mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			145 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
			
		
		
	
	
			145 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
#!/usr/bin/env python
 | 
						|
# Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
 | 
						|
#
 | 
						|
# Licensed under the Apache License 2.0 (the "License").  You may not use
 | 
						|
# this file except in compliance with the License.  You can obtain a copy
 | 
						|
# in the file LICENSE in the source distribution or at
 | 
						|
# https://www.openssl.org/source/license.html
 | 
						|
 | 
						|
# A python program written to parse (version 1) of the WYCHEPROOF test vectors for
 | 
						|
# ML_DSA. The 6 files that can be processed by this utility can be downloaded
 | 
						|
# from
 | 
						|
#  https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
 | 
						|
# and output from this utility to
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_sign.txt
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_sign.txt
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_verify.txt
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_verify.txt
 | 
						|
# test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_verify.txt
 | 
						|
#
 | 
						|
# e.g. python3 ./test/mldsa_wycheproof_parse.py -alg ML-DSA-44 ./wycheproof/testvectors_v1/mldsa_44_standard_sign_test.json > test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
 | 
						|
 | 
						|
import json
 | 
						|
import argparse
 | 
						|
import datetime
 | 
						|
from _ast import Or
 | 
						|
 | 
						|
def print_label(label, value):
 | 
						|
    print(label + " = " + value)
 | 
						|
 | 
						|
def print_hexlabel(label, tag, value):
 | 
						|
    print(label + " = hex" + tag + ":" + value)
 | 
						|
 | 
						|
def parse_ml_dsa_sig_gen(alg, groups):
 | 
						|
    grpId = 1
 | 
						|
    for grp in groups:
 | 
						|
        keyOnly = False
 | 
						|
        first = True
 | 
						|
        name = alg.replace('-', '_')
 | 
						|
        keyname = name + "_" + str(grpId)
 | 
						|
        grpId += 1
 | 
						|
 | 
						|
        for tst in grp['tests']:
 | 
						|
            if first:
 | 
						|
                first = False
 | 
						|
                if 'flags' in tst:
 | 
						|
                    if 'IncorrectPrivateKeyLength' in tst['flags'] or 'InvalidPrivateKey' in tst['flags']:
 | 
						|
                        keyOnly = True
 | 
						|
                if not keyOnly:
 | 
						|
                    print("")
 | 
						|
                    print_label("PrivateKeyRaw", keyname + ":" + alg + ":" + grp['privateKey'])
 | 
						|
            testname = name + "_" + str(tst['tcId'])
 | 
						|
            print("\n# " + str(tst['tcId']) + " " + tst['comment'])
 | 
						|
 | 
						|
            print_label("FIPSversion", ">=3.5.0")
 | 
						|
            if keyOnly:
 | 
						|
                print_label("KeyFromData", alg)
 | 
						|
                print_hexlabel("Ctrl", "priv", grp['privateKey'])
 | 
						|
                print_label("Result", "KEY_FROMDATA_ERROR")
 | 
						|
            else:
 | 
						|
                print_label("Sign-Message", alg + ":" + keyname)
 | 
						|
                print_label("Input", tst['msg'])
 | 
						|
                print_label("Output", tst['sig'])
 | 
						|
                if 'ctx' in tst:
 | 
						|
                    print_hexlabel("Ctrl", "context-string", tst['ctx'])
 | 
						|
                print_label("Ctrl", "message-encoding:1")
 | 
						|
                print_label("Ctrl", "deterministic:1")
 | 
						|
                if tst['result'] == "invalid":
 | 
						|
                    print_label("Result", "PKEY_CTRL_ERROR")
 | 
						|
 | 
						|
