#!/usr/bin/env python # Copyright 2025 The OpenSSL Project Authors. All Rights Reserved. # # Licensed under the Apache License 2.0 (the "License"). You may not use # this file except in compliance with the License. You can obtain a copy # in the file LICENSE in the source distribution or at # https://www.openssl.org/source/license.html # A python program written to parse (version 1) of the WYCHEPROOF test vectors for # ML_DSA. The 6 files that can be processed by this utility can be downloaded # from # https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json") # and output from this utility to # test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt # test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_sign.txt # test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_sign.txt # test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_verify.txt # test/recipes/30-test_evp_data/evppkey_ml_dsa_65_wycheproof_verify.txt # test/recipes/30-test_evp_data/evppkey_ml_dsa_87_wycheproof_verify.txt # # e.g. python3 ./test/mldsa_wycheproof_parse.py -alg ML-DSA-44 ./wycheproof/testvectors_v1/mldsa_44_standard_sign_test.json > test/recipes/30-test_evp_data/evppkey_ml_dsa_44_wycheproof_sign.txt import json import argparse import datetime from _ast import Or def print_label(label, value): print(label + " = " + value) def print_hexlabel(label, tag, value): print(label + " = hex" + tag + ":" + value) def parse_ml_dsa_sig_gen(alg, groups): grpId = 1 for grp in groups: keyOnly = False first = True name = alg.replace('-', '_') keyname = name + "_" + str(grpId) grpId += 1 for tst in grp['tests']: if first: first = False if 'flags' in tst: if 'IncorrectPrivateKeyLength' in tst['flags'] or 'InvalidPrivateKey' in tst['flags']: keyOnly = True if not keyOnly: print("") print_label("PrivateKeyRaw", keyname + ":" + alg + ":" + grp['privateKey']) testname = name + "_" + str(tst['tcId']) print("\n# " + str(tst['tcId']) + " " + tst['comment']) print_label("FIPSversion", ">=3.5.0") if keyOnly: print_label("KeyFromData", alg) print_hexlabel("Ctrl", "priv", grp['privateKey']) print_label("Result", "KEY_FROMDATA_ERROR") else: print_label("Sign-Message", alg + ":" + keyname) print_label("Input", tst['msg']) print_label("Output", tst['sig']) if 'ctx' in tst: print_hexlabel("Ctrl", "context-string", tst['ctx']) print_label("Ctrl", "message-encoding:1") print_label("Ctrl", "deterministic:1") if tst['result'] == "invalid": print_label("Result", "PKEY_CTRL_ERROR") def parse_ml_dsa_sig_ver(alg, groups): grpId = 1 for grp in groups: keyOnly = False first = True name = alg.replace('-', '_') keyname = name + "_" + str(grpId) grpId += 1 for tst in grp['tests']: if first: first = False if 'flags' in tst: if 'IncorrectPublicKeyLength' in tst['flags'] or 'InvalidPublicKey' in tst['flags']: keyOnly = True if not keyOnly: print("") print_label("PublicKeyRaw", keyname + ":" + alg + ":" + grp['publicKey']) testname = name + "_" + str(tst['tcId']) print("\n# " + str(tst['tcId']) + " " + tst['comment']) print_label("FIPSversion", ">=3.5.0") if keyOnly: print_label("KeyFromData", alg) print_hexlabel("Ctrl", "pub", grp['publicKey']) print_label("Result", "KEY_FROMDATA_ERROR") else: print_label("Verify-Message-Public", alg + ":" + keyname) print_label("Input", tst['msg']) print_label("Output", tst['sig']) if 'ctx' in tst: print_hexlabel("Ctrl", "context-string", tst['ctx']) print_label("Ctrl", "message-encoding:1") print_label("Ctrl", "deterministic:1") if tst['result'] == "invalid": if 'InvalidContext' in tst['flags']: print_label("Result", "PKEY_CTRL_ERROR") else: print_label("Result", "VERIFY_ERROR") parser = argparse.ArgumentParser(description="") parser.add_argument('filename', type=str) parser.add_argument('-alg', type=str) args = parser.parse_args() # Open and read the JSON file with open(args.filename, 'r') as file: data = json.load(file) year = datetime.date.today().year version = data['generatorVersion'] algorithm = data['algorithm'] mode = data['testGroups'][0]['type'] print("# Copyright " + str(year) + " The OpenSSL Project Authors. All Rights Reserved.") print("#") print("# Licensed under the Apache License 2.0 (the \"License\"). You may not use") print("# this file except in compliance with the License. You can obtain a copy") print("# in the file LICENSE in the source distribution or at") print("# https://www.openssl.org/source/license.html\n") print("# Wycheproof test data for " + algorithm + " " + mode + " generated from") print("# https://github.com/C2SP/wycheproof/blob/8e7fa6f87e6993d7b613cf48b46512a32df8084a/testvectors_v1/mldsa_*_standard_*_test.json") print("# [version " + str(version) + "]") if algorithm == "ML-DSA": if mode == 'MlDsaSign': parse_ml_dsa_sig_gen(args.alg, data['testGroups']) elif mode == 'MlDsaVerify': parse_ml_dsa_sig_ver(args.alg, data['testGroups']) else: print("Unsupported mode " + mode) else: print("Unsupported algorithm " + algorithm)