diff options
Diffstat (limited to 'src/regress/lib/libcrypto')
16 files changed, 1824 insertions, 997 deletions
diff --git a/src/regress/lib/libcrypto/mlkem/Makefile b/src/regress/lib/libcrypto/mlkem/Makefile index b8e5c4583a..1ee2dcc78d 100644 --- a/src/regress/lib/libcrypto/mlkem/Makefile +++ b/src/regress/lib/libcrypto/mlkem/Makefile | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | # $OpenBSD: Makefile,v 1.4 2024/12/19 23:45:09 tb Exp $ | 1 | # $OpenBSD: Makefile,v 1.5 2024/12/20 00:07:12 tb Exp $ |
| 2 | 2 | ||
| 3 | PROGS += mlkem_unittest | 3 | PROGS += mlkem_unittest |
| 4 | PROGS += mlkem768_nist_keygen_tests | 4 | PROGS += mlkem768_nist_keygen_tests |
| @@ -26,10 +26,12 @@ run-$p: $p | |||
| 26 | LDADD = ${CRYPTO_INT} | 26 | LDADD = ${CRYPTO_INT} |
| 27 | DPADD = ${LIBCRYPTO} | 27 | DPADD = ${LIBCRYPTO} |
| 28 | 28 | ||
| 29 | CFLAGS += -DLIBRESSL_INTERNAL -Wall | 29 | CFLAGS += -DLIBRESSL_INTERNAL -Wall -Werror |
| 30 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/bytestring | 30 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/bytestring |
| 31 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/mlkem | 31 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/mlkem |
| 32 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/sha | 32 | CFLAGS += -I${.CURDIR}/../../../../lib/libcrypto/sha |
| 33 | CFLAGS += -DLIBRESSL_INTERNAL | 33 | CFLAGS += -DLIBRESSL_INTERNAL |
| 34 | 34 | ||
| 35 | WARNINS = Yes | ||
| 36 | |||
| 35 | .include <bsd.regress.mk> | 37 | .include <bsd.regress.mk> |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_decap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_decap_tests.c index b38cd52d28..c75b2c7ca8 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_decap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_decap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_decap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_decap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,113 +17,179 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_tests_util.h" | 29 | #include "mlkem_tests_util.h" |
| 28 | 30 | ||
| 29 | static void | 31 | static int |
| 30 | MlkemDecapFileTest(CBS *c, CBS *k, CBS *dk, int should_fail) | 32 | MlkemDecapFileTest(CBB *ciphertext_cbb, CBB *shared_secret_cbb, |
| 33 | CBB *private_key_cbb, int should_fail, size_t line) | ||
| 31 | { | 34 | { |
| 32 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | ||
| 33 | struct MLKEM1024_private_key priv; | 35 | struct MLKEM1024_private_key priv; |
| 34 | int parse_ok, decap_ok; | 36 | uint8_t *ciphertext = NULL, *shared_secret = NULL, *private_key = NULL; |
| 37 | size_t ciphertext_len = 0, shared_secret_len = 0, private_key_len = 0; | ||
| 38 | uint8_t shared_secret_buf[MLKEM_SHARED_SECRET_BYTES]; | ||
| 39 | CBS private_key_cbs; | ||
| 40 | int failed = 1; | ||
| 35 | 41 | ||
| 36 | parse_ok = MLKEM1024_parse_private_key(&priv, dk); | 42 | if (!CBB_finish(ciphertext_cbb, &ciphertext, &ciphertext_len)) |
| 37 | if (!parse_ok) { | 43 | goto err; |
| 38 | TEST(!should_fail, "parse_private_key"); | 44 | if (!CBB_finish(shared_secret_cbb, &shared_secret, &shared_secret_len)) |
| 39 | return; | 45 | goto err; |
| 46 | if (!CBB_finish(private_key_cbb, &private_key, &private_key_len)) | ||
| 47 | goto err; | ||
| 48 | |||
| 49 | CBS_init(&private_key_cbs, private_key, private_key_len); | ||
| 50 | |||
| 51 | if (!MLKEM1024_parse_private_key(&priv, &private_key_cbs)) { | ||
| 52 | if ((failed = !should_fail)) | ||
| 53 | warnx("#%zu: parse_private_key", line); | ||
| 54 | goto err; | ||
| 55 | } | ||
| 56 | if (!MLKEM1024_decap(shared_secret_buf, ciphertext, ciphertext_len, | ||
| 57 | &priv)) { | ||
| 58 | if ((failed = !should_fail)) | ||
| 59 | warnx("#%zu: decap", line); | ||
| 60 | goto err; | ||
| 40 | } | 61 | } |
| 41 | decap_ok = MLKEM1024_decap(shared_secret, CBS_data(c), CBS_len(c), | 62 | |
| 42 | &priv); | 63 | failed = compare_data(shared_secret, shared_secret_buf, |
| 43 | if (!decap_ok) { | 64 | MLKEM_SHARED_SECRET_BYTES, line, "shared_secret"); |
| 44 | TEST(!should_fail, "decap"); | 65 | |
| 45 | return; | 66 | if (should_fail != failed) { |
| 67 | warnx("FAIL: #%zu: should_fail %d, failed %d", | ||
| 68 | line, should_fail, failed); | ||
| 69 | failed = 1; | ||
| 46 | } | 70 | } |
| 47 | TEST_DATAEQ(shared_secret, CBS_data(k), | 71 | |
| 48 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 72 | err: |
| 73 | CBB_cleanup(ciphertext_cbb); | ||
| 74 | CBB_cleanup(shared_secret_cbb); | ||
| 75 | CBB_cleanup(private_key_cbb); | ||
| 76 | freezero(ciphertext, ciphertext_len); | ||
| 77 | freezero(shared_secret, shared_secret_len); | ||
| 78 | freezero(private_key, private_key_len); | ||
| 79 | |||
| 80 | return failed; | ||
| 49 | } | 81 | } |
| 50 | 82 | ||
| 51 | #define S_START 0 | 83 | #define S_START 0 |
| 52 | #define S_COMMENT 1 | 84 | #define S_COMMENT 1 |
| 53 | #define S_PRIVATE_KEY 2 | 85 | #define S_PRIVATE_KEY 2 |
| 54 | #define S_CIPHERTEXT 3 | 86 | #define S_CIPHERTEXT 3 |
| 55 | #define S_RESULT 4 | 87 | #define S_RESULT 4 |
| 56 | #define S_SHARED_SECRET 5 | 88 | #define S_SHARED_SECRET 5 |
| 89 | |||
| 90 | #define S2S(x) case x: return #x | ||
| 91 | |||
| 92 | static const char * | ||
| 93 | state2str(int state) | ||
| 94 | { | ||
| 95 | switch (state) { | ||
| 96 | S2S(S_START); | ||
| 97 | S2S(S_COMMENT); | ||
| 98 | S2S(S_PRIVATE_KEY); | ||
| 99 | S2S(S_CIPHERTEXT); | ||
| 100 | S2S(S_RESULT); | ||
| 101 | S2S(S_SHARED_SECRET); | ||
| 102 | default: | ||
| 103 | errx(1, "unknown state %d", state); | ||
| 104 | } | ||
| 105 | } | ||
| 57 | 106 | ||
| 58 | int | 107 | int |
| 59 | main(int argc, char **argv) | 108 | main(int argc, char **argv) |
| 60 | { | 109 | { |
| 61 | CBS ciphertext, shared_secret, private_key; | 110 | CBB ciphertext = { 0 }, shared_secret = { 0 }, private_key = { 0 }; |
| 62 | const uint8_t *p = NULL; | ||
| 63 | int should_fail = 0; | 111 | int should_fail = 0; |
| 64 | char *buf; | 112 | const char *test; |
| 113 | size_t line = 0; | ||
| 114 | char *buf = NULL; | ||
| 115 | size_t buflen = 0; | ||
| 116 | ssize_t len; | ||
| 65 | FILE *fp; | 117 | FILE *fp; |
| 66 | int state; | 118 | int state; |
| 119 | int failed = 0; | ||
| 120 | |||
| 121 | if (argc < 2) | ||
| 122 | errx(1, "%s: missing test file", argv[0]); | ||
| 123 | |||
| 124 | test = argv[1]; | ||
| 125 | |||
| 126 | if ((fp = fopen(test, "r")) == NULL) | ||
| 127 | err(1, "cant't open test file"); | ||
| 67 | 128 | ||
| 68 | fprintf(stderr, "Testing decap test vectors in %s\n", argv[1]); | ||
| 69 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 70 | MALLOC(buf, 16*1024); | ||
| 71 | state = S_COMMENT; | 129 | state = S_COMMENT; |
| 72 | test_number = 1; | 130 | line = 0; |
| 73 | while (fgets(buf, 16*1024, fp) != NULL) { | 131 | |
| 132 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 133 | const char *msg = state2str(state); | ||
| 134 | CBS cbs; | ||
| 135 | uint8_t u8; | ||
| 136 | |||
| 137 | line++; | ||
| 138 | CBS_init(&cbs, buf, len); | ||
| 139 | |||
| 140 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 141 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 142 | assert(u8 == '\n'); | ||
| 143 | |||
| 74 | switch (state) { | 144 | switch (state) { |
| 75 | case S_START: | 145 | case S_START: |
| 76 | if (strcmp(buf, "\n") != 0) | ||
| 77 | break; | ||
| 78 | state = S_COMMENT; | 146 | state = S_COMMENT; |
| 79 | break; | 147 | break; |
| 80 | case S_COMMENT: | 148 | case S_COMMENT: |
| 81 | if (strncmp(buf, "#", 1) != 0) | 149 | if (!CBS_get_u8(&cbs, &u8)) |
| 82 | break; | 150 | errx(1, "#%zu %s: CBB_get_u8", line, msg); |
| 151 | assert(u8 == '#'); | ||
| 152 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 153 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 83 | state = S_PRIVATE_KEY; | 154 | state = S_PRIVATE_KEY; |
| 84 | break; | 155 | break; |
| 85 | case S_PRIVATE_KEY: | 156 | case S_PRIVATE_KEY: |
| 86 | if (strncmp(buf, "private_key: ", | 157 | if (!get_string_cbs(&cbs, "private_key: ", line, msg)) |
| 87 | strlen("private_key: ")) != 0) | 158 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 88 | break; | 159 | hex_decode_cbs(&cbs, &private_key, line, msg); |
| 89 | grab_data(&private_key, buf, strlen("private_key: ")); | ||
| 90 | p = CBS_data(&private_key); | ||
| 91 | state = S_CIPHERTEXT; | 160 | state = S_CIPHERTEXT; |
| 92 | break; | 161 | break; |
| 93 | case S_CIPHERTEXT: | 162 | case S_CIPHERTEXT: |
| 94 | if (strncmp(buf, "ciphertext: ", | 163 | if (!get_string_cbs(&cbs, "ciphertext: ", line, msg)) |
| 95 | strlen("ciphertext: ")) != 0) | 164 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 96 | break; | 165 | hex_decode_cbs(&cbs, &ciphertext, line, msg); |
| 97 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | ||
| 98 | state = S_RESULT; | 166 | state = S_RESULT; |
| 99 | break; | 167 | break; |
| 100 | case S_RESULT: | 168 | case S_RESULT: |
| 101 | if (strncmp(buf, "result: pass", | 169 | if (!get_string_cbs(&cbs, "result: ", line, msg)) |
| 102 | strlen("result: pass")) != 0) | 170 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 103 | should_fail = 1; | 171 | should_fail = get_string_cbs(&cbs, "fail", line, msg); |
| 104 | else | ||
| 105 | should_fail = 0; | ||
| 106 | state = S_SHARED_SECRET; | 172 | state = S_SHARED_SECRET; |
| 107 | break; | 173 | break; |
| 108 | case S_SHARED_SECRET: | 174 | case S_SHARED_SECRET: |
| 109 | if (strncmp(buf, "shared_secret: ", | 175 | if (!get_string_cbs(&cbs, "shared_secret: ", line, msg)) |
| 110 | strlen("shared_secret: ")) != 0) | 176 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 111 | break; | 177 | hex_decode_cbs(&cbs, &shared_secret, line, msg); |
| 112 | grab_data(&shared_secret, buf, | 178 | |
| 113 | strlen("shared_secret: ")); | 179 | failed |= MlkemDecapFileTest(&ciphertext, &shared_secret, |
| 114 | MlkemDecapFileTest(&ciphertext, &shared_secret, | 180 | &private_key, should_fail, line); |
| 115 | &private_key, should_fail); | 181 | |
| 116 | free((void *)CBS_data(&ciphertext)); | ||
| 117 | free((void *)CBS_data(&shared_secret)); | ||
| 118 | free((void *)p); | ||
| 119 | |||
| 120 | test_number++; | ||
| 121 | state = S_START; | 182 | state = S_START; |
| 122 | break; | 183 | break; |
| 123 | } | 184 | } |
| 185 | if (CBS_len(&cbs) > 0) | ||
| 186 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 124 | } | 187 | } |
| 125 | |||
| 126 | free(buf); | 188 | free(buf); |
| 127 | exit(failure); | 189 | |
| 190 | if (ferror(fp)) | ||
| 191 | err(1, NULL); | ||
| 192 | fclose(fp); | ||
| 193 | |||
| 194 | return failed; | ||
| 128 | } | 195 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_encap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_encap_tests.c index 83924ba6d2..06b00a4b75 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_encap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_encap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_encap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_encap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,120 +17,194 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 29 | #include "mlkem_internal.h" | ||
| 27 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 28 | 31 | ||
| 29 | static void | 32 | static int |
| 30 | MlkemEncapFileTest(CBS *entropy, CBS *public_key, CBS *expected_ciphertext, | 33 | MlkemEncapFileTest(CBB *entropy_cbb, CBB *pubkey_cbb, CBB *ciphertext_cbb, |
| 31 | CBS *expected_shared_secret, int should_fail) | 34 | CBB *shared_secret_cbb, int should_fail, size_t line) |
| 32 | { | 35 | { |
| 33 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | ||
| 34 | uint8_t ciphertext[MLKEM1024_CIPHERTEXT_BYTES]; | ||
| 35 | struct MLKEM1024_public_key pub; | 36 | struct MLKEM1024_public_key pub; |
| 36 | int parse_ok; | 37 | uint8_t *entropy = NULL, *public_key = NULL, *ciphertext = NULL; |
| 38 | uint8_t *shared_secret = NULL; | ||
| 39 | size_t entropy_len = 0, public_key_len = 0, ciphertext_len = 0; | ||
| 40 | size_t shared_secret_len = 0; | ||
| 41 | uint8_t shared_secret_buf[MLKEM_SHARED_SECRET_BYTES]; | ||
| 42 | uint8_t ciphertext_buf[MLKEM1024_CIPHERTEXT_BYTES]; | ||
| 43 | CBS public_key_cbs; | ||
| 44 | int failed = 1; | ||
| 37 | 45 | ||
| 38 | parse_ok = MLKEM1024_parse_public_key(&pub, public_key); | 46 | if (!CBB_finish(entropy_cbb, &entropy, &entropy_len)) |
| 39 | if (!parse_ok) { | 47 | goto err; |
| 40 | TEST(!should_fail, "parse_public_key"); | 48 | if (!CBB_finish(pubkey_cbb, &public_key, &public_key_len)) |
| 41 | return; | 49 | goto err; |
| 50 | if (!CBB_finish(ciphertext_cbb, &ciphertext, &ciphertext_len)) | ||
| 51 | goto err; | ||
| 52 | if (!CBB_finish(shared_secret_cbb, &shared_secret, &shared_secret_len)) | ||
| 53 | goto err; | ||
| 54 | |||
| 55 | CBS_init(&public_key_cbs, public_key, public_key_len); | ||
| 56 | |||
| 57 | if (!MLKEM1024_parse_public_key(&pub, &public_key_cbs)) { | ||
| 58 | if ((failed = !should_fail)) | ||
| 59 | warnx("#%zu: parse_public_key", line); | ||
| 60 | goto err; | ||
| 42 | } | 61 | } |
| 43 | MLKEM1024_encap(ciphertext, shared_secret, &pub); | 62 | MLKEM1024_encap_external_entropy(ciphertext_buf, shared_secret_buf, |
| 44 | TEST_DATAEQ(shared_secret, CBS_data(expected_shared_secret), | 63 | &pub, entropy); |
| 45 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 64 | |
| 46 | TEST_DATAEQ(ciphertext, CBS_data(expected_ciphertext), | 65 | failed = compare_data(shared_secret, shared_secret_buf, |
| 47 | MLKEM1024_CIPHERTEXT_BYTES, "shared_secret"); | 66 | MLKEM_SHARED_SECRET_BYTES, line, "shared_secret"); |
| 67 | failed |= compare_data(ciphertext, ciphertext_buf, | ||
| 68 | MLKEM1024_CIPHERTEXT_BYTES, line, "ciphertext"); | ||
| 69 | |||
| 70 | if (should_fail != failed) { | ||
| 71 | warnx("FAIL: #%zu: should_fail %d, failed %d", | ||
| 72 | line, should_fail, failed); | ||
| 73 | failed = 1; | ||
| 74 | } | ||
| 75 | |||
| 76 | err: | ||
| 77 | CBB_cleanup(entropy_cbb); | ||
| 78 | CBB_cleanup(pubkey_cbb); | ||
| 79 | CBB_cleanup(ciphertext_cbb); | ||
| 80 | CBB_cleanup(shared_secret_cbb); | ||
| 81 | freezero(entropy, entropy_len); | ||
| 82 | freezero(public_key, public_key_len); | ||
| 83 | freezero(ciphertext, ciphertext_len); | ||
| 84 | freezero(shared_secret, shared_secret_len); | ||
| 85 | |||
| 86 | return failed; | ||
| 48 | } | 87 | } |
| 49 | 88 | ||
| 50 | #define S_START 0 | 89 | #define S_START 0 |
| 51 | #define S_COMMENT 1 | 90 | #define S_COMMENT 1 |
| 52 | #define S_ENTROPY 2 | 91 | #define S_ENTROPY 2 |
| 53 | #define S_PUBLIC_KEY 3 | 92 | #define S_PUBLIC_KEY 3 |
| 54 | #define S_RESULT 4 | 93 | #define S_RESULT 4 |
| 55 | #define S_CIPHERTEXT 5 | 94 | #define S_CIPHERTEXT 5 |
| 56 | #define S_SHARED_SECRET 6 | 95 | #define S_SHARED_SECRET 6 |
| 96 | |||
| 97 | #define S2S(x) case x: return #x | ||
| 98 | |||
| 99 | static const char * | ||
| 100 | state2str(int state) | ||
| 101 | { | ||
| 102 | switch (state) { | ||
| 103 | S2S(S_START); | ||
| 104 | S2S(S_COMMENT); | ||
| 105 | S2S(S_ENTROPY); | ||
| 106 | S2S(S_PUBLIC_KEY); | ||
| 107 | S2S(S_RESULT); | ||
| 108 | S2S(S_CIPHERTEXT); | ||
| 109 | S2S(S_SHARED_SECRET); | ||
| 110 | default: | ||
| 111 | errx(1, "unknown state %d", state); | ||
| 112 | } | ||
| 113 | } | ||
| 57 | 114 | ||
| 58 | int | 115 | int |
| 59 | main(int argc, char **argv) | 116 | main(int argc, char **argv) |
| 60 | { | 117 | { |
| 61 | CBS entropy, public_key, ciphertext, shared_secret; | 118 | CBB entropy = { 0 }, public_key = { 0 }, ciphertext = { 0 }, shared_secret = { 0 }; |
| 62 | const uint8_t *p = NULL; | ||
| 63 | int should_fail = 0; | 119 | int should_fail = 0; |
| 64 | char *buf; | 120 | const char *test; |
| 121 | size_t line; | ||
| 122 | char *buf = NULL; | ||
| 123 | size_t buflen = 0; | ||
| 124 | ssize_t len; | ||
| 65 | FILE *fp; | 125 | FILE *fp; |
| 66 | int state; | 126 | int state; |
| 127 | int failed = 0; | ||
| 128 | |||
| 129 | if (argc < 2) | ||
| 130 | errx(1, "%s: missing test file", argv[0]); | ||
| 131 | |||
| 132 | test = argv[1]; | ||
| 133 | line = 0; | ||
| 134 | |||
| 135 | if ((fp = fopen(test, "r")) == NULL) | ||
| 136 | err(1, "cant't open test file"); | ||
| 67 | 137 | ||
| 68 | fprintf(stderr, "Testing encap test vectors in %s\n", argv[1]); | ||
| 69 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 70 | MALLOC(buf, 16*1024); | ||
| 71 | state = S_COMMENT; | 138 | state = S_COMMENT; |
| 72 | test_number = 1; | 139 | line = 0; |
| 73 | while (fgets(buf, 16*1024, fp) != NULL) { | 140 | |
| 141 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 142 | const char *msg = state2str(state); | ||
| 143 | CBS cbs; | ||
| 144 | uint8_t u8; | ||
| 145 | |||
| 146 | line++; | ||
| 147 | CBS_init(&cbs, buf, len); | ||
| 148 | |||
| 149 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 150 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 151 | assert(u8 == '\n'); | ||
| 152 | |||
| 74 | switch (state) { | 153 | switch (state) { |
| 75 | case S_START: | 154 | case S_START: |
| 76 | if (strcmp(buf, "\n") != 0) | ||
| 77 | break; | ||
| 78 | state = S_COMMENT; | 155 | state = S_COMMENT; |
| 79 | break; | 156 | break; |
| 80 | case S_COMMENT: | 157 | case S_COMMENT: |
