xref: /aosp_15_r20/external/boringssl/src/crypto/spx/spx_test.cc (revision 8fb009dc861624b67b6cdb62ea21f0f22d0c584b)
1 /* Copyright (c) 2023, Google LLC
2  *
3  * Permission to use, copy, modify, and/or distribute this software for any
4  * purpose with or without fee is hereby granted, provided that the above
5  * copyright notice and this permission notice appear in all copies.
6  *
7  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14 
15 #include <openssl/base.h>
16 
17 #include <stdlib.h>
18 #include <cstdint>
19 #include <string>
20 #include <vector>
21 
22 #include <gtest/gtest.h>
23 #include <openssl/bytestring.h>
24 #define OPENSSL_UNSTABLE_EXPERIMENTAL_SPX
25 #include <openssl/experimental/spx.h>
26 
27 #include "../test/file_test.h"
28 #include "../test/test_util.h"
29 
30 // suppress warnings for experimental spx api
31 namespace {
32 
TEST(SpxTest,KeyGeneration)33 TEST(SpxTest, KeyGeneration) {
34   const uint8_t seed[3 * SPX_N] = {0};
35   const uint8_t expected_pk[] = {
36       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
37       0x00, 0x00, 0x00, 0x00, 0x00, 0xbe, 0x6b, 0xd7, 0xe8, 0xe1, 0x98,
38       0xea, 0xf6, 0x2d, 0x57, 0x2f, 0x13, 0xfc, 0x79, 0xf2, 0x6f,
39   };
40   const uint8_t expected_sk[] = {
41       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
42       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
43       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
44       0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
45       0x00, 0x00, 0x00, 0x00, 0xbe, 0x6b, 0xd7, 0xe8, 0xe1, 0x98, 0xea,
46       0xf6, 0x2d, 0x57, 0x2f, 0x13, 0xfc, 0x79, 0xf2, 0x6f,
47   };
48 
49   uint8_t pk[2 * SPX_N];
50   uint8_t sk[4 * SPX_N];
51   SPX_generate_key_from_seed(pk, sk, seed);
52   EXPECT_EQ(Bytes(pk), Bytes(expected_pk));
53   EXPECT_EQ(Bytes(sk), Bytes(expected_sk));
54 }
55 
TEST(SpxTest,KeyGeneration2)56 TEST(SpxTest, KeyGeneration2) {
57   const uint8_t seed[3 * SPX_N] = {
58       0x3f, 0x00, 0xff, 0x1c, 0x9c, 0x5e, 0xaa, 0xfe, 0x09, 0xc3, 0x08, 0x0d,
59       0xac, 0xc1, 0x83, 0x2b, 0x35, 0x8a, 0x40, 0xd5, 0xf3, 0x8c, 0xcb, 0x97,
60       0xe3, 0xa6, 0xc1, 0xb3, 0xb7, 0x5f, 0x42, 0xab, 0x17, 0x34, 0xe6, 0x41,
61       0x89, 0xe1, 0x57, 0x93, 0x12, 0x74, 0xdb, 0xbd, 0xb4, 0x28, 0xd0, 0xfb,
62   };
63   const uint8_t expected_pk[] = {
64       0x17, 0x34, 0xe6, 0x41, 0x89, 0xe1, 0x57, 0x93, 0x12, 0x74, 0xdb,
65       0xbd, 0xb4, 0x28, 0xd0, 0xfb, 0x59, 0xc8, 0x64, 0xd2, 0x52, 0x96,
66       0xa9, 0x22, 0xdc, 0x61, 0xb8, 0xc1, 0x92, 0x15, 0xac, 0x74,
67   };
68   const uint8_t expected_sk[] = {
69       0x3f, 0x00, 0xff, 0x1c, 0x9c, 0x5e, 0xaa, 0xfe, 0x09, 0xc3, 0x08,
