openssl/test/mldsa_wycheproof_parse.py
slontis 20599e480f ML-DSA Add Wycheproof test vectors.
Added a python script to convert the json files into evp_test data.
Added a EVP_TEST_METHOD "KeyFromData" that can test failures when
loading raw keys. (The existing "PrivateKeyRaw" and "PublicKeyRaw"
were not fit for this purpose).

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/26885)
2025-02-26 12:14:58 +01:00

144 lines
5.9 KiB
Python
Executable file

#!/usr/bin/env python
# Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
# A python program written to parse (version 1) of the WYCHEPROOF test vectors for
# ML_DSA. The 6 files that can be processed by this utility can be downloaded
# from
# https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
# and output from this utility to
# test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
# test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_sign.txt
# test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_sign.txt
# test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_verify.txt
# test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_verify.txt
# test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_verify.txt
#
# e.g. python3 ./test/mldsa_wycheproof_parse.py -alg ML-DSA-44 ./wycheproof/testvectors_v1/mldsa_44_standard_sign_test.json > test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
import json
import argparse
import datetime
from _ast import Or
def print_label(label, value):
print(label + " = " + value)
def print_hexlabel(label, tag, value):
print(label + " = hex" + tag + ":" + value)
def parse_ml_dsa_sig_gen(alg, groups):
grpId = 1
for grp in groups:
keyOnly = False
first = True
name = alg.replace('-', '_')
keyname = name + "_" + str(grpId)
grpId += 1
for tst in grp['tests']:
if first:
first = False
if 'flags' in tst:
if 'IncorrectPrivateKeyLength' in tst['flags'] or 'InvalidPrivateKey' in tst['flags']:
keyOnly = True
if not keyOnly:
print("")
print_label("PrivateKeyRaw", keyname + ":" + alg + ":" + grp['privateKey'])
testname = name + "_" + str(tst['tcId'])
print("\n# " + str(tst['tcId']) + " " + tst['comment'])
print_label("FIPSversion", ">=3.5.0")
if keyOnly:
print_label("KeyFromData", alg)
print_hexlabel("Ctrl", "priv", grp['privateKey'])
print_label("Result", "KEY_FROMDATA_ERROR")
else:
print_label("Sign-Message", alg + ":" + keyname)
print_label("Input", tst['msg'])
print_label("Output", tst['sig'])
if 'ctx' in tst:
print_hexlabel("Ctrl", "context-string", tst['ctx'])
print_label("Ctrl", "message-encoding:1")
print_label("Ctrl", "deterministic:1")
if tst['result'] == "invalid":
print_label("Result", "PKEY_CTRL_ERROR")
def parse_ml_dsa_sig_ver(alg, groups):
grpId = 1
for grp in groups:
keyOnly = False
first = True
name = alg.replace('-', '_')
keyname = name + "_" + str(grpId)
grpId += 1
for tst in grp['tests']:
if first:
first = False
if 'flags' in tst:
if 'IncorrectPublicKeyLength' in tst['flags'] or 'InvalidPublicKey' in tst['flags']:
keyOnly = True
if not keyOnly:
print("")
print_label("PublicKeyRaw", keyname + ":" + alg + ":" + grp['publicKey'])
testname = name + "_" + str(tst['tcId'])
print("\n# " + str(tst['tcId']) + " " + tst['comment'])
print_label("FIPSversion", ">=3.5.0")
if keyOnly:
print_label("KeyFromData", alg)
print_hexlabel("Ctrl", "pub", grp['publicKey'])
print_label("Result", "KEY_FROMDATA_ERROR")
else:
print_label("Verify-Message-Public", alg + ":" + keyname)
print_label("Input", tst['msg'])
print_label("Output", tst['sig'])
if 'ctx' in tst:
print_hexlabel("Ctrl", "context-string", tst['ctx'])
print_label("Ctrl", "message-encoding:1")
print_label("Ctrl", "deterministic:1")
if tst['result'] == "invalid":
if 'InvalidContext' in tst['flags']:
print_label("Result", "PKEY_CTRL_ERROR")
else:
print_label("Result", "VERIFY_ERROR")
parser = argparse.ArgumentParser(description="")
parser.add_argument('filename', type=str)
parser.add_argument('-alg', type=str)
args = parser.parse_args()
# Open and read the JSON file
with open(args.filename, 'r') as file:
data = json.load(file)
year = datetime.date.today().year
version = data['generatorVersion']
algorithm = data['algorithm']
mode = data['testGroups'][0]['type']
print("# Copyright " + str(year) + " The OpenSSL Project Authors. All Rights Reserved.")
print("#")
print("# Licensed under the Apache License 2.0 (the \"License\"). You may not use")
print("# this file except in compliance with the License. You can obtain a copy")
print("# in the file LICENSE in the source distribution or at")
print("# https://www.openssl.org/source/license.html\n")
print("# Wycheproof test data for " + algorithm + " " + mode + " generated from")
print("# https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
print("# [version " + str(version) + "]")
if algorithm == "ML-DSA":
if mode == 'MlDsaSign':
parse_ml_dsa_sig_gen(args.alg, data['testGroups'])
elif mode == 'MlDsaVerify':
parse_ml_dsa_sig_ver(args.alg, data['testGroups'])
else:
print("Unsupported mode " + mode)
else:
print("Unsupported algorithm " + algorithm)