| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144 |
- #!/usr/bin/env python
- # Copyright 2025 The OpenSSL Project Authors. All Rights Reserved.
- #
- # Licensed under the Apache License 2.0 (the "License"). You may not use
- # this file except in compliance with the License. You can obtain a copy
- # in the file LICENSE in the source distribution or at
- # https://www.openssl.org/source/license.html
- # A python program written to parse (version 1) of the WYCHEPROOF test vectors for
- # ML_DSA. The 6 files that can be processed by this utility can be downloaded
- # from
- # https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
- # and output from this utility to
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_sign.txt
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_sign.txt
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_verify.txt
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_verify.txt
- # test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_verify.txt
- #
- # e.g. python3 ./test/mldsa_wycheproof_parse.py -alg ML-DSA-44 ./wycheproof/testvectors_v1/mldsa_44_standard_sign_test.json > test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt
- import json
- import argparse
- import datetime
- from _ast import Or
- def print_label(label, value):
- print(label + " = " + value)
- def print_hexlabel(label, tag, value):
- print(label + " = hex" + tag + ":" + value)
- def parse_ml_dsa_sig_gen(alg, groups):
- grpId = 1
- for grp in groups:
- keyOnly = False
- first = True
- name = alg.replace('-', '_')
- keyname = name + "_" + str(grpId)
- grpId += 1
- for tst in grp['tests']:
- if first:
- first = False
- if 'flags' in tst:
- if 'IncorrectPrivateKeyLength' in tst['flags'] or 'InvalidPrivateKey' in tst['flags']:
- keyOnly = True
- if not keyOnly:
- print("")
- print_label("PrivateKeyRaw", keyname + ":" + alg + ":" + grp['privateKey'])
- testname = name + "_" + str(tst['tcId'])
- print("\n# " + str(tst['tcId']) + " " + tst['comment'])
- print_label("FIPSversion", ">=3.5.0")
- if keyOnly:
- print_label("KeyFromData", alg)
- print_hexlabel("Ctrl", "priv", grp['privateKey'])
- print_label("Result", "KEY_FROMDATA_ERROR")
- else:
- print_label("Sign-Message", alg + ":" + keyname)
- print_label("Input", tst['msg'])
- print_label("Output", tst['sig'])
- if 'ctx' in tst:
- print_hexlabel("Ctrl", "context-string", tst['ctx'])
- print_label("Ctrl", "message-encoding:1")
- print_label("Ctrl", "deterministic:1")
- if tst['result'] == "invalid":
- print_label("Result", "PKEY_CTRL_ERROR")
- def parse_ml_dsa_sig_ver(alg, groups):
- grpId = 1
- for grp in groups:
- keyOnly = False
- first = True
- name = alg.replace('-', '_')
- keyname = name + "_" + str(grpId)
- grpId += 1
- for tst in grp['tests']:
- if first:
- first = False
- if 'flags' in tst:
- if 'IncorrectPublicKeyLength' in tst['flags'] or 'InvalidPublicKey' in tst['flags']:
- keyOnly = True
- if not keyOnly:
- print("")
- print_label("PublicKeyRaw", keyname + ":" + alg + ":" + grp['publicKey'])
- testname = name + "_" + str(tst['tcId'])
- print("\n# " + str(tst['tcId']) + " " + tst['comment'])
- print_label("FIPSversion", ">=3.5.0")
- if keyOnly:
- print_label("KeyFromData", alg)
- print_hexlabel("Ctrl", "pub", grp['publicKey'])
- print_label("Result", "KEY_FROMDATA_ERROR")
- else:
- print_label("Verify-Message-Public", alg + ":" + keyname)
- print_label("Input", tst['msg'])
- print_label("Output", tst['sig'])
- if 'ctx' in tst:
- print_hexlabel("Ctrl", "context-string", tst['ctx'])
- print_label("Ctrl", "message-encoding:1")
- print_label("Ctrl", "deterministic:1")
- if tst['result'] == "invalid":
- if 'InvalidContext' in tst['flags']:
- print_label("Result", "PKEY_CTRL_ERROR")
- else:
- print_label("Result", "VERIFY_ERROR")
- parser = argparse.ArgumentParser(description="")
- parser.add_argument('filename', type=str)
- parser.add_argument('-alg', type=str)
- args = parser.parse_args()
- # Open and read the JSON file
- with open(args.filename, 'r') as file:
- data = json.load(file)
- year = datetime.date.today().year
- version = data['generatorVersion']
- algorithm = data['algorithm']
- mode = data['testGroups'][0]['type']
- print("# Copyright " + str(year) + " The OpenSSL Project Authors. All Rights Reserved.")
- print("#")
- print("# Licensed under the Apache License 2.0 (the \"License\"). You may not use")
- print("# this file except in compliance with the License. You can obtain a copy")
- print("# in the file LICENSE in the source distribution or at")
- print("# https://www.openssl.org/source/license.html\n")
- print("# Wycheproof test data for " + algorithm + " " + mode + " generated from")
- print("# https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json")
- print("# [version " + str(version) + "]")
- if algorithm == "ML-DSA":
- if mode == 'MlDsaSign':
- parse_ml_dsa_sig_gen(args.alg, data['testGroups'])
- elif mode == 'MlDsaVerify':
- parse_ml_dsa_sig_ver(args.alg, data['testGroups'])
- else:
- print("Unsupported mode " + mode)
- else:
- print("Unsupported algorithm " + algorithm)
|