70       0x0d, 0xac, 0xc1, 0x83, 0x2b, 0x35, 0x8a, 0x40, 0xd5, 0xf3, 0x8c,
71       0xcb, 0x97, 0xe3, 0xa6, 0xc1, 0xb3, 0xb7, 0x5f, 0x42, 0xab, 0x17,
72       0x34, 0xe6, 0x41, 0x89, 0xe1, 0x57, 0x93, 0x12, 0x74, 0xdb, 0xbd,
73       0xb4, 0x28, 0xd0, 0xfb, 0x59, 0xc8, 0x64, 0xd2, 0x52, 0x96, 0xa9,
74       0x22, 0xdc, 0x61, 0xb8, 0xc1, 0x92, 0x15, 0xac, 0x74,
75   };
76 
77   uint8_t pk[2 * SPX_N];
78   uint8_t sk[4 * SPX_N];
79   SPX_generate_key_from_seed(pk, sk, seed);
80   EXPECT_EQ(Bytes(pk), Bytes(expected_pk));
81   EXPECT_EQ(Bytes(sk), Bytes(expected_sk));
82 }
83 
TEST(SpxTest,BasicSignVerify)84 TEST(SpxTest, BasicSignVerify) {
85   uint8_t pk[2 * SPX_N];
86   uint8_t sk[4 * SPX_N];
87   SPX_generate_key(pk, sk);
88 
89   uint8_t message[] = {0x42};
90   uint8_t signature[SPX_SIGNATURE_BYTES];
91   SPX_sign(signature, sk, message, sizeof(message), true);
92   EXPECT_EQ(SPX_verify(signature, pk, message, sizeof(message)), 1);
93 }
94 
SpxFileTest(FileTest * t)95 static void SpxFileTest(FileTest *t) {
96   std::vector<uint8_t> message, public_key, signature;
97   t->IgnoreAttribute("count");
98   t->IgnoreAttribute("seed");
99   t->IgnoreAttribute("mlen");
100   ASSERT_TRUE(t->GetBytes(&message, "msg"));
101   ASSERT_TRUE(t->GetBytes(&public_key, "pk"));
102   t->IgnoreAttribute("sk");
103   t->IgnoreAttribute("smlen");
104   ASSERT_TRUE(t->GetBytes(&signature, "sm"));
105 
106   EXPECT_EQ(SPX_verify(signature.data(), public_key.data(), message.data(),
107                        message.size()),
108             1);
109 
110   message[0] ^= 1;
111 
112   EXPECT_EQ(SPX_verify(signature.data(), public_key.data(), message.data(),
113                        message.size()),
114             0);
115 }
116 
SpxFileDeterministicTest(FileTest * t)117 static void SpxFileDeterministicTest(FileTest *t) {
118   std::vector<uint8_t> message, sk, expected_signature;
119   t->IgnoreAttribute("count");
120   t->IgnoreAttribute("seed");
121   t->IgnoreAttribute("mlen");
122   ASSERT_TRUE(t->GetBytes(&message, "msg"));
123   t->IgnoreAttribute("pk");
124   ASSERT_TRUE(t->GetBytes(&sk, "sk"));
125   t->IgnoreAttribute("smlen");
126   ASSERT_TRUE(t->GetBytes(&expected_signature, "sm"));
127   expected_signature.resize(SPX_SIGNATURE_BYTES);
128 
129   uint8_t signature[SPX_SIGNATURE_BYTES];
130   SPX_sign(signature, sk.data(), message.data(), message.size(), false);
131 
132   EXPECT_EQ(Bytes(signature), Bytes(expected_signature));
133 }
134 
TEST(SpxTest,TestVectors)135 TEST(SpxTest, TestVectors) {
136   FileTestGTest("crypto/spx/spx_tests.txt", SpxFileTest);
137   FileTestGTest("crypto/spx/spx_tests_deterministic.txt",
138                 SpxFileDeterministicTest);
139 }
140 
141 }  // namespace
142