| 81 | if (strncmp(buf, "#", 1) != 0) | 158 | if (!CBS_get_u8(&cbs, &u8)) |
| 82 | break; | 159 | errx(1, "#%zu %s: CBB_get_u8", line, msg); |
| 160 | assert(u8 == '#'); | ||
| 161 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 162 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 83 | state = S_ENTROPY; | 163 | state = S_ENTROPY; |
| 84 | break; | 164 | break; |
| 85 | case S_ENTROPY: | 165 | case S_ENTROPY: |
| 86 | if (strncmp(buf, "entropy: ", strlen("entropy: ")) != 0) | 166 | if (!get_string_cbs(&cbs, "entropy: ", line, msg)) |
| 87 | break; | 167 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 88 | grab_data(&entropy, buf, strlen("entropy: ")); | 168 | hex_decode_cbs(&cbs, &entropy, line, msg); |
| 89 | p = CBS_data(&entropy); | ||
| 90 | state = S_PUBLIC_KEY; | 169 | state = S_PUBLIC_KEY; |
| 91 | break; | 170 | break; |
| 92 | case S_PUBLIC_KEY: | 171 | case S_PUBLIC_KEY: |
| 93 | if (strncmp(buf, "public_key: ", | 172 | if (!get_string_cbs(&cbs, "public_key = ", line, msg)) |
| 94 | strlen("public_key: ")) != 0) | 173 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 95 | break; | 174 | hex_decode_cbs(&cbs, &public_key, line, msg); |
| 96 | grab_data(&public_key, buf, strlen("public_key: ")); | ||
| 97 | p = CBS_data(&public_key); | ||
| 98 | state = S_RESULT; | 175 | state = S_RESULT; |
| 99 | break; | 176 | break; |
| 100 | case S_RESULT: | 177 | case S_RESULT: |
| 101 | if (strncmp(buf, "result: pass", | 178 | if (!get_string_cbs(&cbs, "result: ", line, msg)) |
| 102 | strlen("result: pass")) != 0) | 179 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 103 | should_fail = 1; | 180 | should_fail = get_string_cbs(&cbs, "fail", line, msg); |
| 104 | else | ||
| 105 | should_fail = 0; | ||
| 106 | state = S_CIPHERTEXT; | 181 | state = S_CIPHERTEXT; |
| 107 | break; | 182 | break; |
| 108 | case S_CIPHERTEXT: | 183 | case S_CIPHERTEXT: |
| 109 | if (strncmp(buf, "ciphertext: ", | 184 | if (!get_string_cbs(&cbs, "ciphertext: ", line, msg)) |
| 110 | strlen("ciphertext: ")) != 0) | 185 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 111 | break; | 186 | hex_decode_cbs(&cbs, &ciphertext, line, msg); |
| 112 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | 187 | state = S_SHARED_SECRET; |
| 113 | state = S_RESULT; | ||
| 114 | break; | 188 | break; |
| 115 | case S_SHARED_SECRET: | 189 | case S_SHARED_SECRET: |
| 116 | if (strncmp(buf, "shared_secret: ", | 190 | if (!get_string_cbs(&cbs, "shared_secret: ", line, msg)) |
| 117 | strlen("shared_secret: ")) != 0) | 191 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 118 | break; | 192 | hex_decode_cbs(&cbs, &shared_secret, line, msg); |
| 119 | grab_data(&shared_secret, buf, | 193 | |
| 120 | strlen("shared_secret: ")); | 194 | failed |= MlkemEncapFileTest(&entropy, &public_key, |
| 121 | MlkemEncapFileTest(&entropy, &public_key, &ciphertext, | 195 | &ciphertext, &shared_secret, should_fail, line); |
| 122 | &shared_secret, should_fail); | 196 | |
| 123 | free((void *)CBS_data(&ciphertext)); | ||
| 124 | free((void *)CBS_data(&shared_secret)); | ||
| 125 | free((void *)p); | ||
| 126 | |||
| 127 | test_number++; | ||
| 128 | state = S_START; | 197 | state = S_START; |
| 129 | break; | 198 | break; |
| 130 | } | 199 | } |
| 200 | if (CBS_len(&cbs) > 0) | ||
| 201 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 131 | } | 202 | } |
| 132 | |||
| 133 | free(buf); | 203 | free(buf); |
| 134 | exit(failure); | 204 | |
| 205 | if (ferror(fp)) | ||
| 206 | err(1, NULL); | ||
| 207 | fclose(fp); | ||
| 208 | |||
| 209 | return failed; | ||
| 135 | } | 210 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_iteration_test.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_iteration_test.c index 2b03a724ab..e6a4d4f906 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_iteration_test.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_iteration_test.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_iteration_test.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_iteration_test.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,32 +17,17 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <err.h> | ||
| 19 | #include <stdint.h> | 21 | #include <stdint.h> |
| 20 | #include <stdio.h> | 22 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 23 | #include <stdlib.h> |
| 22 | 24 | ||
| 23 | #include <openssl/bytestring.h> | 25 | #include "mlkem.h" |
| 24 | #include <openssl/mlkem.h> | ||
| 25 | 26 | ||
| 26 | #include "mlkem_internal.h" | 27 | #include "mlkem_internal.h" |
| 27 | #include "mlkem_tests_util.h" | 28 | #include "mlkem_tests_util.h" |
| 28 | #include "sha3_internal.h" | 29 | #include "sha3_internal.h" |
| 29 | 30 | ||
| 30 | static int | ||
| 31 | encode_private_key(const struct MLKEM1024_private_key *priv, uint8_t **out_buf, | ||
| 32 | size_t *out_len) | ||
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM1024_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | /* | 31 | /* |
| 46 | * The structure of this test is taken from | 32 | * The structure of this test is taken from |
| 47 | * https://github.com/C2SP/CCTV/blob/main/ML-KEM/README.md?ref=words.filippo.io#accumulated-pq-crystals-vectors | 33 | * https://github.com/C2SP/CCTV/blob/main/ML-KEM/README.md?ref=words.filippo.io#accumulated-pq-crystals-vectors |
| @@ -52,8 +38,8 @@ encode_private_key(const struct MLKEM1024_private_key *priv, uint8_t **out_buf, | |||
| 52 | * (The RNG stream starts with 7f9c2ba4e88f827d616045507605853e.) | 38 | * (The RNG stream starts with 7f9c2ba4e88f827d616045507605853e.) |
| 53 | */ | 39 | */ |
| 54 | 40 | ||
| 55 | static void | 41 | static int |
| 56 | MlkemIterativeTest() | 42 | MlkemIterativeTest(void) |
| 57 | { | 43 | { |
| 58 | /* https://github.com/C2SP/CCTV/tree/main/ML-KEM */ | 44 | /* https://github.com/C2SP/CCTV/tree/main/ML-KEM */ |
| 59 | /* | 45 | /* |
| @@ -101,8 +87,9 @@ MlkemIterativeTest() | |||
| 101 | */ | 87 | */ |
| 102 | shake_out(&drng, seed, sizeof(seed)); | 88 | shake_out(&drng, seed, sizeof(seed)); |
| 103 | if (i == 0) { | 89 | if (i == 0) { |
| 104 | TEST_DATAEQ(seed, kExpectedSeedStart, | 90 | if (compare_data(seed, kExpectedSeedStart, |
| 105 | sizeof(kExpectedSeedStart), "seed start"); | 91 | sizeof(kExpectedSeedStart), 0, "seed start") != 0) |
| 92 | errx(1, "compare_data"); | ||
| 106 | } | 93 | } |
| 107 | 94 | ||
| 108 | /* generate ek as encoded_public_key */ | 95 | /* generate ek as encoded_public_key */ |
| @@ -115,8 +102,9 @@ MlkemIterativeTest() | |||
| 115 | sizeof(encoded_public_key)); | 102 | sizeof(encoded_public_key)); |
| 116 | 103 | ||
| 117 | /* marshal priv to dk as encoded_private_key */ | 104 | /* marshal priv to dk as encoded_private_key */ |
| 118 | TEST(!encode_private_key(&priv, &encoded_private_key, | 105 | if (!mlkem1024_encode_private_key(&priv, &encoded_private_key, |
| 119 | &encoded_private_key_len), "encode_private_key"); | 106 | &encoded_private_key_len)) |
| 107 | errx(1, "mlkem1024_encode_private_key"); | ||
| 120 | 108 | ||
| 121 | /* hash in dk */ | 109 | /* hash in dk */ |
| 122 | shake_update(&results, encoded_private_key, | 110 | shake_update(&results, encoded_private_key, |
| @@ -141,21 +129,21 @@ MlkemIterativeTest() | |||
| 141 | sizeof(invalid_ciphertext)); | 129 | sizeof(invalid_ciphertext)); |
| 142 | 130 | ||
| 143 | /* generte k as shared secret from invalid ciphertext */ | 131 | /* generte k as shared secret from invalid ciphertext */ |
| 144 | TEST(!MLKEM1024_decap(shared_secret, invalid_ciphertext, | 132 | if (!MLKEM1024_decap(shared_secret, invalid_ciphertext, |
| 145 | sizeof(invalid_ciphertext), &priv), "decap failed!"); | 133 | sizeof(invalid_ciphertext), &priv)) |
| 134 | errx(1, "decap failed"); | ||
| 146 | 135 | ||
| 147 | /* hash in k */ | 136 | /* hash in k */ |
| 148 | shake_update(&results, shared_secret, sizeof(shared_secret)); | 137 | shake_update(&results, shared_secret, sizeof(shared_secret)); |
| 149 | } | 138 | } |
| 150 | shake_xof(&results); | 139 | shake_xof(&results); |
| 151 | shake_out(&results, out, 32); | 140 | shake_out(&results, out, sizeof(out)); |
| 152 | 141 | ||
| 153 | TEST_DATAEQ(out, kExpectedAdam, 32, "final result hash"); | 142 | return compare_data(kExpectedAdam, out, sizeof(out), i, "final result hash"); |
| 154 | } | 143 | } |
| 155 | 144 | ||
| 156 | int | 145 | int |
| 157 | main(int argc, char **argv) | 146 | main(int argc, char **argv) |
| 158 | { | 147 | { |
| 159 | MlkemIterativeTest(); | 148 | return MlkemIterativeTest(); |
| 160 | exit(failure); | ||
| 161 | } | 149 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_keygen_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_keygen_tests.c index 1b1a18bc22..559a6da36d 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_keygen_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_keygen_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_keygen_tests.c,v 1.4 2024/12/17 07:20:10 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_keygen_tests.c,v 1.5 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,115 +17,174 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static int | 32 | static int |
| 31 | encode_private_key(const struct MLKEM1024_private_key *priv, uint8_t **out_buf, | 33 | MlkemKeygenFileTest(CBB *seed_cbb, CBB *public_key_cbb, CBB *private_key_cbb, |
| 32 | size_t *out_len) | 34 | size_t line) |
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM1024_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | static void | ||
| 46 | MlkemKeygenFileTest(CBS *seed, CBS *public_key, CBS *private_key) | ||
| 47 | { | 35 | { |
| 48 | struct MLKEM1024_private_key priv; | 36 | struct MLKEM1024_private_key priv; |
| 37 | uint8_t *seed = NULL, *public_key = NULL, *private_key = NULL; | ||
| 38 | size_t seed_len = 0, public_key_len = 0, private_key_len = 0; | ||
| 49 | uint8_t *encoded_private_key = NULL; | 39 | uint8_t *encoded_private_key = NULL; |
| 50 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; | 40 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; |
| 51 | size_t len; | 41 | size_t len; |
| 42 | int failed = 1; | ||
| 43 | |||
| 44 | if (!CBB_finish(seed_cbb, &seed, &seed_len)) | ||
| 45 | goto err; | ||
| 46 | if (!compare_length(MLKEM_SEED_BYTES, seed_len, line, "seed length")) | ||
| 47 | goto err; | ||
| 48 | if (!CBB_finish(public_key_cbb, &public_key, &public_key_len)) | ||
| 49 | goto err; | ||
| 50 | if (!compare_length(MLKEM1024_PUBLIC_KEY_BYTES, public_key_len, line, | ||
| 51 | "public key length")) | ||
| 52 | goto err; | ||
| 53 | if (!CBB_finish(private_key_cbb, &private_key, &private_key_len)) | ||
| 54 | goto err; | ||
| 55 | if (!compare_length(MLKEM1024_PUBLIC_KEY_BYTES, public_key_len, line, | ||
| 56 | "public key length")) | ||
| 57 | goto err; | ||
| 52 | 58 | ||
| 53 | TEST(CBS_len(seed) != MLKEM_SEED_BYTES, "seed len bogus"); | ||
| 54 | TEST(CBS_len(private_key) != MLKEM1024_PRIVATE_KEY_BYTES, | ||
| 55 | "expected private key len bogus"); | ||
| 56 | TEST(CBS_len(public_key) != MLKEM1024_PUBLIC_KEY_BYTES, | ||
| 57 | "expected public key len bogus"); | ||
| 58 | MLKEM1024_generate_key_external_entropy(encoded_public_key, &priv, | 59 | MLKEM1024_generate_key_external_entropy(encoded_public_key, &priv, |
| 59 | CBS_data(seed)); | 60 | seed); |
| 60 | TEST(!encode_private_key(&priv, &encoded_private_key, | 61 | if (!mlkem1024_encode_private_key(&priv, &encoded_private_key, &len)) { |
| 61 | &len), "encode_private_key"); | 62 | warnx("#%zu: encoded_private_key", line); |
| 62 | TEST(len != MLKEM1024_PRIVATE_KEY_BYTES, "private key len bogus"); | 63 | goto err; |
| 63 | TEST_DATAEQ(encoded_public_key, CBS_data(public_key), | 64 | } |
| 64 | MLKEM1024_PUBLIC_KEY_BYTES, "public key"); | 65 | |
| 65 | TEST_DATAEQ(encoded_private_key, CBS_data(private_key), | 66 | if (!compare_length(MLKEM1024_PRIVATE_KEY_BYTES, len, line, |
| 66 | MLKEM1024_PRIVATE_KEY_BYTES, "private key"); | 67 | "private key length")) |
| 68 | goto err; | ||
| 69 | |||
| 70 | failed = compare_data(private_key, encoded_private_key, | ||
| 71 | MLKEM1024_PRIVATE_KEY_BYTES, line, "private key"); | ||
| 72 | failed |= compare_data(public_key, encoded_public_key, | ||
| 73 | MLKEM1024_PUBLIC_KEY_BYTES, line, "public key"); | ||
| 74 | |||
| 75 | err: | ||
| 76 | CBB_cleanup(seed_cbb); | ||
| 77 | CBB_cleanup(public_key_cbb); | ||
| 78 | CBB_cleanup(private_key_cbb); | ||
| 79 | freezero(seed, seed_len); | ||
| 80 | freezero(public_key, public_key_len); | ||
| 81 | freezero(private_key, private_key_len); | ||
| 67 | free(encoded_private_key); | 82 | free(encoded_private_key); |
| 83 | |||
| 84 | return failed; | ||
| 68 | } | 85 | } |
| 69 | 86 | ||
| 70 | #define S_START 0 | 87 | #define S_START 0 |
| 71 | #define S_SEED 1 | 88 | #define S_COMMENT 1 |
| 72 | #define S_PUBLIC_KEY 2 | 89 | #define S_SEED 2 |
| 73 | #define S_PRIVATE_KEY 3 | 90 | #define S_PUBLIC_KEY 3 |
| 91 | #define S_PRIVATE_KEY 4 | ||
| 92 | |||
| 93 | #define S2S(x) case x: return #x | ||
| 94 | |||
| 95 | static const char * | ||
| 96 | state2str(int state) | ||
| 97 | { | ||
| 98 | switch (state) { | ||
| 99 | S2S(S_START); | ||
| 100 | S2S(S_COMMENT); | ||
| 101 | S2S(S_SEED); | ||
| 102 | S2S(S_PUBLIC_KEY); | ||
| 103 | S2S(S_PRIVATE_KEY); | ||
| 104 | default: | ||
| 105 | errx(1, "unknown state %d", state); | ||
| 106 | } | ||
| 107 | } | ||
| 74 | 108 | ||
| 75 | int | 109 | int |
| 76 | main(int argc, char **argv) | 110 | main(int argc, char **argv) |
| 77 | { | 111 | { |
| 78 | CBS seed, public_key, private_key; | 112 | CBB seed = { 0 }, public_key = { 0 }, private_key = { 0 }; |
| 79 | char *buf; | 113 | const char *test; |
| 114 | size_t line = 0; | ||
| 115 | char *buf = NULL; | ||
| 116 | size_t buflen = 0; | ||
| 117 | ssize_t len; | ||
| 80 | FILE *fp; | 118 | FILE *fp; |
| 81 | int state; | 119 | int state; |
| 120 | int failed = 0; | ||
| 121 | |||
| 122 | if (argc < 2) | ||
| 123 | errx(1, "%s: missing test file", argv[0]); | ||
| 124 | |||
| 125 | test = argv[1]; | ||
| 126 | |||
| 127 | if ((fp = fopen(test, "r")) == NULL) | ||
| 128 | err(1, "cant't open test file"); | ||
| 129 | |||
| 130 | state = S_COMMENT; | ||
| 131 | line = 0; | ||
| 132 | |||
| 133 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 134 | const char *msg = state2str(state); | ||
| 135 | CBS cbs; | ||
| 136 | uint8_t u8; | ||
| 137 | |||
| 138 | line++; | ||
| 139 | CBS_init(&cbs, buf, len); | ||
| 140 | |||
| 141 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 142 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 143 | assert(u8 == '\n'); | ||
| 82 | 144 | ||
| 83 | fprintf(stderr, "Testing keygen test vectors in %s\n", argv[1]); | ||
| 84 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 85 | MALLOC(buf, 16*1024); | ||
| 86 | state = S_SEED; | ||
| 87 | test_number = 1; | ||
| 88 | while (fgets(buf, 16*1024, fp) != NULL) { | ||
| 89 | switch (state) { | 145 | switch (state) { |
| 90 | case S_START: | 146 | case S_START: |
| 91 | if (strcmp(buf, "\n") != 0) | 147 | state = S_COMMENT; |
| 92 | break; | 148 | break; |
| 149 | case S_COMMENT: | ||
| 150 | if (!CBS_get_u8(&cbs, &u8)) | ||
| 151 | errx(1, "#%zu %s: CBB_get_u8", line, msg); | ||
| 152 | assert(u8 == '#'); | ||
| 153 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 154 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 93 | state = S_SEED; | 155 | state = S_SEED; |
| 94 | break; | 156 | break; |
| 95 | case S_SEED: | 157 | case S_SEED: |
| 96 | if (strncmp(buf, "seed: ", strlen("seed: ")) != 0) { | 158 | if (!get_string_cbs(&cbs, "seed: ", line, msg)) |
| 97 | break; | 159 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 98 | } | 160 | hex_decode_cbs(&cbs, &seed, line, msg); |
| 99 | grab_data(&seed, buf, strlen("seed: ")); | ||
| 100 | state = S_PUBLIC_KEY; | 161 | state = S_PUBLIC_KEY; |
| 101 | break; | 162 | break; |
| 102 | case S_PUBLIC_KEY: | 163 | case S_PUBLIC_KEY: |
| 103 | if (strncmp(buf, "public_key: ", | 164 | if (!get_string_cbs(&cbs, "public_key: ", line, msg)) |
| 104 | strlen("public_key: ")) != 0) | 165 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 105 | break; | 166 | hex_decode_cbs(&cbs, &public_key, line, msg); |
| 106 | grab_data(&public_key, buf, strlen("public_key: ")); | ||
| 107 | state = S_PRIVATE_KEY; | 167 | state = S_PRIVATE_KEY; |
| 108 | break; | 168 | break; |
| 109 | case S_PRIVATE_KEY: | 169 | case S_PRIVATE_KEY: |
| 110 | if (strncmp(buf, "private_key: ", | 170 | if (!get_string_cbs(&cbs, "private_key: ", line, msg)) |
| 111 | strlen("private_key: ")) != 0) | 171 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 112 | break; | 172 | hex_decode_cbs(&cbs, &private_key, line, msg); |
| 113 | grab_data(&private_key, buf, strlen("private_key: ")); | ||
| 114 | state = S_START; | ||
| 115 | 173 | ||
| 116 | MlkemKeygenFileTest(&seed, &public_key, &private_key); | 174 | failed |= MlkemKeygenFileTest(&seed, &public_key, |
| 117 | free((void *)CBS_data(&seed)); | 175 | &private_key, line); |
| 118 | free((void *)CBS_data(&public_key)); | ||
| 119 | free((void *)CBS_data(&private_key)); | ||
| 120 | 176 | ||
| 121 | test_number++; | ||
| 122 | state = S_START; | 177 | state = S_START; |
| 123 | break; | 178 | break; |
