mirror of
https://github.com/open-quantum-safe/liboqs.git
synced 2025-10-03 00:02:36 -04:00
* Pull ML-DSA from pq-crystals upstream. * Removes ML-DSA-ipd * Adds support for context strings to OQS SIG API. * Adding _with_ctx_str APIs, templating * Adds ACVP tests for ML-DSA * export symbols for acvp tests (dynamic linking) * remove IPD intermediate values * adds flag for ctx support * Update constant-time passes after line nubmer and function name changes * Update KATs * API with checks for signatures without ctx support * Additional test for signatures with ctx * Change alg_version to FIPS204 * Update ML-DSA security claim to SUF-CMA, according to FIPS204 * Update src/sig/sig.h * Fix test_alg_info --------- Signed-off-by: Basil Hess <bhe@zurich.ibm.com> Co-authored-by: Spencer Wilson <spencer.wilson@uwaterloo.ca>
84 lines
4.2 KiB
Python
84 lines
4.2 KiB
Python
# SPDX-License-Identifier: MIT
|
|
|
|
import helpers
|
|
import os
|
|
import os.path
|
|
import pytest
|
|
import platform
|
|
import yaml
|
|
|
|
@helpers.filtered_test
|
|
@pytest.mark.parametrize('kem_name', helpers.available_kems_by_name())
|
|
def test_alg_info_kem(kem_name):
|
|
if not(helpers.is_kem_enabled_by_name(kem_name)): pytest.skip('Not enabled')
|
|
# get the algorithm info from liboqs
|
|
output = helpers.run_subprocess([helpers.path_to_executable('dump_alg_info')])
|
|
alg_info = yaml.safe_load(output)['KEMs'][kem_name]
|
|
assert(not(alg_info['isnull']))
|
|
# find and load the datasheet
|
|
if platform.system() == 'Windows':
|
|
command = f"Select-String -Path 'docs/algorithms/kem/*' -Pattern '{kem_name}' -SimpleMatch -List | Select-Object -ExpandProperty Path"
|
|
datasheet_filename = helpers.run_subprocess(['powershell', '-Command', command]).splitlines()[0]
|
|
else:
|
|
datasheet_filename = helpers.run_subprocess(['grep', '-r', '-l', kem_name, 'docs/algorithms/kem']).splitlines()[0]
|
|
datasheet_filename = datasheet_filename.replace('.md','.yml')
|
|
with open(datasheet_filename, 'r', encoding='utf8') as datasheet_fh:
|
|
datasheet = yaml.safe_load(datasheet_fh.read())
|
|
# find the parameter set in the datasheet
|
|
foundit = False
|
|
for parameter_set in datasheet['parameter-sets']:
|
|
if parameter_set['name'] == kem_name or ('alias' in parameter_set and parameter_set['alias'] == kem_name):
|
|
foundit = True
|
|
# check that the values match
|
|
assert(alg_info['claimed-nist-level'] == parameter_set['claimed-nist-level'])
|
|
assert(alg_info['claimed-security'] == parameter_set['claimed-security'])
|
|
assert(alg_info['length-public-key'] == parameter_set['length-public-key'])
|
|
assert(alg_info['length-ciphertext'] == parameter_set['length-ciphertext'])
|
|
assert(alg_info['length-secret-key'] == parameter_set['length-secret-key'])
|
|
assert(alg_info['length-shared-secret'] == parameter_set['length-shared-secret'])
|
|
print("{:s} datasheet matches C algorithm info".format(kem_name))
|
|
break
|
|
assert(foundit)
|
|
|
|
@helpers.filtered_test
|
|
@pytest.mark.parametrize('sig_name', helpers.available_sigs_by_name())
|
|
def test_alg_info_sig(sig_name):
|
|
if not(helpers.is_sig_enabled_by_name(sig_name)): pytest.skip('Not enabled')
|
|
# get the algorithm info from liboqs
|
|
output = helpers.run_subprocess([helpers.path_to_executable('dump_alg_info')])
|
|
alg_info = yaml.safe_load(output)['SIGs'][sig_name]
|
|
assert(not(alg_info['isnull']))
|
|
# find and load the datasheet
|
|
if platform.system() == 'Windows':
|
|
command = f"Select-String -Path 'docs/algorithms/sig/*' -Pattern '{sig_name}' -SimpleMatch -List | Select-Object -ExpandProperty Path"
|
|
datasheet_filename = helpers.run_subprocess(['powershell', '-Command', command]).splitlines()[0]
|
|
else:
|
|
datasheet_filename = helpers.run_subprocess(['grep', '-r', '-l', sig_name, 'docs/algorithms/sig']).splitlines()[0]
|
|
datasheet_filename = datasheet_filename.replace('.md','.yml')
|
|
with open(datasheet_filename, 'r', encoding='utf8') as datasheet_fh:
|
|
datasheet = yaml.safe_load(datasheet_fh.read())
|
|
# find the parameter set in the datasheet
|
|
|
|
foundit = False
|
|
for parameter_set in datasheet['parameter-sets']:
|
|
if parameter_set['name'] == sig_name or ('alias' in parameter_set and parameter_set['alias'] == sig_name):
|
|
foundit = True
|
|
# SUF-CMA implies EUF-CMA
|
|
claimed_security = [parameter_set['claimed-security']]
|
|
if parameter_set['claimed-security'] == 'SUF-CMA':
|
|
claimed_security.append("EUF-CMA")
|
|
# check that the values match
|
|
assert(alg_info['claimed-nist-level'] == parameter_set['claimed-nist-level'])
|
|
assert(alg_info['claimed-security'] in claimed_security)
|
|
assert(alg_info['length-public-key'] == parameter_set['length-public-key'])
|
|
assert(alg_info['length-secret-key'] == parameter_set['length-secret-key'])
|
|
assert(alg_info['length-signature'] == parameter_set['length-signature'])
|
|
print("{:s} datasheet matches C algorithm info".format(sig_name))
|
|
break
|
|
assert(foundit)
|
|
|
|
if __name__ == "__main__":
|
|
import sys
|
|
pytest.main(sys.argv)
|
|
|