formats{'priv-only'}), $privpref),
sprintf("seed non-preference via provparam key match: %s", $alg));
# (2 * @formats) tests
# Check text encoding
while (my ($f, $kf) = each %formats) {
my $txt = sprintf("prv-%s-%s.txt", $alg,
($f =~ m{seed}) ? 'seed' : 'priv');
my $out = sprintf("prv-%s-%s.txt", $alg, $f);
ok(run(app(['openssl', 'pkey', '-in', data_file($kf),
'-noout', '-text', '-out', $out])));
ok(!compare_text(data_file($txt), $out),
sprintf("text form private key: %s with %s", $alg, $f));
}
# (8 tests): Test import/load seed/priv consistency checks
my $real = sprintf('real-%s.der', $alg);
my $fake = sprintf('fake-%s.der', $alg);
my $mixt = sprintf('mixt-%s.der', $alg);
my $mash = sprintf('mash-%s.der', $alg);
ok(run(app([qw(openssl genpkey -algorithm), "ml-dsa-$alg",
qw(-provparam ml-dsa.output_formats=seed-priv -pkeyopt),
"hexseed:$seed", qw(-outform DER -out), $real])),
sprintf("create real private key: %s", $alg));
ok(run(app([qw(openssl genpkey -algorithm), "ml-dsa-$alg",
qw(-provparam ml-dsa.output_formats=seed-priv -pkeyopt),
"hexseed:$weed", qw(-outform DER -out), $fake])),
sprintf("create fake private key: %s", $alg));
my $realfh = IO::File->new($real, "<:raw");
my $fakefh = IO::File->new($fake, "<:raw");
local $/ = undef;
my $realder = <$realfh>;
$realfh->close();
my $fakeder = <$fakefh>;
$fakefh->close();
#
# - 20 bytes PKCS8 fixed overhead,
# - 4 byte private key octet string tag + length
# - 4 byte seed + key sequence tag + length
# - 2 byte seed tag + length
# - 32 byte seed
# - 4 byte key tag + length
# - $sk_len private key, ending in t0.
#
my $p8_len = 28 + (2 + 32) + (4 + $sk_len);
ok((length($realder) == $p8_len && length($fakeder) == $p8_len),
sprintf("Got expected DER lengths of %s seed-priv key", $alg));
my $mixtder = substr($realder, 0, 28 + 34)
. substr($fakeder, 28 + 34);
my $mixtfh = IO::File->new($mixt, ">:raw");
print $mixtfh $mixtder;
$mixtfh->close();
ok(run(app([qw(openssl pkey -inform DER -noout -in), $real])),
sprintf("accept valid keypair: %s", $alg));
ok(!run(app([qw(openssl pkey -inform DER -noout -in), $mixt])),
sprintf("Using seed reject mismatched private %s", $alg));
ok(run(app([qw(openssl pkey -provparam ml-dsa.prefer_seed=no),
qw(-inform DER -noout -in), $mixt])),
sprintf("Ignoring seed accept mismatched private %s", $alg));
# Mutate the t0 vector
my $mashder = $realder;
substr($mashder, -$t0_len, 1) =~ s{(.)}{chr(ord($1)^1)}es;
my $mashfh = IO::File->new($mash, ">:raw");
print $mashfh $mashder;
$mashfh->close();
ok(!run(app([qw(openssl pkey -provparam ml-dsa.prefer_seed=no),
qw(-inform DER -noout -in), $mash])),
sprintf("reject real private and mutated public: %s", $alg));
}