| 124 | } | 179 | } |
| 180 | if (CBS_len(&cbs) > 0) | ||
| 181 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 125 | } | 182 | } |
| 126 | |||
| 127 | free(buf); | 183 | free(buf); |
| 184 | |||
| 185 | if (ferror(fp)) | ||
| 186 | err(1, NULL); | ||
| 128 | fclose(fp); | 187 | fclose(fp); |
| 129 | exit(failure); | 188 | |
| 189 | return failed; | ||
| 130 | } | 190 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_decap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_decap_tests.c index a59d062234..ba05de9f05 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_decap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_decap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_nist_decap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_nist_decap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,96 +17,177 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static void | 32 | static int |
| 31 | MlkemNistDecapFileTest(CBS *c, CBS *k, CBS *dk) | 33 | MlkemNistDecapFileTest(CBB *c_cbb, CBB *k_cbb, CBS *dk, size_t line) |
| 32 | { | 34 | { |
| 35 | uint8_t *c = NULL, *k = NULL; | ||
| 36 | size_t c_len = 0, k_len = 0; | ||
| 33 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | 37 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; |
| 34 | struct MLKEM1024_private_key priv; | 38 | struct MLKEM1024_private_key priv; |
| 39 | int failed = 1; | ||
| 35 | 40 | ||
| 36 | TEST(CBS_len(dk) != MLKEM1024_PRIVATE_KEY_BYTES, | 41 | if (!CBB_finish(c_cbb, &c, &c_len)) |
| 37 | "private key len bogus"); | 42 | goto err; |
| 38 | TEST(CBS_len(k) != MLKEM_SHARED_SECRET_BYTES, | 43 | if (!CBB_finish(k_cbb, &k, &k_len)) |
| 39 | "shared secret len bogus"); | 44 | goto err; |
| 40 | 45 | ||
| 41 | TEST(!MLKEM1024_parse_private_key(&priv, dk), "parse_private_key"); | 46 | if (!compare_length(MLKEM1024_PRIVATE_KEY_BYTES, CBS_len(dk), line, |
| 42 | TEST(!MLKEM1024_decap(shared_secret, CBS_data(c), CBS_len(c), &priv), | 47 | "private key len bogus")) |
| 43 | "decap"); | 48 | goto err; |
| 44 | TEST_DATAEQ(shared_secret, CBS_data(k), | 49 | if (!compare_length(MLKEM_SHARED_SECRET_BYTES, k_len, line, |
| 45 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 50 | "shared secret len bogus")) |
| 51 | goto err; | ||
| 52 | |||
| 53 | if (!MLKEM1024_parse_private_key(&priv, dk)) { | ||
| 54 | warnx("#%zu MLKEM1024_parse_private_key", line); | ||
| 55 | goto err; | ||
| 56 | } | ||
| 57 | if (!MLKEM1024_decap(shared_secret, c, c_len, &priv)) { | ||
| 58 | warnx("#%zu MLKEM1024_decap", line); | ||
| 59 | goto err; | ||
| 60 | } | ||
| 61 | |||
| 62 | failed = compare_data(shared_secret, k, k_len, line, "shared_secret"); | ||
| 63 | |||
| 64 | err: | ||
| 65 | CBB_cleanup(c_cbb); | ||
| 66 | CBB_cleanup(k_cbb); | ||
| 67 | freezero(c, c_len); | ||
| 68 | freezero(k, k_len); | ||
| 69 | |||
| 70 | return failed; | ||
| 46 | } | 71 | } |
| 47 | 72 | ||
| 48 | #define S_START 0 | 73 | #define S_START 0 |
| 49 | #define S_CIPHERTEXT 1 | 74 | #define S_C 1 |
| 50 | #define S_SHARED_SECRET 2 | 75 | #define S_K 2 |
| 51 | #define S_PRIVATE_KEY 3 | 76 | #define S_EMPTY 3 |
| 77 | |||
| 78 | #define S2S(x) case x: return #x | ||
| 79 | |||
| 80 | static const char * | ||
| 81 | state2str(int state) | ||
| 82 | { | ||
| 83 | switch (state) { | ||
| 84 | S2S(S_START); | ||
| 85 | S2S(S_C); | ||
| 86 | S2S(S_K); | ||
| 87 | S2S(S_EMPTY); | ||
| 88 | default: | ||
| 89 | errx(1, "unknown state %d", state); | ||
| 90 | } | ||
| 91 | } | ||
| 52 | 92 | ||
| 53 | int | 93 | int |
| 54 | main(int argc, char **argv) | 94 | main(int argc, char **argv) |
| 55 | { | 95 | { |
| 56 | CBS ciphertext, shared_secret, private_key; | 96 | CBB dk_cbb = { 0 }, c = { 0 }, k = { 0 }; |
| 57 | const uint8_t *p; | 97 | CBS instr; |
| 58 | char *buf; | 98 | uint8_t *dk = NULL; |
| 99 | size_t dk_len = 0; | ||
| 100 | uint8_t bracket, newline; | ||
| 101 | const char *test; | ||
| 102 | size_t line; | ||
| 103 | char *buf = NULL; | ||
| 104 | size_t buflen = 0; | ||
| 105 | ssize_t len; | ||
| 59 | FILE *fp; | 106 | FILE *fp; |
| 60 | int state; | 107 | int state; |
| 108 | int failed = 0; | ||
| 109 | |||
| 110 | if (argc < 2) | ||
| 111 | errx(1, "%s: missing test file", argv[0]); | ||
| 112 | |||
| 113 | test = argv[1]; | ||
| 114 | |||
| 115 | if ((fp = fopen(test, "r")) == NULL) | ||
| 116 | err(1, "cant't open test file"); | ||
| 117 | |||
| 118 | if ((len = getline(&buf, &buflen, fp)) == -1) | ||
| 119 | err(1, "failed to read instruction line"); | ||
| 120 | |||
| 121 | /* | ||
| 122 | * The private key is enclosed in brackets in an "instruction line". | ||
| 123 | */ | ||
| 124 | line = 1; | ||
| 125 | CBS_init(&instr, buf, len); | ||
| 126 | if (!CBS_get_u8(&instr, &bracket)) | ||
| 127 | err(1, "failed to parse instruction line '['"); | ||
| 128 | assert(bracket == '['); | ||
| 129 | if (!CBS_get_last_u8(&instr, &newline)) | ||
| 130 | errx(1, "failed to parse instruction line '\\n'"); | ||
| 131 | assert(newline == '\n'); | ||
| 132 | if (!CBS_get_last_u8(&instr, &bracket)) | ||
| 133 | errx(1, "failed to parse instruction line ']'"); | ||
| 134 | assert(bracket == ']'); | ||
| 135 | if (!get_string_cbs(&instr, "dk: ", line, "private key")) | ||
| 136 | errx(1, "failed to read instruction line 'dk: '"); | ||
| 137 | hex_decode_cbs(&instr, &dk_cbb, line, "private key"); | ||
| 138 | assert(CBS_len(&instr) == 0); | ||
| 139 | |||
| 140 | if (!CBB_finish(&dk_cbb, &dk, &dk_len)) | ||
| 141 | errx(1, "CBB finish instruction line"); | ||
| 142 | |||
| 143 | state = S_START; | ||
| 144 | |||
| 145 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 146 | const char *msg = state2str(state); | ||
| 147 | CBS cbs, dk_cbs; | ||
| 148 | uint8_t u8; | ||
| 149 | |||
| 150 | line++; | ||
| 151 | CBS_init(&cbs, buf, len); | ||
| 152 | |||
| 153 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 154 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 155 | assert(u8 == '\n'); | ||
| 61 | 156 | ||
| 62 | fprintf(stderr, "Testing NIST decap test vectors in %s\n", argv[1]); | ||
| 63 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 64 | MALLOC(buf, 16*1024); | ||
| 65 | state = S_CIPHERTEXT; | ||
| 66 | test_number = 1; | ||
| 67 | while (fgets(buf, 16*1024, fp) != NULL) { | ||
| 68 | switch (state) { | 157 | switch (state) { |
| 69 | case S_START: | 158 | case S_START: |
| 70 | if (strcmp(buf, "\n") != 0) | 159 | state = S_C; |
| 71 | break; | ||
| 72 | state = S_CIPHERTEXT; | ||
| 73 | break; | 160 | break; |
| 74 | case S_CIPHERTEXT: | 161 | case S_C: |
| 75 | if (strncmp(buf, "ciphertext: ", | 162 | if (!get_string_cbs(&cbs, "c: ", line, msg)) |
| 76 | strlen("ciphertext: ")) != 0) { | 163 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 77 | break; | 164 | hex_decode_cbs(&cbs, &c, line, msg); |
| 78 | } | 165 | state = S_K; |
| 79 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | ||
| 80 | state = S_SHARED_SECRET; | ||
| 81 | break; | 166 | break; |
| 82 | case S_SHARED_SECRET: | 167 | case S_K: |
| 83 | if (strncmp(buf, "shared_secret: ", | 168 | if (!get_string_cbs(&cbs, "k: ", line, msg)) |
| 84 | strlen("shared_secret: ")) != 0) | 169 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 85 | break; | 170 | hex_decode_cbs(&cbs, &k, line, msg); |
| 86 | grab_data(&shared_secret, buf, | 171 | state = S_EMPTY; |
| 87 | strlen("shared_secret: ")); | ||
| 88 | state = S_PRIVATE_KEY; | ||
| 89 | break; | 172 | break; |
| 90 | case S_PRIVATE_KEY: | 173 | case S_EMPTY: |
| 91 | if (strncmp(buf, "private_key: ", | 174 | CBS_init(&dk_cbs, dk, dk_len); |
| 92 | strlen("private_key: ")) != 0) | 175 | |
| 93 | break; | 176 | failed |= MlkemNistDecapFileTest(&c, &k, &dk_cbs, line); |
| 94 | grab_data(&private_key, buf, strlen("private_key: ")); | 177 | |
| 95 | p = CBS_data(&private_key); | 178 | state = S_C; |
| 96 | |||
| 97 | MlkemNistDecapFileTest(&ciphertext, &shared_secret, | ||
| 98 | &private_key); | ||
| 99 | free((void *)CBS_data(&ciphertext)); | ||
| 100 | free((void *)CBS_data(&shared_secret)); | ||
| 101 | free((void *)p); | ||
| 102 | |||
| 103 | state = S_START; | ||
| 104 | test_number++; | ||
| 105 | break; | 179 | break; |
| 106 | } | 180 | } |
| 181 | if (CBS_len(&cbs) > 0) | ||
| 182 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 107 | } | 183 | } |
| 108 | |||
| 109 | free(buf); | 184 | free(buf); |
| 110 | exit(failure); | 185 | |
| 186 | if (ferror(fp)) | ||
| 187 | err(1, NULL); | ||
| 188 | fclose(fp); | ||
| 189 | |||
| 190 | freezero(dk, dk_len); | ||
| 191 | |||
| 192 | return failed; | ||
| 111 | } | 193 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_keygen_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_keygen_tests.c index d293d121d4..e84f7dafc6 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_keygen_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem1024_nist_keygen_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem1024_nist_keygen_tests.c,v 1.3 2024/12/17 07:20:10 tb Exp $ */ | 1 | /* $OpenBSD: mlkem1024_nist_keygen_tests.c,v 1.4 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,123 +17,181 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static int | 32 | static int |
| 31 | encode_private_key(const struct MLKEM1024_private_key *priv, uint8_t **out_buf, | 33 | MlkemNistKeygenFileTest(CBB *z_cbb, CBB *d_cbb, CBB *ek_cbb, CBB *dk_cbb, |
| 32 | size_t *out_len) | 34 | size_t line) |
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM1024_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | static void | ||
| 46 | MlkemNistKeygenFileTest(CBS *z, CBS *d, CBS *ek, CBS *dk) | ||
| 47 | { | 35 | { |
| 36 | CBB seed_cbb; | ||
| 37 | uint8_t *z = NULL, *d = NULL, *ek = NULL, *dk = NULL; | ||
| 38 | size_t z_len = 0, d_len = 0, ek_len = 0, dk_len = 0; | ||
| 48 | uint8_t seed[MLKEM_SEED_BYTES]; | 39 | uint8_t seed[MLKEM_SEED_BYTES]; |
| 49 | struct MLKEM1024_private_key priv; | 40 | struct MLKEM1024_private_key priv; |
| 50 | uint8_t *encoded_private_key = NULL; | 41 | uint8_t *encoded_private_key = NULL; |
| 51 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; | 42 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; |
| 52 | size_t len; | 43 | size_t len; |
| 44 | int failed = 1; | ||
| 45 | |||
| 46 | if (!CBB_init_fixed(&seed_cbb, seed, sizeof(seed))) | ||
| 47 | goto err; | ||
| 48 | |||
| 49 | if (!CBB_finish(z_cbb, &z, &z_len)) | ||
| 50 | goto err; | ||
| 51 | if (!CBB_finish(d_cbb, &d, &d_len)) | ||
| 52 | goto err; | ||
| 53 | if (!CBB_finish(ek_cbb, &ek, &ek_len)) | ||
| 54 | goto err; | ||
| 55 | if (!CBB_finish(dk_cbb, &dk, &dk_len)) | ||
| 56 | goto err; | ||
| 57 | |||
| 58 | if (!CBB_add_bytes(&seed_cbb, d, d_len)) | ||
| 59 | goto err; | ||
| 60 | if (!CBB_add_bytes(&seed_cbb, z, z_len)) | ||
| 61 | goto err; | ||
| 62 | if (!CBB_finish(&seed_cbb, NULL, &len)) | ||
| 63 | goto err; | ||
| 64 | |||
| 65 | if (!compare_length(MLKEM_SEED_BYTES, len, line, "z or d length bogus")) | ||
| 66 | goto err; | ||
| 53 | 67 | ||
| 54 | TEST(CBS_len(d) != (MLKEM_SEED_BYTES / 2), "d len bogus"); | ||
| 55 | TEST(CBS_len(z) != (MLKEM_SEED_BYTES / 2), "z len bogus"); | ||
| 56 | TEST(CBS_len(dk) != MLKEM1024_PRIVATE_KEY_BYTES, | ||
| 57 | "expected private key len bogus"); | ||
| 58 | TEST(CBS_len(ek) != MLKEM1024_PUBLIC_KEY_BYTES, | ||
| 59 | "expected public key len bogus"); | ||
| 60 | memcpy(&seed[0], CBS_data(d), CBS_len(d)); | ||
| 61 | memcpy(&seed[MLKEM_SEED_BYTES / 2], CBS_data(z), CBS_len(z)); | ||
| 62 | MLKEM1024_generate_key_external_entropy(encoded_public_key, &priv, seed); | 68 | MLKEM1024_generate_key_external_entropy(encoded_public_key, &priv, seed); |
| 63 | TEST(!encode_private_key(&priv, &encoded_private_key, | 69 | |
| 64 | &len), "encode_private_key"); | 70 | if (!mlkem1024_encode_private_key(&priv, &encoded_private_key, &len)) { |
| 65 | TEST(len != MLKEM1024_PRIVATE_KEY_BYTES, "private key len bogus"); | 71 | warnx("#%zu mlkem1024_encode_private_key", line); |
| 66 | TEST_DATAEQ(encoded_public_key, CBS_data(ek), | 72 | goto err; |
| 67 | MLKEM1024_PUBLIC_KEY_BYTES, "public key"); | 73 | } |
| 68 | TEST_DATAEQ(encoded_private_key, CBS_data(dk), | 74 | |
| 69 | MLKEM1024_PRIVATE_KEY_BYTES, "private key"); | 75 | if (!compare_length(MLKEM1024_PRIVATE_KEY_BYTES, len, line, |
| 76 | "private key length")) | ||
| 77 | goto err; | ||
| 78 | |||
| 79 | failed = compare_data(ek, encoded_public_key, MLKEM1024_PUBLIC_KEY_BYTES, | ||
| 80 | line, "public key"); | ||
| 81 | failed |= compare_data(dk, encoded_private_key, MLKEM1024_PRIVATE_KEY_BYTES, | ||
| 82 | line, "private key"); | ||
| 83 | |||
| 84 | err: | ||
| 85 | CBB_cleanup(&seed_cbb); | ||
| 86 | CBB_cleanup(z_cbb); | ||
| 87 | CBB_cleanup(d_cbb); | ||
| 88 | CBB_cleanup(ek_cbb); | ||
| 89 | CBB_cleanup(dk_cbb); | ||
| 90 | freezero(z, z_len); | ||
| 91 | freezero(d, d_len); | ||
| 92 | freezero(ek, ek_len); | ||
| 93 | freezero(dk, dk_len); | ||
| 70 | free(encoded_private_key); | 94 | free(encoded_private_key); |
| 95 | |||
| 96 | return failed; | ||
| 71 | } | 97 | } |
| 72 | 98 | ||
| 73 | #define S_START 0 | 99 | #define S_START 0 |
| 74 | #define S_Z 1 | 100 | #define S_Z 1 |
| 75 | #define S_D 2 | 101 | #define S_D 2 |
| 76 | #define S_EK 3 | 102 | #define S_EK 3 |
| 77 | #define S_DK 4 | 103 | #define S_DK 4 |
| 104 | |||
| 105 | #define S2S(x) case x: return #x | ||
| 106 | |||
| 107 | static const char * | ||
| 108 | state2str(int state) | ||
| 109 | { | ||
| 110 | switch (state) { | ||
| 111 | S2S(S_START); | ||
| 112 | S2S(S_Z); | ||
| 113 | S2S(S_D); | ||
| 114 | S2S(S_EK); | ||
| 115 | S2S(S_DK); | ||
| 116 | default: | ||
| 117 | errx(1, "unknown state %d", state); | ||
| 118 | } | ||
| 119 | } | ||
| 78 | 120 | ||
| 79 | int | 121 | int |
| 80 | main(int argc, char **argv) | 122 | main(int argc, char **argv) |
| 81 | { | 123 | { |
| 82 | CBS z, d, ek, dk; | 124 | CBB z = { 0 }, d = { 0 }, ek = { 0 }, dk = { 0 }; |
| 83 | char *buf; | 125 | const char *test; |
| 126 | size_t line = 0; | ||
| 127 | char *buf = NULL; | ||
| 128 | size_t buflen = 0; | ||
| 129 | ssize_t len; | ||
| 84 | FILE *fp; | 130 | FILE *fp; |
| 85 | int state; | 131 | int state; |
| 132 | int failed = 0; | ||
| 133 | |||
| 134 | if (argc < 2) | ||
| 135 | errx(1, "%s: missing test file", argv[0]); | ||
| 136 | |||
| 137 | test = argv[1]; | ||
| 138 | |||
| 139 | if ((fp = fopen(test, "r")) == NULL) | ||
| 140 | err(1, "cant't open test file"); | ||
| 86 | 141 | ||
| 87 | fprintf(stderr, "Testing NIST keygen test vectors in %s\n", argv[1]); | ||
| 88 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 89 | MALLOC(buf, 16*1024); | ||
| 90 | state = S_Z; | 142 | state = S_Z; |
| 91 | test_number = 1; | 143 | line = 0; |
| 92 | while (fgets(buf, 16*1024, fp) != NULL) { | 144 | |
| 145 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 146 | const char *msg = state2str(state); | ||
| 147 | CBS cbs; | ||
| 148 | uint8_t u8; | ||
| 149 | |||
| 150 | line++; | ||
| 151 | CBS_init(&cbs, buf, len); | ||
| 152 | |||
| 153 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 154 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 155 | assert(u8 == '\n'); | ||
| 156 | |||
| 93 | switch (state) { | 157 | switch (state) { |
| 94 | case S_START: | 158 | case S_START: |
| 95 | if (strcmp(buf, "\n") != 0) | ||
| 96 | break; | ||
| 97 | state = S_Z; | 159 | state = S_Z; |
| 98 | break; | 160 | break; |
| 99 | case S_Z: | 161 | case S_Z: |
| 100 | if (strncmp(buf, "z: ", strlen("z: ")) != 0) { | 162 | if (!get_string_cbs(&cbs, "z: ", line, msg)) |
| 101 | break; | 163 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 102 | } | 164 | hex_decode_cbs(&cbs, &z, line, msg); |
| 103 | grab_data(&z, buf, strlen("z: ")); | ||
| 104 | state = S_D; | 165 | state = S_D; |
| 105 | break; | 166 | break; |
| 106 | case S_D: | 167 | case S_D: |
| 107 | if (strncmp(buf, "d: ", strlen("d: ")) != 0) | 168 | if (!get_string_cbs(&cbs, "d: ", line, msg)) |
| 108 | break; | 169 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 109 | grab_data(&d, buf, strlen("d: ")); | 170 | hex_decode_cbs(&cbs, &d, line, msg); |
| 110 | state = S_EK; | 171 | state = S_EK; |
| 111 | break; | 172 | break; |
| 112 | case S_EK: | 173 | case S_EK: |
| 113 | if (strncmp(buf, "ek: ", strlen("ek: ")) != 0) | 174 | if (!get_string_cbs(&cbs, "ek: ", line, msg)) |
| 114 | break; | 175 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 115 | grab_data(&ek, buf, strlen("ek: ")); | 176 | hex_decode_cbs(&cbs, &ek, line, msg); |
| 116 | state = S_DK; | 177 | state = S_DK; |
| 117 | break; | 178 | break; |
| 118 | case S_DK: | 179 | case S_DK: |
| 119 | if (strncmp(buf, "dk: ", strlen("dk: ")) != 0) | 180 | if (!get_string_cbs(&cbs, "dk: ", line, msg)) |
| 120 | break; | 181 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 121 | grab_data(&dk, buf, strlen("dk: ")); | 182 | hex_decode_cbs(&cbs, &dk, line, msg); |
| 122 | 183 | ||
| 123 | MlkemNistKeygenFileTest(&z, &d, &ek, &dk); | 184 | failed |= MlkemNistKeygenFileTest(&z, &d, &ek, &dk, line); |
| 124 | free((void *)CBS_data(&z)); | ||
| 125 | free((void *)CBS_data(&d)); | ||
| 126 | free((void *)CBS_data(&ek)); | ||
| 127 | free((void *)CBS_data(&dk)); | ||
| 128 | 185 | ||
| 129 | test_number++; | ||