def parse_ml_dsa_sig_ver(alg, groups):
 | 
						|
    grpId = 1
 | 
						|
    for grp in groups:
 | 
						|
        keyOnly = False
 | 
						|
        first = True
 | 
						|
        name = alg.replace('-', '_')
 | 
						|
        keyname = name + "_" + str(grpId)
 | 
						|
        grpId += 1
 | 
						|
 | 
						|
        for tst in grp['tests']:
 | 
						|
            if first:
 | 
						|
                first = False
 | 
						|
                if 'flags' in tst:
 | 
						|
                    if 'IncorrectPublicKeyLength' in tst['flags'] or 'InvalidPublicKey' in tst['flags']:
 | 
						|
                        keyOnly = True
 | 
						|
                if not keyOnly:
 | 
						|
                    print("")
 | 
						|
                    print_label("PublicKeyRaw", keyname + ":" + alg + ":" + grp['publicKey'])
 | 
						|
            testname = name + "_" + str(tst['tcId'])
 | 
						|
            print("\n# " + str(tst['tcId']) + " " + tst['comment'])
 | 
						|
 | 
						|
            print_label("FIPSversion", ">=3.5.0")
 | 
						|
            if keyOnly:
 | 
						|
                print_label("KeyFromData", alg)
 | 
						|
                print_hexlabel("Ctrl", "pub", grp['publicKey'])
 | 
						|
                print_label("Result", "KEY_FROMDATA_ERROR")
 | 
						|
            else:
 | 
						|
                print_label("Verify-Message-Public", alg + ":" + keyname)
 | 
						|
                print_label("Input", tst['msg'])
 | 
						|
                print_label("Output", tst['sig'])
 | 
						|
                if 'ctx' in tst:
 | 
						|
                    print_hexlabel("Ctrl", "context-string", tst['ctx'])
 | 
						|
                print_label("Ctrl", "message-encoding:1")
 | 
						|
                print_label("Ctrl", "deterministic:1")
 | 
						|
                if tst['result'] == "invalid":
 | 
						|
                    if 'InvalidContext' in tst['flags']:
 | 
						|
                        print_label("Result", "PKEY_CTRL_ERROR")
 | 
						|
                    else:
 | 
						|
                        print_label("Result", "VERIFY_ERROR")
 | 
						|
 | 
						|
parser = argparse.ArgumentParser(description="")
 | 
						|
parser.add_argument('filename', type=str)
 | 
						|
parser.add_argument('-alg', type=str)
 | 
						|
args = parser.parse_args()
 | 
						|
 | 
						|
# Open and read the JSON file
 | 
						|
with open(args.filename, 'r') as file:
 | 
						|
    data = json.load(file)
 | 
						|
 | 
						|
year = datetime.date.today().year
 | 
						|
version = data['generatorVersion']
 | 
						|
algorithm = data['algorithm']
 | 
						|
mode = data['testGroups'][0]['type']
 | 
						|
 | 
						|
print("# Copyright " + str(year) + " The OpenSSL Project Authors. All Rights Reserved.")
 | 
						|
print("#")
 | 
						|
print("# Licensed under the Apache License 2.0 (the \"License\").  You may not use")
 | 
						|
print("# this file except in compliance with the License.  You can obtain a copy")
 | 
						|
print("# in the file LICENSE in the source distribution or at")
 | 
						|
print("# https://www.openssl.org/source/license.html\n")
 | 
						|
print("# Wycheproof test data for " + algorithm + " " + mode + " generated from")
 | 
						|
print("# https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
 | 
						|
 | 
						|
print("# [version " + str(version) + "]")
 | 
						|
 | 
						|
if algorithm == "ML-DSA":
 | 
						|
    if mode == 'MlDsaSign':
 | 
						|
        parse_ml_dsa_sig_gen(args.alg, data['testGroups'])
 | 
						|
    elif mode == 'MlDsaVerify':
 | 
						|
        parse_ml_dsa_sig_ver(args.alg, data['testGroups'])
 | 
						|
    else:
 | 
						|
        print("Unsupported mode " + mode)
 | 
						|
else:
 | 
						|
    print("Unsupported algorithm " + algorithm)
 |