| 130 | state = S_START; | 186 | state = S_START; |
| 131 | break; | 187 | break; |
| 132 | } | 188 | } |
| 133 | } | 189 | } |
| 134 | |||
| 135 | free(buf); | 190 | free(buf); |
| 191 | |||
| 192 | if (ferror(fp)) | ||
| 193 | err(1, NULL); | ||
| 136 | fclose(fp); | 194 | fclose(fp); |
| 137 | exit(failure); | 195 | |
| 196 | return failed; | ||
| 138 | } | 197 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_decap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem768_decap_tests.c index 96dc435c4d..a88e487494 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_decap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_decap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_decap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_decap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,113 +17,179 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_tests_util.h" | 29 | #include "mlkem_tests_util.h" |
| 28 | 30 | ||
| 29 | static void | 31 | static int |
| 30 | MlkemDecapFileTest(CBS *c, CBS *k, CBS *dk, int should_fail) | 32 | MlkemDecapFileTest(CBB *ciphertext_cbb, CBB *shared_secret_cbb, |
| 33 | CBB *private_key_cbb, int should_fail, size_t line) | ||
| 31 | { | 34 | { |
| 32 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | ||
| 33 | struct MLKEM768_private_key priv; | 35 | struct MLKEM768_private_key priv; |
| 34 | int parse_ok, decap_ok; | 36 | uint8_t *ciphertext = NULL, *shared_secret = NULL, *private_key = NULL; |
| 37 | size_t ciphertext_len = 0, shared_secret_len = 0, private_key_len = 0; | ||
| 38 | uint8_t shared_secret_buf[MLKEM_SHARED_SECRET_BYTES]; | ||
| 39 | CBS private_key_cbs; | ||
| 40 | int failed = 1; | ||
| 35 | 41 | ||
| 36 | parse_ok = MLKEM768_parse_private_key(&priv, dk); | 42 | if (!CBB_finish(ciphertext_cbb, &ciphertext, &ciphertext_len)) |
| 37 | if (!parse_ok) { | 43 | goto err; |
| 38 | TEST(!should_fail, "parse_private_key"); | 44 | if (!CBB_finish(shared_secret_cbb, &shared_secret, &shared_secret_len)) |
| 39 | return; | 45 | goto err; |
| 46 | if (!CBB_finish(private_key_cbb, &private_key, &private_key_len)) | ||
| 47 | goto err; | ||
| 48 | |||
| 49 | CBS_init(&private_key_cbs, private_key, private_key_len); | ||
| 50 | |||
| 51 | if (!MLKEM768_parse_private_key(&priv, &private_key_cbs)) { | ||
| 52 | if ((failed = !should_fail)) | ||
| 53 | warnx("#%zu: parse_private_key", line); | ||
| 54 | goto err; | ||
| 55 | } | ||
| 56 | if (!MLKEM768_decap(shared_secret_buf, ciphertext, ciphertext_len, | ||
| 57 | &priv)) { | ||
| 58 | if ((failed = !should_fail)) | ||
| 59 | warnx("#%zu: decap", line); | ||
| 60 | goto err; | ||
| 40 | } | 61 | } |
| 41 | decap_ok = MLKEM768_decap(shared_secret, CBS_data(c), CBS_len(c), | 62 | |
| 42 | &priv); | 63 | failed = compare_data(shared_secret, shared_secret_buf, |
| 43 | if (!decap_ok) { | 64 | MLKEM_SHARED_SECRET_BYTES, line, "shared_secret"); |
| 44 | TEST(!should_fail, "decap"); | 65 | |
| 45 | return; | 66 | if (should_fail != failed) { |
| 67 | warnx("FAIL: #%zu: should_fail %d, failed %d", | ||
| 68 | line, should_fail, failed); | ||
| 69 | failed = 1; | ||
| 46 | } | 70 | } |
| 47 | TEST_DATAEQ(shared_secret, CBS_data(k), | 71 | |
| 48 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 72 | err: |
| 73 | CBB_cleanup(ciphertext_cbb); | ||
| 74 | CBB_cleanup(shared_secret_cbb); | ||
| 75 | CBB_cleanup(private_key_cbb); | ||
| 76 | freezero(ciphertext, ciphertext_len); | ||
| 77 | freezero(shared_secret, shared_secret_len); | ||
| 78 | freezero(private_key, private_key_len); | ||
| 79 | |||
| 80 | return failed; | ||
| 49 | } | 81 | } |
| 50 | 82 | ||
| 51 | #define S_START 0 | 83 | #define S_START 0 |
| 52 | #define S_COMMENT 1 | 84 | #define S_COMMENT 1 |
| 53 | #define S_PRIVATE_KEY 2 | 85 | #define S_PRIVATE_KEY 2 |
| 54 | #define S_CIPHERTEXT 3 | 86 | #define S_CIPHERTEXT 3 |
| 55 | #define S_RESULT 4 | 87 | #define S_RESULT 4 |
| 56 | #define S_SHARED_SECRET 5 | 88 | #define S_SHARED_SECRET 5 |
| 89 | |||
| 90 | #define S2S(x) case x: return #x | ||
| 91 | |||
| 92 | static const char * | ||
| 93 | state2str(int state) | ||
| 94 | { | ||
| 95 | switch (state) { | ||
| 96 | S2S(S_START); | ||
| 97 | S2S(S_COMMENT); | ||
| 98 | S2S(S_PRIVATE_KEY); | ||
| 99 | S2S(S_CIPHERTEXT); | ||
| 100 | S2S(S_RESULT); | ||
| 101 | S2S(S_SHARED_SECRET); | ||
| 102 | default: | ||
| 103 | errx(1, "unknown state %d", state); | ||
| 104 | } | ||
| 105 | } | ||
| 57 | 106 | ||
| 58 | int | 107 | int |
| 59 | main(int argc, char **argv) | 108 | main(int argc, char **argv) |
| 60 | { | 109 | { |
| 61 | CBS ciphertext, shared_secret, private_key; | 110 | CBB ciphertext = { 0 }, shared_secret = { 0 }, private_key = { 0 }; |
| 62 | const uint8_t *p = NULL; | ||
| 63 | int should_fail = 0; | 111 | int should_fail = 0; |
| 64 | char *buf; | 112 | const char *test; |
| 113 | size_t line = 0; | ||
| 114 | char *buf = NULL; | ||
| 115 | size_t buflen = 0; | ||
| 116 | ssize_t len; | ||
| 65 | FILE *fp; | 117 | FILE *fp; |
| 66 | int state; | 118 | int state; |
| 119 | int failed = 0; | ||
| 120 | |||
| 121 | if (argc < 2) | ||
| 122 | errx(1, "%s: missing test file", argv[0]); | ||
| 123 | |||
| 124 | test = argv[1]; | ||
| 125 | |||
| 126 | if ((fp = fopen(test, "r")) == NULL) | ||
| 127 | err(1, "cant't open test file"); | ||
| 67 | 128 | ||
| 68 | fprintf(stderr, "Testing decap test vectors in %s\n", argv[1]); | ||
| 69 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 70 | MALLOC(buf, 16*1024); | ||
| 71 | state = S_COMMENT; | 129 | state = S_COMMENT; |
| 72 | test_number = 1; | 130 | line = 0; |
| 73 | while (fgets(buf, 16*1024, fp) != NULL) { | 131 | |
| 132 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 133 | const char *msg = state2str(state); | ||
| 134 | CBS cbs; | ||
| 135 | uint8_t u8; | ||
| 136 | |||
| 137 | line++; | ||
| 138 | CBS_init(&cbs, buf, len); | ||
| 139 | |||
| 140 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 141 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 142 | assert(u8 == '\n'); | ||
| 143 | |||
| 74 | switch (state) { | 144 | switch (state) { |
| 75 | case S_START: | 145 | case S_START: |
| 76 | if (strcmp(buf, "\n") != 0) | ||
| 77 | break; | ||
| 78 | state = S_COMMENT; | 146 | state = S_COMMENT; |
| 79 | break; | 147 | break; |
| 80 | case S_COMMENT: | 148 | case S_COMMENT: |
| 81 | if (strncmp(buf, "#", 1) != 0) | 149 | if (!CBS_get_u8(&cbs, &u8)) |
| 82 | break; | 150 | errx(1, "#%zu %s: CBB_get_u8", line, msg); |
| 151 | assert(u8 == '#'); | ||
| 152 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 153 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 83 | state = S_PRIVATE_KEY; | 154 | state = S_PRIVATE_KEY; |
| 84 | break; | 155 | break; |
| 85 | case S_PRIVATE_KEY: | 156 | case S_PRIVATE_KEY: |
| 86 | if (strncmp(buf, "private_key: ", | 157 | if (!get_string_cbs(&cbs, "private_key: ", line, msg)) |
| 87 | strlen("private_key: ")) != 0) | 158 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 88 | break; | 159 | hex_decode_cbs(&cbs, &private_key, line, msg); |
| 89 | grab_data(&private_key, buf, strlen("private_key: ")); | ||
| 90 | p = CBS_data(&private_key); | ||
| 91 | state = S_CIPHERTEXT; | 160 | state = S_CIPHERTEXT; |
| 92 | break; | 161 | break; |
| 93 | case S_CIPHERTEXT: | 162 | case S_CIPHERTEXT: |
| 94 | if (strncmp(buf, "ciphertext: ", | 163 | if (!get_string_cbs(&cbs, "ciphertext: ", line, msg)) |
| 95 | strlen("ciphertext: ")) != 0) | 164 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 96 | break; | 165 | hex_decode_cbs(&cbs, &ciphertext, line, msg); |
| 97 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | ||
| 98 | state = S_RESULT; | 166 | state = S_RESULT; |
| 99 | break; | 167 | break; |
| 100 | case S_RESULT: | 168 | case S_RESULT: |
| 101 | if (strncmp(buf, "result: pass", | 169 | if (!get_string_cbs(&cbs, "result: ", line, msg)) |
| 102 | strlen("result: pass")) != 0) | 170 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 103 | should_fail = 1; | 171 | should_fail = get_string_cbs(&cbs, "fail", line, msg); |
| 104 | else | ||
| 105 | should_fail = 0; | ||
| 106 | state = S_SHARED_SECRET; | 172 | state = S_SHARED_SECRET; |
| 107 | break; | 173 | break; |
| 108 | case S_SHARED_SECRET: | 174 | case S_SHARED_SECRET: |
| 109 | if (strncmp(buf, "shared_secret: ", | 175 | if (!get_string_cbs(&cbs, "shared_secret: ", line, msg)) |
| 110 | strlen("shared_secret: ")) != 0) | 176 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 111 | break; | 177 | hex_decode_cbs(&cbs, &shared_secret, line, msg); |
| 112 | grab_data(&shared_secret, buf, | 178 | |
| 113 | strlen("shared_secret: ")); | 179 | failed |= MlkemDecapFileTest(&ciphertext, &shared_secret, |
| 114 | MlkemDecapFileTest(&ciphertext, &shared_secret, | 180 | &private_key, should_fail, line); |
| 115 | &private_key, should_fail); | 181 | |
| 116 | free((void *)CBS_data(&ciphertext)); | ||
| 117 | free((void *)CBS_data(&shared_secret)); | ||
| 118 | free((void *)p); | ||
| 119 | |||
| 120 | test_number++; | ||
| 121 | state = S_START; | 182 | state = S_START; |
| 122 | break; | 183 | break; |
| 123 | } | 184 | } |
| 185 | if (CBS_len(&cbs) > 0) | ||
| 186 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 124 | } | 187 | } |
| 125 | |||
| 126 | free(buf); | 188 | free(buf); |
| 127 | exit(failure); | 189 | |
| 190 | if (ferror(fp)) | ||
| 191 | err(1, NULL); | ||
| 192 | fclose(fp); | ||
| 193 | |||
| 194 | return failed; | ||
| 128 | } | 195 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_encap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem768_encap_tests.c index be6c6149da..55e3fe66bb 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_encap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_encap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_encap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_encap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,120 +17,194 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 29 | #include "mlkem_internal.h" | ||
| 27 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 28 | 31 | ||
| 29 | static void | 32 | static int |
| 30 | MlkemEncapFileTest(CBS *entropy, CBS *public_key, CBS *expected_ciphertext, | 33 | MlkemEncapFileTest(CBB *entropy_cbb, CBB *pubkey_cbb, CBB *ciphertext_cbb, |
| 31 | CBS *expected_shared_secret, int should_fail) | 34 | CBB *shared_secret_cbb, int should_fail, size_t line) |
| 32 | { | 35 | { |
| 33 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | ||
| 34 | uint8_t ciphertext[MLKEM768_CIPHERTEXT_BYTES]; | ||
| 35 | struct MLKEM768_public_key pub; | 36 | struct MLKEM768_public_key pub; |
| 36 | int parse_ok; | 37 | uint8_t *entropy = NULL, *public_key = NULL, *ciphertext = NULL; |
| 38 | uint8_t *shared_secret = NULL; | ||
| 39 | size_t entropy_len = 0, public_key_len = 0, ciphertext_len = 0; | ||
| 40 | size_t shared_secret_len = 0; | ||
| 41 | uint8_t shared_secret_buf[MLKEM_SHARED_SECRET_BYTES]; | ||
| 42 | uint8_t ciphertext_buf[MLKEM768_CIPHERTEXT_BYTES]; | ||
| 43 | CBS public_key_cbs; | ||
| 44 | int failed = 1; | ||
| 37 | 45 | ||
| 38 | parse_ok = MLKEM768_parse_public_key(&pub, public_key); | 46 | if (!CBB_finish(entropy_cbb, &entropy, &entropy_len)) |
| 39 | if (!parse_ok) { | 47 | goto err; |
| 40 | TEST(!should_fail, "parse_public_key"); | 48 | if (!CBB_finish(pubkey_cbb, &public_key, &public_key_len)) |
| 41 | return; | 49 | goto err; |
| 50 | if (!CBB_finish(ciphertext_cbb, &ciphertext, &ciphertext_len)) | ||
| 51 | goto err; | ||
| 52 | if (!CBB_finish(shared_secret_cbb, &shared_secret, &shared_secret_len)) | ||
| 53 | goto err; | ||
| 54 | |||
| 55 | CBS_init(&public_key_cbs, public_key, public_key_len); | ||
| 56 | |||
| 57 | if (!MLKEM768_parse_public_key(&pub, &public_key_cbs)) { | ||
| 58 | if ((failed = !should_fail)) | ||
| 59 | warnx("#%zu: parse_public_key", line); | ||
| 60 | goto err; | ||
| 42 | } | 61 | } |
| 43 | MLKEM768_encap(ciphertext, shared_secret, &pub); | 62 | MLKEM768_encap_external_entropy(ciphertext_buf, shared_secret_buf, |
| 44 | TEST_DATAEQ(shared_secret, CBS_data(expected_shared_secret), | 63 | &pub, entropy); |
| 45 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 64 | |
| 46 | TEST_DATAEQ(ciphertext, CBS_data(expected_ciphertext), | 65 | failed = compare_data(shared_secret, shared_secret_buf, |
| 47 | MLKEM768_CIPHERTEXT_BYTES, "shared_secret"); | 66 | MLKEM_SHARED_SECRET_BYTES, line, "shared_secret"); |
| 67 | failed |= compare_data(ciphertext, ciphertext_buf, | ||
| 68 | MLKEM768_CIPHERTEXT_BYTES, line, "ciphertext"); | ||
| 69 | |||
| 70 | if (should_fail != failed) { | ||
| 71 | warnx("FAIL: #%zu: should_fail %d, failed %d", | ||
| 72 | line, should_fail, failed); | ||
| 73 | failed = 1; | ||
| 74 | } | ||
| 75 | |||
| 76 | err: | ||
| 77 | CBB_cleanup(entropy_cbb); | ||
| 78 | CBB_cleanup(pubkey_cbb); | ||
| 79 | CBB_cleanup(ciphertext_cbb); | ||
| 80 | CBB_cleanup(shared_secret_cbb); | ||
| 81 | freezero(entropy, entropy_len); | ||
| 82 | freezero(public_key, public_key_len); | ||
| 83 | freezero(ciphertext, ciphertext_len); | ||
| 84 | freezero(shared_secret, shared_secret_len); | ||
| 85 | |||
| 86 | return failed; | ||
| 48 | } | 87 | } |
| 49 | 88 | ||
| 50 | #define S_START 0 | 89 | #define S_START 0 |
| 51 | #define S_COMMENT 1 | 90 | #define S_COMMENT 1 |
| 52 | #define S_ENTROPY 2 | 91 | #define S_ENTROPY 2 |
| 53 | #define S_PUBLIC_KEY 3 | 92 | #define S_PUBLIC_KEY 3 |
| 54 | #define S_RESULT 4 | 93 | #define S_RESULT 4 |
| 55 | #define S_CIPHERTEXT 5 | 94 | #define S_CIPHERTEXT 5 |
| 56 | #define S_SHARED_SECRET 6 | 95 | #define S_SHARED_SECRET 6 |
| 96 | |||
| 97 | #define S2S(x) case x: return #x | ||
| 98 | |||
| 99 | static const char * | ||
| 100 | state2str(int state) | ||
| 101 | { | ||
| 102 | switch (state) { | ||
| 103 | S2S(S_START); | ||
| 104 | S2S(S_COMMENT); | ||
| 105 | S2S(S_ENTROPY); | ||
| 106 | S2S(S_PUBLIC_KEY); | ||
| 107 | S2S(S_RESULT); | ||
| 108 | S2S(S_CIPHERTEXT); | ||
| 109 | S2S(S_SHARED_SECRET); | ||
| 110 | default: | ||
| 111 | errx(1, "unknown state %d", state); | ||
| 112 | } | ||
| 113 | } | ||
| 57 | 114 | ||
| 58 | int | 115 | int |
| 59 | main(int argc, char **argv) | 116 | main(int argc, char **argv) |
| 60 | { | 117 | { |
| 61 | CBS entropy, public_key, ciphertext, shared_secret; | 118 | CBB entropy = { 0 }, public_key = { 0 }, ciphertext = { 0 }, shared_secret = { 0 }; |
| 62 | const uint8_t *p = NULL; | ||
| 63 | int should_fail = 0; | 119 | int should_fail = 0; |
| 64 | char *buf; | 120 | const char *test; |
| 121 | size_t line; | ||
| 122 | char *buf = NULL; | ||
| 123 | size_t buflen = 0; | ||
| 124 | ssize_t len; | ||
| 65 | FILE *fp; | 125 | FILE *fp; |
| 66 | int state; | 126 | int state; |
| 127 | int failed = 0; | ||
| 128 | |||
| 129 | if (argc < 2) | ||
| 130 | errx(1, "%s: missing test file", argv[0]); | ||
| 131 | |||
| 132 | test = argv[1]; | ||
| 133 | line = 0; | ||
| 134 | |||
| 135 | if ((fp = fopen(test, "r")) == NULL) | ||
| 136 | err(1, "cant't open test file"); | ||
| 67 | 137 | ||
| 68 | fprintf(stderr, "Testing encap test vectors in %s\n", argv[1]); | ||
| 69 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 70 | MALLOC(buf, 16*1024); | ||
| 71 | state = S_COMMENT; | 138 | state = S_COMMENT; |
| 72 | test_number = 1; | 139 | line = 0; |
| 73 | while (fgets(buf, 16*1024, fp) != NULL) { | 140 | |
| 141 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 142 | const char *msg = state2str(state); | ||
| 143 | CBS cbs; | ||
| 144 | uint8_t u8; | ||
| 145 | |||
| 146 | line++; | ||
| 147 | CBS_init(&cbs, buf, len); | ||
| 148 | |||
| 149 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 150 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 151 | assert(u8 == '\n'); | ||
| 152 | |||
| 74 | switch (state) { | 153 | switch (state) { |
| 75 | case S_START: | 154 | case S_START: |
| 76 | if (strcmp(buf, "\n") != 0) | ||
| 77 | break; | ||
| 78 | state = S_COMMENT; | 155 | state = S_COMMENT; |
| 79 | break; | 156 | break; |
| 80 | case S_COMMENT: | 157 | case S_COMMENT: |
| 81 | if (strncmp(buf, "#", 1) != 0) | 158 | if (!CBS_get_u8(&cbs, &u8)) |
| 82 | break; | 159 | errx(1, "#%zu %s: CBB_get_u8", line, msg); |
| 160 | assert(u8 == '#'); | ||
| 161 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 162 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 83 | state = S_ENTROPY; | 163 | state = S_ENTROPY; |
| 84 | break; | 164 | break; |
| 85 | case S_ENTROPY: | 165 | case S_ENTROPY: |
| 86 | if (strncmp(buf, "entropy: ", strlen("entropy: ")) != 0) | 166 | if (!get_string_cbs(&cbs, "entropy: ", line, msg)) |
| 87 | break; | 167 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 88 | grab_data(&entropy, buf, strlen("entropy: ")); | 168 | hex_decode_cbs(&cbs, &entropy, line, msg); |
| 89 | p = CBS_data(&entropy); | ||
| 90 | state = S_PUBLIC_KEY; | 169 | state = S_PUBLIC_KEY; |
| 91 | break; | 170 | break; |
| 92 | case S_PUBLIC_KEY: | 171 | case S_PUBLIC_KEY: |
| 93 | if (strncmp(buf, "public_key: ", | 172 | if (!get_string_cbs(&cbs, "public_key = ", line, msg)) |
| 94 | strlen("public_key: ")) != 0) | 173 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 95 | break; | 174 | hex_decode_cbs(&cbs, &public_key, line, msg); |
| 96 | grab_data(&public_key, buf, strlen("public_key: ")); | ||
| 97 | p = CBS_data(&public_key); | ||
| 98 | state = S_RESULT; | 175 | state = S_RESULT; |
| 99 | break; | 176 | break; |
| 100 | case S_RESULT: | 177 | case S_RESULT: |
| 101 | if (strncmp(buf, "result: pass", | 178 | if (!get_string_cbs(&cbs, "result: ", line, msg)) |
| 102 | strlen("result: pass")) != 0) | 179 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 103 | should_fail = 1; | 180 | should_fail = get_string_cbs(&cbs, "fail", line, msg); |
| 104 | else | ||
| 105 | should_fail = 0; | ||
| 106 | state = S_CIPHERTEXT; | 181 | state = S_CIPHERTEXT; |
| 107 | break; | 182 | break; |
| 108 | case S_CIPHERTEXT: | 183 | case S_CIPHERTEXT: |
| 109 | if (strncmp(buf, "ciphertext: ", | 184 | if (!get_string_cbs(&cbs, "ciphertext: ", line, msg)) |
| 110 | strlen("ciphertext: ")) != 0) | 185 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 111 | break; | 186 | hex_decode_cbs(&cbs, &ciphertext, line, msg); |
| 112 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | 187 | state = S_SHARED_SECRET; |
| 113 | state = S_RESULT; | ||
| 114 | break; | 188 | break; |
| 115 | case S_SHARED_SECRET: | 189 | case S_SHARED_SECRET: |
| 116 | if (strncmp(buf, "shared_secret: ", | 190 | if (!get_string_cbs(&cbs, "shared_secret: ", line, msg)) |
| 117 | strlen("shared_secret: ")) != 0) | 191 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 118 | break; | 192 | hex_decode_cbs(&cbs, &shared_secret, line, msg); |
| 119 | grab_data(&shared_secret, buf, | 193 | |
| 120 | strlen("shared_secret: ")); | 194 | failed |= MlkemEncapFileTest(&entropy, &public_key, |
| 121 | MlkemEncapFileTest(&entropy, &public_key, &ciphertext, | 195 | &ciphertext, &shared_secret, should_fail, line); |
| 122 | &shared_secret, should_fail); | 196 | |
| 123 | free((void *)CBS_data(&ciphertext)); | ||
| 124 | free((void *)CBS_data(&shared_secret)); | ||
| 125 | free((void *)p); | ||
| 126 | |||
| 127 | test_number++; | ||
| 128 | state = S_START; | 197 | state = S_START; |
| 129 | break; | 198 | break; |
| 130 | } | 199 | } |
| 200 | if (CBS_len(&cbs) > 0) | ||
| 201 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 131 | } | 202 | } |
| 132 | |||
| 133 | free(buf); | 203 | free(buf); |
| 134 | exit(failure); | 204 | |
| 205 | if (ferror(fp)) | ||
| 206 | err(1, NULL); | ||
| 207 | fclose(fp); | ||
| 208 | |||
| 209 | return failed; | ||
| 135 | } | 210 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_iteration_test.c b/src/regress/lib/libcrypto/mlkem/mlkem768_iteration_test.c index e9866134eb..9517980d7b 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_iteration_test.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_iteration_test.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_iteration_test.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_iteration_test.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,32 +17,17 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <err.h> | ||
| 19 | #include <stdint.h> | 21 | #include <stdint.h> |
| 20 | #include <stdio.h> | 22 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 23 | #include <stdlib.h> |
| 22 | 24 | ||
| 23 | #include <openssl/bytestring.h> | 25 | #include "mlkem.h" |
| 24 | #include <openssl/mlkem.h> | ||
| 25 | 26 | ||
| 26 | #include "mlkem_internal.h" | 27 | #include "mlkem_internal.h" |
| 27 | #include "mlkem_tests_util.h" | 28 | #include "mlkem_tests_util.h" |
| 28 | #include "sha3_internal.h" | 29 | #include "sha3_internal.h" |
| 29 | 30 | ||
| 30 | static int | ||
| 31 | encode_private_key(const struct MLKEM768_private_key *priv, uint8_t **out_buf, | ||
| 32 | size_t *out_len) | ||
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM768_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | /* | 31 | /* |
| 46 | * The structure of this test is taken from | 32 | * The structure of this test is taken from |
| 47 | * https://github.com/C2SP/CCTV/blob/main/ML-KEM/README.md?ref=words.filippo.io#accumulated-pq-crystals-vectors | 33 | * https://github.com/C2SP/CCTV/blob/main/ML-KEM/README.md?ref=words.filippo.io#accumulated-pq-crystals-vectors |
| @@ -52,8 +38,8 @@ encode_private_key(const struct MLKEM768_private_key *priv, uint8_t **out_buf, | |||
| 52 | * (The RNG stream starts with 7f9c2ba4e88f827d616045507605853e.) | 38 | * (The RNG stream starts with 7f9c2ba4e88f827d616045507605853e.) |
| 53 | */ | 39 | */ |
| 54 | 40 | ||
| 55 | static void | 41 | static int |
| 56 | MlkemIterativeTest() | 42 | MlkemIterativeTest(void) |
| 57 | { | 43 | { |
| 58 | /* https://github.com/C2SP/CCTV/tree/main/ML-KEM */ | 44 | /* https://github.com/C2SP/CCTV/tree/main/ML-KEM */ |
| 59 | /* | 45 | /* |
| @@ -64,6 +50,7 @@ MlkemIterativeTest() | |||
| 64 | 0x7f, 0x9c, 0x2b, 0xa4, 0xe8, 0x8f, 0x82, 0x7d, 0x61, 0x60, 0x45, | 50 | 0x7f, 0x9c, 0x2b, 0xa4, 0xe8, 0x8f, 0x82, 0x7d, 0x61, 0x60, 0x45, |
| 65 | 0x50, 0x76, 0x05, 0x85, 0x3e | 51 | 0x50, 0x76, 0x05, 0x85, 0x3e |
| 66 | }; | 52 | }; |
| 53 | |||
| 67 | /* | 54 | /* |
| 68 | * Filippo says: | 55 | * Filippo says: |
| 69 | * ML-KEM-768: f7db260e1137a742e05fe0db9525012812b004d29040a5b606aad3d134b548d3 | 56 | * ML-KEM-768: f7db260e1137a742e05fe0db9525012812b004d29040a5b606aad3d134b548d3 |
| @@ -100,8 +87,9 @@ MlkemIterativeTest() | |||
| 100 | */ | 87 | */ |
| 101 | shake_out(&drng, seed, sizeof(seed)); | 88 | shake_out(&drng, seed, sizeof(seed)); |
| 102 | if (i == 0) { | 89 | if (i == 0) { |
| 103 | TEST_DATAEQ(seed, kExpectedSeedStart, | 90 | if (compare_data(seed, kExpectedSeedStart, |
| 104 | sizeof(kExpectedSeedStart), "seed start"); | 91 | sizeof(kExpectedSeedStart), 0, "seed start") != 0) |
| 92 | errx(1, "compare_data"); | ||
| 105 | } | 93 | } |
| 106 | 94 | ||
| 107 | /* generate ek as encoded_public_key */ | 95 | /* generate ek as encoded_public_key */ |
| @@ -114,8 +102,9 @@ MlkemIterativeTest() | |||
| 114 | sizeof(encoded_public_key)); | 102 | sizeof(encoded_public_key)); |
| 115 | 103 | ||
| 116 | /* marshal priv to dk as encoded_private_key */ | 104 | /* marshal priv to dk as encoded_private_key */ |
| 117 | TEST(!encode_private_key(&priv, &encoded_private_key, | 105 | if (!mlkem768_encode_private_key(&priv, &encoded_private_key, |
| 118 | &encoded_private_key_len), "encode_private_key"); | 106 | &encoded_private_key_len)) |
| 107 | errx(1, "mlkem768_encode_private_key"); | ||
| 119 | 108 | ||
| 120 | /* hash in dk */ | 109 | /* hash in dk */ |
| 121 | shake_update(&results, encoded_private_key, | 110 | shake_update(&results, encoded_private_key, |
| @@ -140,21 +129,21 @@ MlkemIterativeTest() | |||
| 140 | sizeof(invalid_ciphertext)); | 129 | sizeof(invalid_ciphertext)); |
| 141 | 130 | ||
| 142 | /* generte k as shared secret from invalid ciphertext */ | 131 | /* generte k as shared secret from invalid ciphertext */ |
| 143 | TEST(!MLKEM768_decap(shared_secret, invalid_ciphertext, | 132 | if (!MLKEM768_decap(shared_secret, invalid_ciphertext, |
| 144 | sizeof(invalid_ciphertext), &priv), "decap failed!"); | 133 | sizeof(invalid_ciphertext), &priv)) |
| 134 | errx(1, "decap failed"); | ||
| 145 | 135 | ||
| 146 | /* hash in k */ | 136 | /* hash in k */ |
| 147 | shake_update(&results, shared_secret, sizeof(shared_secret)); | 137 | shake_update(&results, shared_secret, sizeof(shared_secret)); |
| 148 | } | 138 | } |
| 149 | shake_xof(&results); | 139 | shake_xof(&results); |
| 150 | shake_out(&results, out, 32); | 140 | shake_out(&results, out, sizeof(out)); |
| 151 | 141 | ||
| 152 | TEST_DATAEQ(out, kExpectedAdam, 32, "final result hash"); | 142 | return compare_data(kExpectedAdam, out, sizeof(out), i, "final result hash"); |
| 153 | } | 143 | } |
| 154 | 144 | ||
| 155 | int | 145 | int |
| 156 | main(int argc, char **argv) | 146 | main(int argc, char **argv) |
| 157 | { | 147 | { |
| 158 | MlkemIterativeTest(); | 148 | return MlkemIterativeTest(); |
| 159 | exit(failure); | ||
| 160 | } | 149 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_keygen_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem768_keygen_tests.c index 7214dd8a80..be1aff3d04 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_keygen_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_keygen_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_keygen_tests.c,v 1.4 2024/12/17 07:20:10 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_keygen_tests.c,v 1.5 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,115 +17,174 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static int | 32 | static int |
| 31 | encode_private_key(const struct MLKEM768_private_key *priv, uint8_t **out_buf, | 33 | MlkemKeygenFileTest(CBB *seed_cbb, CBB *public_key_cbb, CBB *private_key_cbb, |
| 32 | size_t *out_len) | 34 | size_t line) |
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM768_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | static void | ||
| 46 | MlkemKeygenFileTest(CBS *seed, CBS *public_key, CBS *private_key) | ||
| 47 | { | 35 | { |
| 48 | struct MLKEM768_private_key priv; | 36 | struct MLKEM768_private_key priv; |
| 37 | uint8_t *seed = NULL, *public_key = NULL, *private_key = NULL; | ||
| 38 | size_t seed_len = 0, public_key_len = 0, private_key_len = 0; | ||
| 49 | uint8_t *encoded_private_key = NULL; | 39 | uint8_t *encoded_private_key = NULL; |
| 50 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; | 40 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; |
| 51 | size_t len; | 41 | size_t len; |
| 42 | int failed = 1; | ||
| 43 | |||
| 44 | if (!CBB_finish(seed_cbb, &seed, &seed_len)) | ||
| 45 | goto err; | ||
| 46 | if (!compare_length(MLKEM_SEED_BYTES, seed_len, line, "seed length")) | ||
| 47 | goto err; | ||
| 48 | if (!CBB_finish(public_key_cbb, &public_key, &public_key_len)) | ||
| 49 | goto err; | ||
| 50 | if (!compare_length(MLKEM768_PUBLIC_KEY_BYTES, public_key_len, line, | ||
| 51 | "public key length")) | ||
| 52 | goto err; | ||
| 53 | if (!CBB_finish(private_key_cbb, &private_key, &private_key_len)) | ||
| 54 | goto err; | ||
| 55 | if (!compare_length(MLKEM768_PUBLIC_KEY_BYTES, public_key_len, line, | ||
| 56 | "public key length")) | ||
| 57 | goto err; | ||
| 52 | 58 | ||
| 53 | TEST(CBS_len(seed) != MLKEM_SEED_BYTES, "seed len bogus"); | ||
| 54 | TEST(CBS_len(private_key) != MLKEM768_PRIVATE_KEY_BYTES, | ||
| 55 | "expected private key len bogus"); | ||
| 56 | TEST(CBS_len(public_key) != MLKEM768_PUBLIC_KEY_BYTES, | ||
| 57 | "expected public key len bogus"); | ||
| 58 | MLKEM768_generate_key_external_entropy(encoded_public_key, &priv, | 59 | MLKEM768_generate_key_external_entropy(encoded_public_key, &priv, |
| 59 | CBS_data(seed)); | 60 | seed); |
| 60 | TEST(!encode_private_key(&priv, &encoded_private_key, | 61 | if (!mlkem768_encode_private_key(&priv, &encoded_private_key, &len)) { |
| 61 | &len), "encode_private_key"); | 62 | warnx("#%zu: encoded_private_key", line); |
| 62 | TEST(len != MLKEM768_PRIVATE_KEY_BYTES, "private key len bogus"); | 63 | goto err; |
| 63 | TEST_DATAEQ(encoded_public_key, CBS_data(public_key), | 64 | } |
| 64 | MLKEM768_PUBLIC_KEY_BYTES, "public key"); | 65 | |
| 65 | TEST_DATAEQ(encoded_private_key, CBS_data(private_key), | 66 | if (!compare_length(MLKEM768_PRIVATE_KEY_BYTES, len, line, |
| 66 | MLKEM768_PRIVATE_KEY_BYTES, "private key"); | 67 | "private key length")) |
| 68 | goto err; | ||
| 69 | |||
| 70 | failed = compare_data(private_key, encoded_private_key, | ||
| 71 | MLKEM768_PRIVATE_KEY_BYTES, line, "private key"); | ||
| 72 | failed |= compare_data(public_key, encoded_public_key, | ||
| 73 | MLKEM768_PUBLIC_KEY_BYTES, line, "public key"); | ||
| 74 | |||
| 75 | err: | ||
| 76 | CBB_cleanup(seed_cbb); | ||
| 77 | CBB_cleanup(public_key_cbb); | ||
| 78 | CBB_cleanup(private_key_cbb); | ||
| 79 | freezero(seed, seed_len); | ||
| 80 | freezero(public_key, public_key_len); | ||
| 81 | freezero(private_key, private_key_len); | ||
| 67 | free(encoded_private_key); | 82 | free(encoded_private_key); |
| 83 | |||
| 84 | return failed; | ||
| 68 | } | 85 | } |
| 69 | 86 | ||
| 70 | #define S_START 0 | 87 | #define S_START 0 |
| 71 | #define S_SEED 1 | 88 | #define S_COMMENT 1 |
| 72 | #define S_PUBLIC_KEY 2 | 89 | #define S_SEED 2 |
| 73 | #define S_PRIVATE_KEY 3 | 90 | #define S_PUBLIC_KEY 3 |
| 91 | #define S_PRIVATE_KEY 4 | ||
| 92 | |||
| 93 | #define S2S(x) case x: return #x | ||
| 94 | |||
| 95 | static const char * | ||
| 96 | state2str(int state) | ||
| 97 | { | ||
| 98 | switch (state) { | ||
| 99 | S2S(S_START); | ||
| 100 | S2S(S_COMMENT); | ||
| 101 | S2S(S_SEED); | ||
| 102 | S2S(S_PUBLIC_KEY); | ||
| 103 | S2S(S_PRIVATE_KEY); | ||
| 104 | default: | ||
| 105 | errx(1, "unknown state %d", state); | ||
| 106 | } | ||
| 107 | } | ||
| 74 | 108 | ||
| 75 | int | 109 | int |
| 76 | main(int argc, char **argv) | 110 | main(int argc, char **argv) |
| 77 | { | 111 | { |
| 78 | CBS seed, public_key, private_key; | 112 | CBB seed = { 0 }, public_key = { 0 }, private_key = { 0 }; |
| 79 | char *buf; | 113 | const char *test; |
| 114 | size_t line = 0; | ||
| 115 | char *buf = NULL; | ||
| 116 | size_t buflen = 0; | ||
| 117 | ssize_t len; | ||
| 80 | FILE *fp; | 118 | FILE *fp; |
| 81 | int state; | 119 | int state; |
| 120 | int failed = 0; | ||
| 121 | |||
| 122 | if (argc < 2) | ||
| 123 | errx(1, "%s: missing test file", argv[0]); | ||
| 124 | |||
| 125 | test = argv[1]; | ||
| 126 | |||
| 127 | if ((fp = fopen(test, "r")) == NULL) | ||
| 128 | err(1, "cant't open test file"); | ||
| 129 | |||
| 130 | state = S_COMMENT; | ||
| 131 | line = 0; | ||
| 132 | |||
| 133 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 134 | const char *msg = state2str(state); | ||
| 135 | CBS cbs; | ||
| 136 | uint8_t u8; | ||
| 137 | |||
| 138 | line++; | ||
| 139 | CBS_init(&cbs, buf, len); | ||
| 140 | |||
| 141 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 142 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 143 | assert(u8 == '\n'); | ||
| 82 | 144 | ||
| 83 | fprintf(stderr, "Testing keygen test vectors in %s\n", argv[1]); | ||
| 84 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 85 | MALLOC(buf, 16*1024); | ||
| 86 | state = S_SEED; | ||
| 87 | test_number = 1; | ||
| 88 | while (fgets(buf, 16*1024, fp) != NULL) { | ||
| 89 | switch (state) { | 145 | switch (state) { |
| 90 | case S_START: | 146 | case S_START: |
| 91 | if (strcmp(buf, "\n") != 0) | 147 | state = S_COMMENT; |
| 92 | break; | 148 | break; |
| 149 | case S_COMMENT: | ||
| 150 | if (!CBS_get_u8(&cbs, &u8)) | ||
| 151 | errx(1, "#%zu %s: CBB_get_u8", line, msg); | ||
| 152 | assert(u8 == '#'); | ||
| 153 | if (!CBS_skip(&cbs, CBS_len(&cbs))) | ||
| 154 | errx(1, "#%zu %s: CBB_skip", line, msg); | ||
| 93 | state = S_SEED; | 155 | state = S_SEED; |
| 94 | break; | 156 | break; |
| 95 | case S_SEED: | 157 | case S_SEED: |
| 96 | if (strncmp(buf, "seed: ", strlen("seed: ")) != 0) { | 158 | if (!get_string_cbs(&cbs, "seed: ", line, msg)) |
| 97 | break; | 159 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 98 | } | 160 | hex_decode_cbs(&cbs, &seed, line, msg); |
| 99 | grab_data(&seed, buf, strlen("seed: ")); | ||
| 100 | state = S_PUBLIC_KEY; | 161 | state = S_PUBLIC_KEY; |
| 101 | break; | 162 | break; |
| 102 | case S_PUBLIC_KEY: | 163 | case S_PUBLIC_KEY: |
| 103 | if (strncmp(buf, "public_key: ", | 164 | if (!get_string_cbs(&cbs, "public_key: ", line, msg)) |
| 104 | strlen("public_key: ")) != 0) | 165 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 105 | break; | 166 | hex_decode_cbs(&cbs, &public_key, line, msg); |
| 106 | grab_data(&public_key, buf, strlen("public_key: ")); | ||
| 107 | state = S_PRIVATE_KEY; | 167 | state = S_PRIVATE_KEY; |
| 108 | break; | 168 | break; |
| 109 | case S_PRIVATE_KEY: | 169 | case S_PRIVATE_KEY: |
| 110 | if (strncmp(buf, "private_key: ", | 170 | if (!get_string_cbs(&cbs, "private_key: ", line, msg)) |
| 111 | strlen("private_key: ")) != 0) | 171 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 112 | break; | 172 | hex_decode_cbs(&cbs, &private_key, line, msg); |
| 113 | grab_data(&private_key, buf, strlen("private_key: ")); | ||
| 114 | state = S_START; | ||
| 115 | 173 | ||
| 116 | MlkemKeygenFileTest(&seed, &public_key, &private_key); | 174 | failed |= MlkemKeygenFileTest(&seed, &public_key, |
| 117 | free((void *)CBS_data(&seed)); | 175 | &private_key, line); |
| 118 | free((void *)CBS_data(&public_key)); | ||
| 119 | free((void *)CBS_data(&private_key)); | ||
| 120 | 176 | ||
| 121 | test_number++; | ||
| 122 | state = S_START; | 177 | state = S_START; |
| 123 | break; | 178 | break; |
| 124 | } | 179 | } |
| 180 | if (CBS_len(&cbs) > 0) | ||
| 181 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 125 | } | 182 | } |
| 126 | |||
| 127 | free(buf); | 183 | free(buf); |
| 184 | |||
| 185 | if (ferror(fp)) | ||
| 186 | err(1, NULL); | ||
| 128 | fclose(fp); | 187 | fclose(fp); |
| 129 | exit(failure); | 188 | |
| 189 | return failed; | ||
| 130 | } | 190 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_nist_decap_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem768_nist_decap_tests.c index 0778c921b6..c72ad5c388 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_nist_decap_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_nist_decap_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_nist_decap_tests.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_nist_decap_tests.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,96 +17,177 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static void | 32 | static int |
| 31 | MlkemNistDecapFileTest(CBS *c, CBS *k, CBS *dk) | 33 | MlkemNistDecapFileTest(CBB *c_cbb, CBB *k_cbb, CBS *dk, size_t line) |
| 32 | { | 34 | { |
| 35 | uint8_t *c = NULL, *k = NULL; | ||
| 36 | size_t c_len = 0, k_len = 0; | ||
| 33 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; | 37 | uint8_t shared_secret[MLKEM_SHARED_SECRET_BYTES]; |
| 34 | struct MLKEM768_private_key priv; | 38 | struct MLKEM768_private_key priv; |
| 39 | int failed = 1; | ||
| 35 | 40 | ||
| 36 | TEST(CBS_len(dk) != MLKEM768_PRIVATE_KEY_BYTES, | 41 | if (!CBB_finish(c_cbb, &c, &c_len)) |
| 37 | "private key len bogus"); | 42 | goto err; |
| 38 | TEST(CBS_len(k) != MLKEM_SHARED_SECRET_BYTES, | 43 | if (!CBB_finish(k_cbb, &k, &k_len)) |
| 39 | "shared secret len bogus"); | 44 | goto err; |
| 40 | 45 | ||
| 41 | TEST(!MLKEM768_parse_private_key(&priv, dk), "parse_private_key"); | 46 | if (!compare_length(MLKEM768_PRIVATE_KEY_BYTES, CBS_len(dk), line, |
| 42 | TEST(!MLKEM768_decap(shared_secret, CBS_data(c), CBS_len(c), &priv), | 47 | "private key len bogus")) |
| 43 | "decap"); | 48 | goto err; |
| 44 | TEST_DATAEQ(shared_secret, CBS_data(k), | 49 | if (!compare_length(MLKEM_SHARED_SECRET_BYTES, k_len, line, |
| 45 | MLKEM_SHARED_SECRET_BYTES, "shared_secret"); | 50 | "shared secret len bogus")) |
| 51 | goto err; | ||
| 52 | |||
| 53 | if (!MLKEM768_parse_private_key(&priv, dk)) { | ||
| 54 | warnx("#%zu MLKEM768_parse_private_key", line); | ||
| 55 | goto err; | ||
| 56 | } | ||
| 57 | if (!MLKEM768_decap(shared_secret, c, c_len, &priv)) { | ||
| 58 | warnx("#%zu MLKEM768_decap", line); | ||
| 59 | goto err; | ||
| 60 | } | ||
| 61 | |||
| 62 | failed = compare_data(shared_secret, k, k_len, line, "shared_secret"); | ||
| 63 | |||
| 64 | err: | ||
| 65 | CBB_cleanup(c_cbb); | ||
| 66 | CBB_cleanup(k_cbb); | ||
| 67 | freezero(c, c_len); | ||
| 68 | freezero(k, k_len); | ||
| 69 | |||
| 70 | return failed; | ||
| 46 | } | 71 | } |
| 47 | 72 | ||
| 48 | #define S_START 0 | 73 | #define S_START 0 |
| 49 | #define S_CIPHERTEXT 1 | 74 | #define S_C 1 |
| 50 | #define S_SHARED_SECRET 2 | 75 | #define S_K 2 |
| 51 | #define S_PRIVATE_KEY 3 | 76 | #define S_EMPTY 3 |
| 77 | |||
| 78 | #define S2S(x) case x: return #x | ||
| 79 | |||
| 80 | static const char * | ||
| 81 | state2str(int state) | ||
| 82 | { | ||
| 83 | switch (state) { | ||
| 84 | S2S(S_START); | ||
| 85 | S2S(S_C); | ||
| 86 | S2S(S_K); | ||
| 87 | S2S(S_EMPTY); | ||
| 88 | default: | ||
| 89 | errx(1, "unknown state %d", state); | ||
| 90 | } | ||
| 91 | } | ||
| 52 | 92 | ||
| 53 | int | 93 | int |
| 54 | main(int argc, char **argv) | 94 | main(int argc, char **argv) |
| 55 | { | 95 | { |
| 56 | CBS ciphertext, shared_secret, private_key; | 96 | CBB dk_cbb = { 0 }, c = { 0 }, k = { 0 }; |
| 57 | const uint8_t *p; | 97 | CBS instr; |
| 58 | char *buf; | 98 | uint8_t *dk = NULL; |
| 99 | size_t dk_len = 0; | ||
| 100 | uint8_t bracket, newline; | ||
| 101 | const char *test; | ||
| 102 | size_t line; | ||
| 103 | char *buf = NULL; | ||
| 104 | size_t buflen = 0; | ||
| 105 | ssize_t len; | ||
| 59 | FILE *fp; | 106 | FILE *fp; |
| 60 | int state; | 107 | int state; |
| 108 | int failed = 0; | ||
| 109 | |||
| 110 | if (argc < 2) | ||
| 111 | errx(1, "%s: missing test file", argv[0]); | ||
| 112 | |||
| 113 | test = argv[1]; | ||
| 114 | |||
| 115 | if ((fp = fopen(test, "r")) == NULL) | ||
| 116 | err(1, "cant't open test file"); | ||
| 117 | |||
| 118 | if ((len = getline(&buf, &buflen, fp)) == -1) | ||
| 119 | err(1, "failed to read instruction line"); | ||
| 120 | |||
| 121 | /* | ||
| 122 | * The private key is enclosed in brackets in an "instruction line". | ||
| 123 | */ | ||
| 124 | line = 1; | ||
| 125 | CBS_init(&instr, buf, len); | ||
| 126 | if (!CBS_get_u8(&instr, &bracket)) | ||
| 127 | err(1, "failed to parse instruction line '['"); | ||
| 128 | assert(bracket == '['); | ||
| 129 | if (!CBS_get_last_u8(&instr, &newline)) | ||
| 130 | errx(1, "failed to parse instruction line '\\n'"); | ||
| 131 | assert(newline == '\n'); | ||
| 132 | if (!CBS_get_last_u8(&instr, &bracket)) | ||
| 133 | errx(1, "failed to parse instruction line ']'"); | ||
| 134 | assert(bracket == ']'); | ||
| 135 | if (!get_string_cbs(&instr, "dk: ", line, "private key")) | ||
| 136 | errx(1, "failed to read instruction line 'dk: '"); | ||
| 137 | hex_decode_cbs(&instr, &dk_cbb, line, "private key"); | ||
| 138 | assert(CBS_len(&instr) == 0); | ||
| 139 | |||
| 140 | if (!CBB_finish(&dk_cbb, &dk, &dk_len)) | ||
| 141 | errx(1, "CBB finish instruction line"); | ||
| 142 | |||
| 143 | state = S_START; | ||
| 144 | |||
| 145 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 146 | const char *msg = state2str(state); | ||
| 147 | CBS cbs, dk_cbs; | ||
| 148 | uint8_t u8; | ||
| 149 | |||
| 150 | line++; | ||
| 151 | CBS_init(&cbs, buf, len); | ||
| 152 | |||
| 153 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 154 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 155 | assert(u8 == '\n'); | ||
| 61 | 156 | ||
| 62 | fprintf(stderr, "Testing NIST decap test vectors in %s\n", argv[1]); | ||
| 63 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 64 | MALLOC(buf, 16*1024); | ||
| 65 | state = S_CIPHERTEXT; | ||
| 66 | test_number = 1; | ||
| 67 | while (fgets(buf, 16*1024, fp) != NULL) { | ||
| 68 | switch (state) { | 157 | switch (state) { |
| 69 | case S_START: | 158 | case S_START: |
| 70 | if (strcmp(buf, "\n") != 0) | 159 | state = S_C; |
| 71 | break; | ||
| 72 | state = S_CIPHERTEXT; | ||
| 73 | break; | 160 | break; |
| 74 | case S_CIPHERTEXT: | 161 | case S_C: |
| 75 | if (strncmp(buf, "ciphertext: ", | 162 | if (!get_string_cbs(&cbs, "c: ", line, msg)) |
| 76 | strlen("ciphertext: ")) != 0) { | 163 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 77 | break; | 164 | hex_decode_cbs(&cbs, &c, line, msg); |
| 78 | } | 165 | state = S_K; |
| 79 | grab_data(&ciphertext, buf, strlen("ciphertext: ")); | ||
| 80 | state = S_SHARED_SECRET; | ||
| 81 | break; | 166 | break; |
| 82 | case S_SHARED_SECRET: | 167 | case S_K: |
| 83 | if (strncmp(buf, "shared_secret: ", | 168 | if (!get_string_cbs(&cbs, "k: ", line, msg)) |
| 84 | strlen("shared_secret: ")) != 0) | 169 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 85 | break; | 170 | hex_decode_cbs(&cbs, &k, line, msg); |
| 86 | grab_data(&shared_secret, buf, | 171 | state = S_EMPTY; |
| 87 | strlen("shared_secret: ")); | ||
| 88 | state = S_PRIVATE_KEY; | ||
| 89 | break; | 172 | break; |
| 90 | case S_PRIVATE_KEY: | 173 | case S_EMPTY: |
| 91 | if (strncmp(buf, "private_key: ", | 174 | CBS_init(&dk_cbs, dk, dk_len); |
| 92 | strlen("private_key: ")) != 0) | 175 | |
| 93 | break; | 176 | failed |= MlkemNistDecapFileTest(&c, &k, &dk_cbs, line); |
| 94 | grab_data(&private_key, buf, strlen("private_key: ")); | 177 | |
| 95 | p = CBS_data(&private_key); | 178 | state = S_C; |
| 96 | |||
| 97 | MlkemNistDecapFileTest(&ciphertext, &shared_secret, | ||
| 98 | &private_key); | ||
| 99 | free((void *)CBS_data(&ciphertext)); | ||
| 100 | free((void *)CBS_data(&shared_secret)); | ||
| 101 | free((void *)p); | ||
| 102 | |||
| 103 | state = S_START; | ||
| 104 | test_number++; | ||
| 105 | break; | 179 | break; |
| 106 | } | 180 | } |
| 181 | if (CBS_len(&cbs) > 0) | ||
| 182 | errx(1, "#%zu %s: CBS_len", line, msg); | ||
| 107 | } | 183 | } |
| 108 | |||
| 109 | free(buf); | 184 | free(buf); |
| 110 | exit(failure); | 185 | |
| 186 | if (ferror(fp)) | ||
| 187 | err(1, NULL); | ||
| 188 | fclose(fp); | ||
| 189 | |||
| 190 | freezero(dk, dk_len); | ||
| 191 | |||
| 192 | return failed; | ||
| 111 | } | 193 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem768_nist_keygen_tests.c b/src/regress/lib/libcrypto/mlkem/mlkem768_nist_keygen_tests.c index c239a54d5e..1f58c4c699 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem768_nist_keygen_tests.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem768_nist_keygen_tests.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem768_nist_keygen_tests.c,v 1.3 2024/12/17 07:20:10 tb Exp $ */ | 1 | /* $OpenBSD: mlkem768_nist_keygen_tests.c,v 1.4 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,123 +17,181 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 17 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 18 | */ |
| 18 | 19 | ||
| 20 | #include <assert.h> | ||
| 21 | #include <err.h> | ||
| 19 | #include <stdint.h> | 22 | #include <stdint.h> |
| 20 | #include <stdio.h> | 23 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 24 | #include <stdlib.h> |
| 22 | #include <string.h> | ||
| 23 | 25 | ||
| 24 | #include <openssl/bytestring.h> | 26 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 27 | #include "mlkem.h" |
| 26 | 28 | ||
| 27 | #include "mlkem_internal.h" | 29 | #include "mlkem_internal.h" |
| 28 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 29 | 31 | ||
| 30 | static int | 32 | static int |
| 31 | encode_private_key(const struct MLKEM768_private_key *priv, uint8_t **out_buf, | 33 | MlkemNistKeygenFileTest(CBB *z_cbb, CBB *d_cbb, CBB *ek_cbb, CBB *dk_cbb, |
| 32 | size_t *out_len) | 34 | size_t line) |
| 33 | { | ||
| 34 | CBB cbb; | ||
| 35 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | ||
| 36 | return 0; | ||
| 37 | if (!MLKEM768_marshal_private_key(&cbb, priv)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | static void | ||
| 46 | MlkemNistKeygenFileTest(CBS *z, CBS *d, CBS *ek, CBS *dk) | ||
| 47 | { | 35 | { |
| 36 | CBB seed_cbb; | ||
| 37 | uint8_t *z = NULL, *d = NULL, *ek = NULL, *dk = NULL; | ||
| 38 | size_t z_len = 0, d_len = 0, ek_len = 0, dk_len = 0; | ||
| 48 | uint8_t seed[MLKEM_SEED_BYTES]; | 39 | uint8_t seed[MLKEM_SEED_BYTES]; |
| 49 | struct MLKEM768_private_key priv; | 40 | struct MLKEM768_private_key priv; |
| 50 | uint8_t *encoded_private_key = NULL; | 41 | uint8_t *encoded_private_key = NULL; |
| 51 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; | 42 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; |
| 52 | size_t len; | 43 | size_t len; |
| 44 | int failed = 1; | ||
| 45 | |||
| 46 | if (!CBB_init_fixed(&seed_cbb, seed, sizeof(seed))) | ||
| 47 | goto err; | ||
| 48 | |||
| 49 | if (!CBB_finish(z_cbb, &z, &z_len)) | ||
| 50 | goto err; | ||
| 51 | if (!CBB_finish(d_cbb, &d, &d_len)) | ||
| 52 | goto err; | ||
| 53 | if (!CBB_finish(ek_cbb, &ek, &ek_len)) | ||
| 54 | goto err; | ||
| 55 | if (!CBB_finish(dk_cbb, &dk, &dk_len)) | ||
| 56 | goto err; | ||
| 57 | |||
| 58 | if (!CBB_add_bytes(&seed_cbb, d, d_len)) | ||
| 59 | goto err; | ||
| 60 | if (!CBB_add_bytes(&seed_cbb, z, z_len)) | ||
| 61 | goto err; | ||
| 62 | if (!CBB_finish(&seed_cbb, NULL, &len)) | ||
| 63 | goto err; | ||
| 64 | |||
| 65 | if (!compare_length(MLKEM_SEED_BYTES, len, line, "z or d length bogus")) | ||
| 66 | goto err; | ||
| 53 | 67 | ||
| 54 | TEST(CBS_len(d) != (MLKEM_SEED_BYTES / 2), "d len bogus"); | ||
| 55 | TEST(CBS_len(z) != (MLKEM_SEED_BYTES / 2), "z len bogus"); | ||
| 56 | TEST(CBS_len(dk) != MLKEM768_PRIVATE_KEY_BYTES, | ||
| 57 | "expected private key len bogus"); | ||
| 58 | TEST(CBS_len(ek) != MLKEM768_PUBLIC_KEY_BYTES, | ||
| 59 | "expected public key len bogus"); | ||
| 60 | memcpy(&seed[0], CBS_data(d), CBS_len(d)); | ||
| 61 | memcpy(&seed[MLKEM_SEED_BYTES / 2], CBS_data(z), CBS_len(z)); | ||
| 62 | MLKEM768_generate_key_external_entropy(encoded_public_key, &priv, seed); | 68 | MLKEM768_generate_key_external_entropy(encoded_public_key, &priv, seed); |
| 63 | TEST(!encode_private_key(&priv, &encoded_private_key, | 69 | |
| 64 | &len), "encode_private_key"); | 70 | if (!mlkem768_encode_private_key(&priv, &encoded_private_key, &len)) { |
| 65 | TEST(len != MLKEM768_PRIVATE_KEY_BYTES, "private key len bogus"); | 71 | warnx("#%zu mlkem768_encode_private_key", line); |
| 66 | TEST_DATAEQ(encoded_public_key, CBS_data(ek), | 72 | goto err; |
| 67 | MLKEM768_PUBLIC_KEY_BYTES, "public key"); | 73 | } |
| 68 | TEST_DATAEQ(encoded_private_key, CBS_data(dk), | 74 | |
| 69 | MLKEM768_PRIVATE_KEY_BYTES, "private key"); | 75 | if (!compare_length(MLKEM768_PRIVATE_KEY_BYTES, len, line, |
| 76 | "private key length")) | ||
| 77 | goto err; | ||
| 78 | |||
| 79 | failed = compare_data(ek, encoded_public_key, MLKEM768_PUBLIC_KEY_BYTES, | ||
| 80 | line, "public key"); | ||
| 81 | failed |= compare_data(dk, encoded_private_key, MLKEM768_PRIVATE_KEY_BYTES, | ||
| 82 | line, "private key"); | ||
| 83 | |||
| 84 | err: | ||
| 85 | CBB_cleanup(&seed_cbb); | ||
| 86 | CBB_cleanup(z_cbb); | ||
| 87 | CBB_cleanup(d_cbb); | ||
| 88 | CBB_cleanup(ek_cbb); | ||
| 89 | CBB_cleanup(dk_cbb); | ||
| 90 | freezero(z, z_len); | ||
| 91 | freezero(d, d_len); | ||
| 92 | freezero(ek, ek_len); | ||
| 93 | freezero(dk, dk_len); | ||
| 70 | free(encoded_private_key); | 94 | free(encoded_private_key); |
| 95 | |||
| 96 | return failed; | ||
| 71 | } | 97 | } |
| 72 | 98 | ||
| 73 | #define S_START 0 | 99 | #define S_START 0 |
| 74 | #define S_Z 1 | 100 | #define S_Z 1 |
| 75 | #define S_D 2 | 101 | #define S_D 2 |
| 76 | #define S_EK 3 | 102 | #define S_EK 3 |
| 77 | #define S_DK 4 | 103 | #define S_DK 4 |
| 104 | |||
| 105 | #define S2S(x) case x: return #x | ||
| 106 | |||
| 107 | static const char * | ||
| 108 | state2str(int state) | ||
| 109 | { | ||
| 110 | switch (state) { | ||
| 111 | S2S(S_START); | ||
| 112 | S2S(S_Z); | ||
| 113 | S2S(S_D); | ||
| 114 | S2S(S_EK); | ||
| 115 | S2S(S_DK); | ||
| 116 | default: | ||
| 117 | errx(1, "unknown state %d", state); | ||
| 118 | } | ||
| 119 | } | ||
| 78 | 120 | ||
| 79 | int | 121 | int |
| 80 | main(int argc, char **argv) | 122 | main(int argc, char **argv) |
| 81 | { | 123 | { |
| 82 | CBS z, d, ek, dk; | 124 | CBB z = { 0 }, d = { 0 }, ek = { 0 }, dk = { 0 }; |
| 83 | char *buf; | 125 | const char *test; |
| 126 | size_t line = 0; | ||
| 127 | char *buf = NULL; | ||
| 128 | size_t buflen = 0; | ||
| 129 | ssize_t len; | ||
| 84 | FILE *fp; | 130 | FILE *fp; |
| 85 | int state; | 131 | int state; |
| 132 | int failed = 0; | ||
| 133 | |||
| 134 | if (argc < 2) | ||
| 135 | errx(1, "%s: missing test file", argv[0]); | ||
| 136 | |||
| 137 | test = argv[1]; | ||
| 138 | |||
| 139 | if ((fp = fopen(test, "r")) == NULL) | ||
| 140 | err(1, "cant't open test file"); | ||
| 86 | 141 | ||
| 87 | fprintf(stderr, "Testing NIST keygen test vectors in %s\n", argv[1]); | ||
| 88 | TEST((fp = fopen(argv[1], "r")) == NULL, "can't open test file"); | ||
| 89 | MALLOC(buf, 16*1024); | ||
| 90 | state = S_Z; | 142 | state = S_Z; |
| 91 | test_number = 1; | 143 | line = 0; |
| 92 | while (fgets(buf, 16*1024, fp) != NULL) { | 144 | |
| 145 | while ((len = getline(&buf, &buflen, fp)) != -1) { | ||
| 146 | const char *msg = state2str(state); | ||
| 147 | CBS cbs; | ||
| 148 | uint8_t u8; | ||
| 149 | |||
| 150 | line++; | ||
| 151 | CBS_init(&cbs, buf, len); | ||
| 152 | |||
| 153 | if (!CBS_get_last_u8(&cbs, &u8)) | ||
| 154 | errx(1, "#%zu %s: CBB_get_last_u8", line, msg); | ||
| 155 | assert(u8 == '\n'); | ||
| 156 | |||
| 93 | switch (state) { | 157 | switch (state) { |
| 94 | case S_START: | 158 | case S_START: |
| 95 | if (strcmp(buf, "\n") != 0) | ||
| 96 | break; | ||
| 97 | state = S_Z; | 159 | state = S_Z; |
| 98 | break; | 160 | break; |
| 99 | case S_Z: | 161 | case S_Z: |
| 100 | if (strncmp(buf, "z: ", strlen("z: ")) != 0) { | 162 | if (!get_string_cbs(&cbs, "z: ", line, msg)) |
| 101 | break; | 163 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 102 | } | 164 | hex_decode_cbs(&cbs, &z, line, msg); |
| 103 | grab_data(&z, buf, strlen("z: ")); | ||
| 104 | state = S_D; | 165 | state = S_D; |
| 105 | break; | 166 | break; |
| 106 | case S_D: | 167 | case S_D: |
| 107 | if (strncmp(buf, "d: ", strlen("d: ")) != 0) | 168 | if (!get_string_cbs(&cbs, "d: ", line, msg)) |
| 108 | break; | 169 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 109 | grab_data(&d, buf, strlen("d: ")); | 170 | hex_decode_cbs(&cbs, &d, line, msg); |
| 110 | state = S_EK; | 171 | state = S_EK; |
| 111 | break; | 172 | break; |
| 112 | case S_EK: | 173 | case S_EK: |
| 113 | if (strncmp(buf, "ek: ", strlen("ek: ")) != 0) | 174 | if (!get_string_cbs(&cbs, "ek: ", line, msg)) |
| 114 | break; | 175 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 115 | grab_data(&ek, buf, strlen("ek: ")); | 176 | hex_decode_cbs(&cbs, &ek, line, msg); |
| 116 | state = S_DK; | 177 | state = S_DK; |
| 117 | break; | 178 | break; |
| 118 | case S_DK: | 179 | case S_DK: |
| 119 | if (strncmp(buf, "dk: ", strlen("dk: ")) != 0) | 180 | if (!get_string_cbs(&cbs, "dk: ", line, msg)) |
| 120 | break; | 181 | errx(1, "#%zu %s: get_string_cbs", line, msg); |
| 121 | grab_data(&dk, buf, strlen("dk: ")); | 182 | hex_decode_cbs(&cbs, &dk, line, msg); |
| 122 | 183 | ||
| 123 | MlkemNistKeygenFileTest(&z, &d, &ek, &dk); | 184 | failed |= MlkemNistKeygenFileTest(&z, &d, &ek, &dk, line); |
| 124 | free((void *)CBS_data(&z)); | ||
| 125 | free((void *)CBS_data(&d)); | ||
| 126 | free((void *)CBS_data(&ek)); | ||
| 127 | free((void *)CBS_data(&dk)); | ||
| 128 | 185 | ||
| 129 | test_number++; | ||
| 130 | state = S_START; | 186 | state = S_START; |
| 131 | break; | 187 | break; |
| 132 | } | 188 | } |
| 133 | } | 189 | } |
| 134 | |||
| 135 | free(buf); | 190 | free(buf); |
| 191 | |||
| 192 | if (ferror(fp)) | ||
| 193 | err(1, NULL); | ||
| 136 | fclose(fp); | 194 | fclose(fp); |
| 137 | exit(failure); | 195 | |
| 196 | return failed; | ||
| 138 | } | 197 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.c b/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.c index c4c13f0e7a..50a93027e2 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.c | |||
| @@ -1,7 +1,8 @@ | |||
| 1 | /* $OpenBSD: mlkem_tests_util.c,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem_tests_util.c,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 5 | * | 6 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 7 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 8 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -19,15 +20,19 @@ | |||
| 19 | #include <err.h> | 20 | #include <err.h> |
| 20 | #include <stdint.h> | 21 | #include <stdint.h> |
| 21 | #include <stdio.h> | 22 | #include <stdio.h> |
| 22 | #include <stdlib.h> | ||
| 23 | #include <string.h> | 23 | #include <string.h> |
| 24 | 24 | ||
| 25 | #include "bytestring.h" | ||
| 26 | #include "mlkem.h" | ||
| 27 | |||
| 28 | #include "mlkem_internal.h" | ||
| 29 | |||
| 25 | #include "mlkem_tests_util.h" | 30 | #include "mlkem_tests_util.h" |
| 26 | 31 | ||
| 27 | int failure; | 32 | int failure; |
| 28 | int test_number; | 33 | int test_number; |
| 29 | 34 | ||
| 30 | void | 35 | static void |
| 31 | hexdump(const uint8_t *buf, size_t len, const uint8_t *compare) | 36 | hexdump(const uint8_t *buf, size_t len, const uint8_t *compare) |
| 32 | { | 37 | { |
| 33 | const char *mark = ""; | 38 | const char *mark = ""; |
| @@ -43,32 +48,171 @@ hexdump(const uint8_t *buf, size_t len, const uint8_t *compare) | |||
| 43 | } | 48 | } |
| 44 | 49 | ||
| 45 | int | 50 | int |
| 46 | hex_decode(char *buf, size_t len, uint8_t **out_buf, size_t *out_len) | 51 | compare_data(const uint8_t *want, const uint8_t *got, size_t len, size_t line, |
| 52 | const char *msg) | ||
| 47 | { | 53 | { |
| 48 | size_t i; | 54 | if (memcmp(want, got, len) == 0) |
| 49 | if (*out_buf != NULL) | 55 | return 0; |
| 50 | abort(); /* Du hast einin rotweinflarsche... */ | ||
| 51 | 56 | ||
| 52 | MALLOC(*out_buf, len); | 57 | warnx("FAIL: #%zu - %s differs", line, msg); |
| 53 | *out_len = 0; | 58 | fprintf(stderr, "want:\n"); |
| 59 | hexdump(want, len, got); | ||
| 60 | fprintf(stderr, "got:\n"); | ||
| 61 | hexdump(got, len, want); | ||
| 62 | fprintf(stderr, "\n"); | ||
| 54 | 63 | ||
| 55 | for (i = 0; i < len; i += 2) { | ||
| 56 | if (sscanf(buf + i, "%2hhx", *out_buf + *out_len) != 1) | ||
| 57 | err(1, "FAIL- hex decode failed for %d\n", | ||
| 58 | (int)*out_len); | ||
| 59 | (*out_len)++; | ||
| 60 | } | ||
| 61 | return 1; | 64 | return 1; |
| 62 | } | 65 | } |
| 63 | 66 | ||
| 67 | int | ||
| 68 | compare_length(size_t want, size_t got, size_t line, const char *msg) | ||
| 69 | { | ||
| 70 | if (want == got) | ||
| 71 | return 1; | ||
| 72 | |||
| 73 | warnx("#%zu: %s: want %zu, got %zu", line, msg, want, got); | ||
| 74 | return 0; | ||
| 75 | } | ||
| 76 | |||
| 77 | static int | ||
| 78 | hex_get_nibble_cbs(CBS *cbs, uint8_t *out_nibble) | ||
| 79 | { | ||
| 80 | uint8_t c; | ||
| 81 | |||
| 82 | if (!CBS_get_u8(cbs, &c)) | ||
| 83 | return 0; | ||
| 84 | |||
| 85 | if (c >= '0' && c <= '9') { | ||
| 86 | *out_nibble = c - '0'; | ||
| 87 | return 1; | ||
| 88 | } | ||
| 89 | if (c >= 'a' && c <= 'f') { | ||
| 90 | *out_nibble = c - 'a' + 10; | ||
| 91 | return 1; | ||
| 92 | } | ||
| 93 | if (c >= 'A' && c <= 'F') { | ||
| 94 | *out_nibble = c - 'A' + 10; | ||
| 95 | return 1; | ||
| 96 | } | ||
| 97 | |||
| 98 | return 0; | ||
| 99 | } | ||
| 100 | |||
| 64 | void | 101 | void |
| 65 | grab_data(CBS *cbs, char *buf, size_t offset) | 102 | hex_decode_cbs(CBS *cbs, CBB *cbb, size_t line, const char *msg) |
| 103 | { | ||
| 104 | if (!CBB_init(cbb, 0)) | ||
| 105 | errx(1, "#%zu %s: %s CBB_init", line, msg, __func__); | ||
| 106 | |||
| 107 | while (CBS_len(cbs) > 0) { | ||
| 108 | uint8_t hi, lo; | ||
| 109 | |||
| 110 | if (!hex_get_nibble_cbs(cbs, &hi)) | ||
| 111 | errx(1, "#%zu %s: %s nibble", line, msg, __func__); | ||
| 112 | if (!hex_get_nibble_cbs(cbs, &lo)) | ||
| 113 | errx(1, "#%zu %s: %s nibble", line, msg, __func__); | ||
| 114 | |||
| 115 | if (!CBB_add_u8(cbb, hi << 4 | lo)) | ||
| 116 | errx(1, "#%zu %s: %s CBB_add_u8", line, msg, __func__); | ||
| 117 | } | ||
| 118 | } | ||
| 119 | |||
| 120 | int | ||
| 121 | get_string_cbs(CBS *cbs_in, const char *str, size_t line, const char *msg) | ||
| 122 | { | ||
| 123 | CBS cbs; | ||
| 124 | size_t len = strlen(str); | ||
| 125 | |||
| 126 | if (!CBS_get_bytes(cbs_in, &cbs, len)) | ||
| 127 | errx(1, "#%zu %s: %s CBB_get_bytes", line, msg, __func__); | ||
| 128 | |||
| 129 | return CBS_mem_equal(&cbs, str, len); | ||
| 130 | } | ||
| 131 | |||
| 132 | int | ||
| 133 | mlkem768_encode_private_key(const struct MLKEM768_private_key *priv, | ||
| 134 | uint8_t **out_buf, size_t *out_len) | ||
| 135 | { | ||
| 136 | CBB cbb; | ||
| 137 | int ret = 0; | ||
| 138 | |||
| 139 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | ||
| 140 | goto err; | ||
| 141 | if (!MLKEM768_marshal_private_key(&cbb, priv)) | ||
| 142 | goto err; | ||
| 143 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 144 | goto err; | ||
| 145 | |||
| 146 | ret = 1; | ||
| 147 | |||
| 148 | err: | ||
| 149 | CBB_cleanup(&cbb); | ||
| 150 | |||
| 151 | return ret; | ||
| 152 | } | ||
| 153 | |||
| 154 | int | ||
| 155 | mlkem768_encode_public_key(const struct MLKEM768_public_key *pub, | ||
| 156 | uint8_t **out_buf, size_t *out_len) | ||
| 66 | { | 157 | { |
| 67 | char *start = buf + offset; | 158 | CBB cbb; |
| 68 | size_t len = strlen(start); | 159 | int ret = 0; |
| 69 | uint8_t *new = NULL; | 160 | |
| 70 | size_t new_len = 0; | 161 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) |
| 71 | /* This is hex encoded - decode it. */ | 162 | goto err; |
| 72 | TEST(!hex_decode(start, len - 1, &new, &new_len), "hex decode failed"); | 163 | if (!MLKEM768_marshal_public_key(&cbb, pub)) |
| 73 | CBS_init(cbs, new, new_len); | 164 | goto err; |
| 165 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 166 | goto err; | ||
| 167 | |||
| 168 | ret = 1; | ||
| 169 | |||
| 170 | err: | ||
| 171 | CBB_cleanup(&cbb); | ||
| 172 | |||
| 173 | return ret; | ||
| 174 | } | ||
| 175 | |||
| 176 | int | ||
| 177 | mlkem1024_encode_private_key(const struct MLKEM1024_private_key *priv, | ||
| 178 | uint8_t **out_buf, size_t *out_len) | ||
| 179 | { | ||
| 180 | CBB cbb; | ||
| 181 | int ret = 0; | ||
| 182 | |||
| 183 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 184 | goto err; | ||
| 185 | if (!MLKEM1024_marshal_private_key(&cbb, priv)) | ||
| 186 | goto err; | ||
| 187 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 188 | goto err; | ||
| 189 | |||
| 190 | ret = 1; | ||
| 191 | |||
| 192 | err: | ||
| 193 | CBB_cleanup(&cbb); | ||
| 194 | |||
| 195 | return ret; | ||
| 196 | } | ||
| 197 | |||
| 198 | int | ||
| 199 | mlkem1024_encode_public_key(const struct MLKEM1024_public_key *pub, | ||
| 200 | uint8_t **out_buf, size_t *out_len) | ||
| 201 | { | ||
| 202 | CBB cbb; | ||
| 203 | int ret = 0; | ||
| 204 | |||
| 205 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 206 | goto err; | ||
| 207 | if (!MLKEM1024_marshal_public_key(&cbb, pub)) | ||
| 208 | goto err; | ||
| 209 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 210 | goto err; | ||
| 211 | |||
| 212 | ret = 1; | ||
| 213 | |||
| 214 | err: | ||
| 215 | CBB_cleanup(&cbb); | ||
| 216 | |||
| 217 | return ret; | ||
| 74 | } | 218 | } |
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.h b/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.h index 934de44009..cbb0f83f8c 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.h +++ b/src/regress/lib/libcrypto/mlkem/mlkem_tests_util.h | |||
| @@ -1,6 +1,7 @@ | |||
| 1 | /* $OpenBSD: mlkem_tests_util.h,v 1.2 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem_tests_util.h,v 1.3 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 3 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 4 | * Copyright (c) 2024 Theo Buehler <tb@openbsd.org> | ||
| 4 | * | 5 | * |
| 5 | * Permission to use, copy, modify, and/or distribute this software for any | 6 | * Permission to use, copy, modify, and/or distribute this software for any |
| 6 | * purpose with or without fee is hereby granted, provided that the above | 7 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -18,47 +19,31 @@ | |||
| 18 | #ifndef MLKEM_TEST_UTIL_H | 19 | #ifndef MLKEM_TEST_UTIL_H |
| 19 | #define MLKEM_TEST_UTIL_H | 20 | #define MLKEM_TEST_UTIL_H |
| 20 | 21 | ||
| 22 | #include <stddef.h> | ||
| 21 | #include <stdint.h> | 23 | #include <stdint.h> |
| 22 | #include <stdio.h> | ||
| 23 | #include <stdlib.h> | ||
| 24 | #include <string.h> | ||
| 25 | 24 | ||
| 26 | #include <openssl/bytestring.h> | 25 | #include "bytestring.h" |
| 27 | 26 | ||
| 28 | #define TEST(cond, msg) do { \ | 27 | struct MLKEM1024_private_key; |
| 29 | if ((cond)) { \ | 28 | struct MLKEM1024_public_key; |
| 30 | failure = 1; \ | 29 | struct MLKEM768_private_key; |
| 31 | fprintf(stderr, "FAIL: %s:%d - Test %d: %s\n", \ | 30 | struct MLKEM768_public_key; |
| 32 | __FILE__, __LINE__, test_number, msg); \ | ||
| 33 | } \ | ||
| 34 | } while(0) | ||
| 35 | 31 | ||
| 36 | #define MALLOC(A, B) do { \ | 32 | /* XXX - return values of the two compare functions are inconsistent */ |
| 37 | if (((A) = malloc(B)) == NULL) { \ | 33 | int compare_data(const uint8_t *want, const uint8_t *got, size_t len, |
| 38 | failure = 1; \ | 34 | size_t line, const char *msg); |
| 39 | fprintf(stderr, "FAIL: %s:%d - Test %d: malloc\n", \ | 35 | int compare_length(size_t want, size_t got, size_t line, const char *msg); |
| 40 | __FILE__, __LINE__, test_number); \ | ||
| 41 | exit(1); \ | ||
| 42 | } \ | ||
| 43 | } while(0) | ||
| 44 | 36 | ||
| 45 | #define TEST_DATAEQ(values, expected, len, msg) do { \ | 37 | void hex_decode_cbs(CBS *cbs, CBB *cbb, size_t line, const char *msg); |
| 46 | if (memcmp((values), (expected), (len)) != 0) { \ | 38 | int get_string_cbs(CBS *cbs, const char *str, size_t line, const char *msg); |
| 47 | failure = 1; \ | ||
| 48 | fprintf(stderr, "FAIL: %s:%d - Test %d: %s differs\n", \ | ||
| 49 | __FILE__, __LINE__, test_number, msg); \ | ||
| 50 | fprintf(stderr, "values:\n"); \ | ||
| 51 | hexdump(values, len, expected); \ | ||
| 52 | fprintf(stderr, "expected:\n"); \ | ||
| 53 | hexdump(expected, len, values); \ | ||
| 54 | fprintf(stderr, "\n"); \ | ||
| 55 | } \ | ||
| 56 | } while(0) | ||
| 57 | 39 | ||
| 58 | extern int failure, test_number; | 40 | int mlkem768_encode_private_key(const struct MLKEM768_private_key *priv, |
| 41 | uint8_t **out_buf, size_t *out_len); | ||
| 42 | int mlkem768_encode_public_key(const struct MLKEM768_public_key *pub, | ||
| 43 | uint8_t **out_buf, size_t *out_len); | ||
| 44 | int mlkem1024_encode_private_key(const struct MLKEM1024_private_key *priv, | ||
| 45 | uint8_t **out_buf, size_t *out_len); | ||
| 46 | int mlkem1024_encode_public_key(const struct MLKEM1024_public_key *pub, | ||
| 47 | uint8_t **out_buf, size_t *out_len); | ||
| 59 | 48 | ||
| 60 | void hexdump(const uint8_t *buf, size_t len, const uint8_t *compare); | 49 | #endif /* MLKEM_TEST_UTIL_H */ |
| 61 | int hex_decode(char *buf, size_t len, uint8_t **out_buf, size_t *out_len); | ||
| 62 | void grab_data(CBS *cbs, char *buf, size_t offset); | ||
| 63 | |||
| 64 | #endif | ||
diff --git a/src/regress/lib/libcrypto/mlkem/mlkem_unittest.c b/src/regress/lib/libcrypto/mlkem/mlkem_unittest.c index b8779135e5..18bf128bea 100644 --- a/src/regress/lib/libcrypto/mlkem/mlkem_unittest.c +++ b/src/regress/lib/libcrypto/mlkem/mlkem_unittest.c | |||
| @@ -1,7 +1,7 @@ | |||
| 1 | /* $OpenBSD: mlkem_unittest.c,v 1.3 2024/12/14 19:16:24 tb Exp $ */ | 1 | /* $OpenBSD: mlkem_unittest.c,v 1.4 2024/12/20 00:07:12 tb Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2024, Google Inc. | 3 | * Copyright (c) 2024 Google Inc. |
| 4 | * Copyright (c) 2024, Bob Beck <beck@obtuse.com> | 4 | * Copyright (c) 2024 Bob Beck <beck@obtuse.com> |
| 5 | * | 5 | * |
| 6 | * Permission to use, copy, modify, and/or distribute this software for any | 6 | * Permission to use, copy, modify, and/or distribute this software for any |
| 7 | * purpose with or without fee is hereby granted, provided that the above | 7 | * purpose with or without fee is hereby granted, provided that the above |
| @@ -16,52 +16,22 @@ | |||
| 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 16 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 17 | */ | 17 | */ |
| 18 | 18 | ||
| 19 | #include <err.h> | ||
| 19 | #include <stdint.h> | 20 | #include <stdint.h> |
| 20 | #include <stdio.h> | 21 | #include <stdio.h> |
| 21 | #include <stdlib.h> | 22 | #include <stdlib.h> |
| 22 | #include <string.h> | 23 | #include <string.h> |
| 23 | 24 | ||
| 24 | #include <openssl/bytestring.h> | 25 | #include "bytestring.h" |
| 25 | #include <openssl/mlkem.h> | 26 | #include "mlkem.h" |
| 26 | 27 | ||
| 27 | #include "mlkem_internal.h" | ||
| 28 | #include "mlkem_tests_util.h" | 28 | #include "mlkem_tests_util.h" |
| 29 | 29 | ||
| 30 | static int | 30 | static int |
| 31 | encode_public_key(const struct MLKEM768_public_key *pub, uint8_t **out_buf, | 31 | MlKem768UnitTest(void) |
| 32 | size_t *out_len) | ||
| 33 | { | 32 | { |
| 34 | CBB cbb; | 33 | struct MLKEM768_private_key priv = { 0 }, priv2 = { 0 }; |
| 35 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | 34 | struct MLKEM768_public_key pub = { 0 }, pub2 = { 0 }; |
| 36 | return 0; | ||
| 37 | if (!MLKEM768_marshal_public_key(&cbb, pub)) | ||
| 38 | return 0; | ||
| 39 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 40 | return 0; | ||
| 41 | CBB_cleanup(&cbb); | ||
| 42 | return 1; | ||
| 43 | } | ||
| 44 | |||
| 45 | static int | ||
| 46 | encode_private_key(const struct MLKEM768_private_key *priv, uint8_t **out_buf, | ||
| 47 | size_t *out_len) | ||
| 48 | { | ||
| 49 | CBB cbb; | ||
| 50 | if (!CBB_init(&cbb, MLKEM768_PUBLIC_KEY_BYTES)) | ||
| 51 | return 0; | ||
| 52 | if (!MLKEM768_marshal_private_key(&cbb, priv)) | ||
| 53 | return 0; | ||
| 54 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 55 | return 0; | ||
| 56 | CBB_cleanup(&cbb); | ||
| 57 | return 1; | ||
| 58 | } | ||
| 59 | |||
| 60 | static void | ||
| 61 | MlKem768UnitTest() | ||
| 62 | { | ||
| 63 | struct MLKEM768_private_key *priv, *priv2; | ||
| 64 | struct MLKEM768_public_key *pub, *pub2; | ||
| 65 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; | 35 | uint8_t encoded_public_key[MLKEM768_PUBLIC_KEY_BYTES]; |
| 66 | uint8_t ciphertext[MLKEM768_CIPHERTEXT_BYTES]; | 36 | uint8_t ciphertext[MLKEM768_CIPHERTEXT_BYTES]; |
| 67 | uint8_t shared_secret1[MLKEM_SHARED_SECRET_BYTES]; | 37 | uint8_t shared_secret1[MLKEM_SHARED_SECRET_BYTES]; |
| @@ -70,123 +40,138 @@ MlKem768UnitTest() | |||
| 70 | uint8_t *encoded_private_key = NULL, *tmp_buf = NULL; | 40 | uint8_t *encoded_private_key = NULL, *tmp_buf = NULL; |
| 71 | size_t encoded_private_key_len, tmp_buf_len; | 41 | size_t encoded_private_key_len, tmp_buf_len; |
| 72 | CBS cbs; | 42 | CBS cbs; |
| 43 | int failed = 0; | ||
| 73 | 44 | ||
| 74 | fprintf(stderr, "ML-KEM 768...\n"); | 45 | MLKEM768_generate_key(encoded_public_key, NULL, &priv); |
| 75 | |||
| 76 | MALLOC(priv, sizeof(struct MLKEM768_private_key)); | ||
| 77 | MLKEM768_generate_key(encoded_public_key, NULL, priv); | ||
| 78 | 46 | ||
| 79 | memcpy(first_two_bytes, encoded_public_key, sizeof(first_two_bytes)); | 47 | memcpy(first_two_bytes, encoded_public_key, sizeof(first_two_bytes)); |
| 80 | memset(encoded_public_key, 0xff, sizeof(first_two_bytes)); | 48 | memset(encoded_public_key, 0xff, sizeof(first_two_bytes)); |
| 81 | CBS_init(&cbs, encoded_public_key, | 49 | |
| 82 | sizeof(encoded_public_key)); | 50 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); |
| 83 | MALLOC(pub, sizeof(struct MLKEM768_public_key)); | 51 | |
| 84 | /* Parsing should fail because the first coefficient is >= kPrime; */ | 52 | /* Parsing should fail because the first coefficient is >= kPrime. */ |
| 85 | TEST(MLKEM768_parse_public_key(pub, &cbs), | 53 | if (MLKEM768_parse_public_key(&pub, &cbs)) { |
| 86 | "Kyber_parse_public_key should have failed"); | 54 | warnx("MLKEM768_parse_public_key should have failed"); |
| 55 | failed |= 1; | ||
| 56 | } | ||
| 87 | 57 | ||
| 88 | memcpy(encoded_public_key, first_two_bytes, sizeof(first_two_bytes)); | 58 | memcpy(encoded_public_key, first_two_bytes, sizeof(first_two_bytes)); |
| 89 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); | 59 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); |
| 90 | TEST(!MLKEM768_parse_public_key(pub, &cbs), | 60 | if (!MLKEM768_parse_public_key(&pub, &cbs)) { |
| 91 | "MLKEM768_parse_public_key"); | 61 | warnx("MLKEM768_parse_public_key"); |
| 92 | TEST(CBS_len(&cbs) != 0u, "CBS_len must be 0"); | 62 | failed |= 1; |
| 93 | 63 | } | |
| 94 | TEST(!encode_public_key(pub, &tmp_buf, &tmp_buf_len), | 64 | |
| 95 | "encode_public_key"); | 65 | if (CBS_len(&cbs) != 0u) { |
| 96 | TEST(sizeof(encoded_public_key) != tmp_buf_len, | 66 | warnx("CBS_len must be 0"); |
| 97 | "encoded public key lengths differ"); | 67 | failed |= 1; |
| 98 | TEST_DATAEQ(tmp_buf, encoded_public_key, tmp_buf_len, | 68 | } |
| 99 | "encoded public keys"); | 69 | |
| 70 | if (!mlkem768_encode_public_key(&pub, &tmp_buf, &tmp_buf_len)) { | ||
| 71 | warnx("encode_public_key"); | ||
| 72 | failed |= 1; | ||
| 73 | } | ||
| 74 | if (sizeof(encoded_public_key) != tmp_buf_len) { | ||
| 75 | warnx("mlkem768 encoded public key lengths differ"); | ||
| 76 | failed |= 1; | ||
| 77 | } | ||
| 78 | |||
| 79 | if (compare_data(encoded_public_key, tmp_buf, tmp_buf_len, 768, | ||
| 80 | "encoded public keys") != 0) { | ||
| 81 | warnx("compare_data"); | ||
| 82 | failed |= 1; | ||
| 83 | } | ||
| 100 | free(tmp_buf); | 84 | free(tmp_buf); |
| 101 | tmp_buf = NULL; | 85 | tmp_buf = NULL; |
| 102 | 86 | ||
| 103 | MALLOC(pub2, sizeof(struct MLKEM768_public_key)); | 87 | MLKEM768_public_from_private(&pub2, &priv); |
| 104 | MLKEM768_public_from_private(pub2, priv); | 88 | if (!mlkem768_encode_public_key(&pub2, &tmp_buf, &tmp_buf_len)) { |
| 105 | TEST(!encode_public_key(pub2, &tmp_buf, &tmp_buf_len), | 89 | warnx("mlkem768_encode_public_key"); |
| 106 | "encode_public_key"); | 90 | failed |= 1; |
| 107 | TEST(sizeof(encoded_public_key) != tmp_buf_len, | 91 | } |
| 108 | "encoded public key lengths differ"); | 92 | if (sizeof(encoded_public_key) != tmp_buf_len) { |
| 109 | TEST_DATAEQ(tmp_buf, encoded_public_key, tmp_buf_len, | 93 | warnx("mlkem768 encoded public key lengths differ"); |
| 110 | "encoded pubic keys"); | 94 | failed |= 1; |
| 95 | } | ||
| 96 | |||
| 97 | if (compare_data(encoded_public_key, tmp_buf, tmp_buf_len, 768, | ||
| 98 | "encoded public keys") != 0) { | ||
| 99 | warnx("compare_data"); | ||
| 100 | failed |= 1; | ||
| 101 | } | ||
| 111 | free(tmp_buf); | 102 | free(tmp_buf); |
| 112 | tmp_buf = NULL; | 103 | tmp_buf = NULL; |
| 113 | 104 | ||
| 114 | TEST(!encode_private_key(priv, &encoded_private_key, | 105 | if (!mlkem768_encode_private_key(&priv, &encoded_private_key, |
| 115 | &encoded_private_key_len), "encode_private_key"); | 106 | &encoded_private_key_len)) { |
| 107 | warnx("mlkem768_encode_private_key"); | ||
| 108 | failed |= 1; | ||
| 109 | } | ||
| 116 | 110 | ||
| 117 | memcpy(first_two_bytes, encoded_private_key, sizeof(first_two_bytes)); | 111 | memcpy(first_two_bytes, encoded_private_key, sizeof(first_two_bytes)); |
| 118 | memset(encoded_private_key, 0xff, sizeof(first_two_bytes)); | 112 | memset(encoded_private_key, 0xff, sizeof(first_two_bytes)); |
| 119 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); | 113 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); |
| 120 | MALLOC(priv2, sizeof(struct MLKEM768_private_key)); | 114 | |
| 121 | /* Parsing should fail because the first coefficient is >= kPrime. */ | 115 | /* Parsing should fail because the first coefficient is >= kPrime. */ |
| 122 | TEST(MLKEM768_parse_private_key(priv2, &cbs), "Should not have parsed"); | 116 | if (MLKEM768_parse_private_key(&priv2, &cbs)) { |
| 117 | warnx("MLKEM768_parse_private_key should have failed"); | ||
| 118 | failed |= 1; | ||
| 119 | } | ||
| 123 | 120 | ||
| 124 | memcpy(encoded_private_key, first_two_bytes, sizeof(first_two_bytes)); | 121 | memcpy(encoded_private_key, first_two_bytes, sizeof(first_two_bytes)); |
| 125 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); | 122 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); |
| 126 | TEST(!MLKEM768_parse_private_key(priv2, &cbs), | 123 | |
| 127 | "MLKEM768_parse_private_key"); | 124 | if (!MLKEM768_parse_private_key(&priv2, &cbs)) { |
| 128 | TEST(!encode_private_key(priv2, &tmp_buf, &tmp_buf_len), | 125 | warnx("MLKEM768_parse_private_key"); |
| 129 | "encode_private_key"); | 126 | failed |= 1; |
| 130 | TEST(encoded_private_key_len != tmp_buf_len, | 127 | } |
| 131 | "encoded private key lengths differ"); | 128 | |
| 132 | TEST_DATAEQ(tmp_buf, encoded_private_key, encoded_private_key_len, | 129 | if (!mlkem768_encode_private_key(&priv2, &tmp_buf, &tmp_buf_len)) { |
| 133 | "encoded private keys"); | 130 | warnx("mlkem768_encode_private_key"); |
| 131 | failed |= 1; | ||
| 132 | } | ||
| 133 | |||
| 134 | if (encoded_private_key_len != tmp_buf_len) { | ||
| 135 | warnx("mlkem768 encode private key lengths differ"); | ||
| 136 | failed |= 1; | ||
| 137 | } | ||
| 138 | |||
| 139 | if (compare_data(encoded_private_key, tmp_buf, tmp_buf_len, 768, | ||
| 140 | "encoded private key") != 0) { | ||
| 141 | warnx("compare_data"); | ||
| 142 | failed |= 1; | ||
| 143 | } | ||
| 144 | |||
| 134 | free(tmp_buf); | 145 | free(tmp_buf); |
| 135 | tmp_buf = NULL; | 146 | tmp_buf = NULL; |
| 136 | 147 | ||
| 137 | MLKEM768_encap(ciphertext, shared_secret1, pub); | 148 | MLKEM768_encap(ciphertext, shared_secret1, &pub); |
| 138 | MLKEM768_decap(shared_secret2, ciphertext, MLKEM768_CIPHERTEXT_BYTES, | 149 | MLKEM768_decap(shared_secret2, ciphertext, MLKEM768_CIPHERTEXT_BYTES, |
| 139 | priv); | 150 | &priv); |
| 140 | TEST_DATAEQ(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, | 151 | if (compare_data(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, |
| 141 | "shared secrets with priv"); | 152 | 768, "shared secrets with priv") != 0) { |
| 153 | warnx("compare_data"); | ||
| 154 | failed |= 1; | ||
| 155 | } | ||
| 156 | |||
| 142 | MLKEM768_decap(shared_secret2, ciphertext, MLKEM768_CIPHERTEXT_BYTES, | 157 | MLKEM768_decap(shared_secret2, ciphertext, MLKEM768_CIPHERTEXT_BYTES, |
| 143 | priv2); | 158 | &priv2); |
| 144 | TEST_DATAEQ(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, | 159 | if (compare_data(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, |
| 145 | "shared secrets with priv2"); | 160 | 768, "shared secrets with priv2") != 0) { |
| 161 | warnx("compare_data"); | ||
| 162 | failed |= 1; | ||
| 163 | } | ||
| 146 | 164 | ||
| 147 | free(encoded_private_key); | 165 | free(encoded_private_key); |
| 148 | free(pub); | ||
| 149 | free(pub2); | ||
| 150 | free(priv); | ||
| 151 | free(priv2); | ||
| 152 | |||
| 153 | } | ||
| 154 | 166 | ||
| 155 | static int | 167 | return failed; |
| 156 | encode_1024public_key(const struct MLKEM1024_public_key *pub, uint8_t **out_buf, | ||
| 157 | size_t *out_len) | ||
| 158 | { | ||
| 159 | CBB cbb; | ||
| 160 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 161 | return 0; | ||
| 162 | if (!MLKEM1024_marshal_public_key(&cbb, pub)) | ||
| 163 | return 0; | ||
| 164 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 165 | return 0; | ||
| 166 | CBB_cleanup(&cbb); | ||
| 167 | return 1; | ||
| 168 | } | 168 | } |
| 169 | 169 | ||
| 170 | static int | 170 | static int |
| 171 | encode_1024private_key(const struct MLKEM1024_private_key *priv, uint8_t **out_buf, | 171 | MlKem1024UnitTest(void) |
| 172 | size_t *out_len) | ||
| 173 | { | ||
| 174 | CBB cbb; | ||
| 175 | if (!CBB_init(&cbb, MLKEM1024_PUBLIC_KEY_BYTES)) | ||
| 176 | return 0; | ||
| 177 | if (!MLKEM1024_marshal_private_key(&cbb, priv)) | ||
| 178 | return 0; | ||
| 179 | if (!CBB_finish(&cbb, out_buf, out_len)) | ||
| 180 | return 0; | ||
| 181 | CBB_cleanup(&cbb); | ||
| 182 | return 1; | ||
| 183 | } | ||
| 184 | |||
| 185 | static void | ||
| 186 | MlKem1024UnitTest() | ||
| 187 | { | 172 | { |
| 188 | struct MLKEM1024_private_key *priv, *priv2; | 173 | struct MLKEM1024_private_key priv = { 0 }, priv2 = { 0 }; |
| 189 | struct MLKEM1024_public_key *pub, *pub2; | 174 | struct MLKEM1024_public_key pub = { 0 }, pub2 = { 0 }; |
| 190 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; | 175 | uint8_t encoded_public_key[MLKEM1024_PUBLIC_KEY_BYTES]; |
| 191 | uint8_t ciphertext[MLKEM1024_CIPHERTEXT_BYTES]; | 176 | uint8_t ciphertext[MLKEM1024_CIPHERTEXT_BYTES]; |
| 192 | uint8_t shared_secret1[MLKEM_SHARED_SECRET_BYTES]; | 177 | uint8_t shared_secret1[MLKEM_SHARED_SECRET_BYTES]; |
| @@ -195,92 +180,140 @@ MlKem1024UnitTest() | |||
| 195 | uint8_t *encoded_private_key = NULL, *tmp_buf = NULL; | 180 | uint8_t *encoded_private_key = NULL, *tmp_buf = NULL; |
| 196 | size_t encoded_private_key_len, tmp_buf_len; | 181 | size_t encoded_private_key_len, tmp_buf_len; |
| 197 | CBS cbs; | 182 | CBS cbs; |
| 183 | int failed = 0; | ||
| 198 | 184 | ||
| 199 | fprintf(stderr, "ML-KEM 1024...\n"); | 185 | MLKEM1024_generate_key(encoded_public_key, NULL, &priv); |
| 200 | |||
| 201 | MALLOC(priv, sizeof(struct MLKEM1024_private_key)); | ||
| 202 | MLKEM1024_generate_key(encoded_public_key, NULL, priv); | ||
| 203 | 186 | ||
| 204 | memcpy(first_two_bytes, encoded_public_key, sizeof(first_two_bytes)); | 187 | memcpy(first_two_bytes, encoded_public_key, sizeof(first_two_bytes)); |
| 205 | memset(encoded_public_key, 0xff, sizeof(first_two_bytes)); | 188 | memset(encoded_public_key, 0xff, sizeof(first_two_bytes)); |
| 206 | CBS_init(&cbs, encoded_public_key, | 189 | |
| 207 | sizeof(encoded_public_key)); | 190 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); |
| 208 | MALLOC(pub, sizeof(struct MLKEM1024_public_key)); | 191 | |
| 209 | /* Parsing should fail because the first coefficient is >= kPrime; */ | 192 | /* Parsing should fail because the first coefficient is >= kPrime. */ |
| 210 | TEST(MLKEM1024_parse_public_key(pub, &cbs), | 193 | if (MLKEM1024_parse_public_key(&pub, &cbs)) { |
| 211 | "Kyber_parse_public_key should have failed"); | 194 | warnx("MLKEM1024_parse_public_key should have failed"); |
| 195 | failed |= 1; | ||
| 196 | } | ||
| 212 | 197 | ||
| 213 | memcpy(encoded_public_key, first_two_bytes, sizeof(first_two_bytes)); | 198 | memcpy(encoded_public_key, first_two_bytes, sizeof(first_two_bytes)); |
| 214 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); | 199 | CBS_init(&cbs, encoded_public_key, sizeof(encoded_public_key)); |
| 215 | TEST(!MLKEM1024_parse_public_key(pub, &cbs), | 200 | if (!MLKEM1024_parse_public_key(&pub, &cbs)) { |
| 216 | "MLKEM1024_parse_public_key"); | 201 | warnx("MLKEM1024_parse_public_key"); |
| 217 | TEST(CBS_len(&cbs) != 0u, "CBS_len must be 0"); | 202 | failed |= 1; |
| 218 | 203 | } | |
| 219 | TEST(!encode_1024public_key(pub, &tmp_buf, &tmp_buf_len), | 204 | |
| 220 | "encode_1024public_key"); | 205 | if (CBS_len(&cbs) != 0u) { |
| 221 | TEST(sizeof(encoded_public_key) != tmp_buf_len, | 206 | warnx("CBS_len must be 0"); |
| 222 | "encoded public key lengths differ"); | 207 | failed |= 1; |
| 223 | TEST_DATAEQ(tmp_buf, encoded_public_key, tmp_buf_len, | 208 | } |
| 224 | "encoded public keys"); | 209 | |
| 210 | if (!mlkem1024_encode_public_key(&pub, &tmp_buf, &tmp_buf_len)) { | ||
| 211 | warnx("encode_public_key"); | ||
| 212 | failed |= 1; | ||
| 213 | } | ||
| 214 | if (sizeof(encoded_public_key) != tmp_buf_len) { | ||
| 215 | warnx("mlkem1024 encoded public key lengths differ"); | ||
| 216 | failed |= 1; | ||
| 217 | } | ||
| 218 | |||
| 219 | if (compare_data(encoded_public_key, tmp_buf, tmp_buf_len, 1024, | ||
| 220 | "encoded public keys") != 0) { | ||
| 221 | warnx("compare_data"); | ||
| 222 | failed |= 1; | ||
| 223 | } | ||
| 225 | free(tmp_buf); | 224 | free(tmp_buf); |
| 226 | tmp_buf = NULL; | 225 | tmp_buf = NULL; |
| 227 | 226 | ||
| 228 | MALLOC(pub2, sizeof(struct MLKEM1024_public_key)); | 227 | MLKEM1024_public_from_private(&pub2, &priv); |
| 229 | MLKEM1024_public_from_private(pub2, priv); | 228 | if (!mlkem1024_encode_public_key(&pub2, &tmp_buf, &tmp_buf_len)) { |
| 230 | TEST(!encode_1024public_key(pub2, &tmp_buf, &tmp_buf_len), | 229 | warnx("mlkem1024_encode_public_key"); |
| 231 | "encode_public_key"); | 230 | failed |= 1; |
| 232 | TEST(sizeof(encoded_public_key) != tmp_buf_len, | 231 | } |
| 233 | "encoded public key lengths differ"); | 232 | if (sizeof(encoded_public_key) != tmp_buf_len) { |
| 234 | TEST_DATAEQ(tmp_buf, encoded_public_key, tmp_buf_len, | 233 | warnx("mlkem1024 encoded public key lengths differ"); |
| 235 | "encoded pubic keys"); | 234 | failed |= 1; |
| 235 | } | ||
| 236 | |||
| 237 | if (compare_data(encoded_public_key, tmp_buf, tmp_buf_len, 1024, | ||
| 238 | "encoded public keys") != 0) { | ||
| 239 | warnx("compare_data"); | ||
| 240 | failed |= 1; | ||
| 241 | } | ||
| 236 | free(tmp_buf); | 242 | free(tmp_buf); |
| 237 | tmp_buf = NULL; | 243 | tmp_buf = NULL; |
| 238 | 244 | ||
| 239 | TEST(!encode_1024private_key(priv, &encoded_private_key, | 245 | if (!mlkem1024_encode_private_key(&priv, &encoded_private_key, |
| 240 | &encoded_private_key_len), "encode_1024private_key"); | 246 | &encoded_private_key_len)) { |
| 247 | warnx("mlkem1024_encode_private_key"); | ||
| 248 | failed |= 1; | ||
| 249 | } | ||
| 241 | 250 | ||
| 242 | memcpy(first_two_bytes, encoded_private_key, sizeof(first_two_bytes)); | 251 | memcpy(first_two_bytes, encoded_private_key, sizeof(first_two_bytes)); |
| 243 | memset(encoded_private_key, 0xff, sizeof(first_two_bytes)); | 252 | memset(encoded_private_key, 0xff, sizeof(first_two_bytes)); |
| 244 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); | 253 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); |
| 245 | MALLOC(priv2, sizeof(struct MLKEM1024_private_key)); | 254 | |
| 246 | /* Parsing should fail because the first coefficient is >= kPrime. */ | 255 | /* Parsing should fail because the first coefficient is >= kPrime. */ |
| 247 | TEST(MLKEM1024_parse_private_key(priv2, &cbs), "Should not have parsed"); | 256 | if (MLKEM1024_parse_private_key(&priv2, &cbs)) { |
| 257 | warnx("MLKEM1024_parse_private_key should have failed"); | ||
| 258 | failed |= 1; | ||
| 259 | } | ||
| 248 | 260 | ||
| 249 | memcpy(encoded_private_key, first_two_bytes, sizeof(first_two_bytes)); | 261 | memcpy(encoded_private_key, first_two_bytes, sizeof(first_two_bytes)); |
| 250 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); | 262 | CBS_init(&cbs, encoded_private_key, encoded_private_key_len); |
| 251 | TEST(!MLKEM1024_parse_private_key(priv2, &cbs), | 263 | |
| 252 | "MLKEM1024_parse_private_key"); | 264 | if (!MLKEM1024_parse_private_key(&priv2, &cbs)) { |
| 253 | TEST(!encode_1024private_key(priv2, &tmp_buf, &tmp_buf_len), | 265 | warnx("MLKEM1024_parse_private_key"); |
| 254 | "encode_private_key"); | 266 | failed |= 1; |
| 255 | TEST(encoded_private_key_len != tmp_buf_len, | 267 | } |
| 256 | "encoded private key lengths differ"); | 268 | |
| 257 | TEST_DATAEQ(tmp_buf, encoded_private_key, encoded_private_key_len, | 269 | if (!mlkem1024_encode_private_key(&priv2, &tmp_buf, &tmp_buf_len)) { |
| 258 | "encoded private keys"); | 270 | warnx("mlkem1024_encode_private_key"); |
| 271 | failed |= 1; | ||
| 272 | } | ||
| 273 | |||
| 274 | if (encoded_private_key_len != tmp_buf_len) { | ||
| 275 | warnx("mlkem1024 encode private key lengths differ"); | ||
| 276 | failed |= 1; | ||
| 277 | } | ||
| 278 | |||
| 279 | if (compare_data(encoded_private_key, tmp_buf, tmp_buf_len, 1024, | ||
| 280 | "encoded private key") != 0) { | ||
| 281 | warnx("compare_data"); | ||
| 282 | failed |= 1; | ||
| 283 | } | ||
| 284 | |||
| 259 | free(tmp_buf); | 285 | free(tmp_buf); |
| 260 | tmp_buf = NULL; | 286 | tmp_buf = NULL; |
| 261 | 287 | ||
| 262 | MLKEM1024_encap(ciphertext, shared_secret1, pub); | 288 | MLKEM1024_encap(ciphertext, shared_secret1, &pub); |
| 263 | MLKEM1024_decap(shared_secret2, ciphertext, MLKEM1024_CIPHERTEXT_BYTES, | 289 | MLKEM1024_decap(shared_secret2, ciphertext, MLKEM1024_CIPHERTEXT_BYTES, |
| 264 | priv); | 290 | &priv); |
| 265 | TEST_DATAEQ(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, | 291 | if (compare_data(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, |
| 266 | "shared secrets with priv"); | 292 | 1024, "shared secrets with priv") != 0) { |
| 293 | warnx("compare_data"); | ||
| 294 | failed |= 1; | ||
| 295 | } | ||
| 296 | |||
| 267 | MLKEM1024_decap(shared_secret2, ciphertext, MLKEM1024_CIPHERTEXT_BYTES, | 297 | MLKEM1024_decap(shared_secret2, ciphertext, MLKEM1024_CIPHERTEXT_BYTES, |
| 268 | priv2); | 298 | &priv2); |
| 269 | TEST_DATAEQ(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, | 299 | if (compare_data(shared_secret1, shared_secret2, MLKEM_SHARED_SECRET_BYTES, |
| 270 | "shared secrets with priv2"); | 300 | 1024, "shared secrets with priv2") != 0) { |
| 301 | warnx("compare_data"); | ||
| 302 | failed |= 1; | ||
| 303 | } | ||
| 271 | 304 | ||
| 272 | free(encoded_private_key); | 305 | free(encoded_private_key); |
| 273 | free(pub); | 306 | |
| 274 | free(pub2); | 307 | return failed; |
| 275 | free(priv); | ||
| 276 | free(priv2); | ||
| 277 | } | 308 | } |
| 278 | 309 | ||
| 279 | int | 310 | int |
| 280 | main(int argc, char **argv) | 311 | main(int argc, char **argv) |
| 281 | { | 312 | { |
| 282 | MlKem768UnitTest(); | 313 | int failed = 0; |
| 283 | MlKem1024UnitTest(); | 314 | |
| 315 | failed |= MlKem768UnitTest(); | ||
| 316 | failed |= MlKem1024UnitTest(); | ||
| 284 | 317 | ||
| 285 | exit(failure); | 318 | return failed; |
| 286 | } | 319 | } |
