2021-03-25 00:46:42 +00:00
|
|
|
use katwalk::reader::{Kat, AlgType, TestVector, KatReader};
|
|
|
|
use std::{fs::File, io::BufReader};
|
|
|
|
use pqc_sys::*;
|
|
|
|
use std::env;
|
|
|
|
use std::path::Path;
|
|
|
|
use threadpool::ThreadPool;
|
2021-03-30 01:12:11 +01:00
|
|
|
use std::convert::TryInto;
|
2021-04-14 06:56:10 +01:00
|
|
|
use aes_ctr_drbg::DrbgCtx;
|
2021-04-04 12:50:46 +01:00
|
|
|
use std::collections::HashMap;
|
|
|
|
use std::thread;
|
|
|
|
use std::sync::Mutex;
|
|
|
|
use lazy_static::lazy_static;
|
2021-03-30 01:12:11 +01:00
|
|
|
|
2021-03-26 10:05:25 +00:00
|
|
|
// Used for signature algorithm registration
|
|
|
|
macro_rules! REG_SIGN {
|
2021-03-26 23:25:45 +00:00
|
|
|
($ID:expr,$F:expr) => {
|
|
|
|
Register{
|
|
|
|
kat:Kat{
|
|
|
|
scheme_type: AlgType::AlgSignature,
|
|
|
|
scheme_id: $ID,
|
|
|
|
kat_file: $F},
|
|
|
|
execfn: test_sign_vector}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! REG_KEM {
|
|
|
|
($ID:expr,$F:expr) => {
|
|
|
|
Register{
|
|
|
|
kat:Kat{
|
|
|
|
scheme_type: AlgType::AlgKem,
|
|
|
|
scheme_id: $ID,
|
|
|
|
kat_file: $F},
|
|
|
|
execfn: test_kem_vector}
|
|
|
|
}
|
2021-03-26 10:05:25 +00:00
|
|
|
}
|
|
|
|
|
2021-04-04 12:50:46 +01:00
|
|
|
// Stores one DRBG context per execution thread. DRBG
|
|
|
|
// is inserted in this map, just after thread starts
|
|
|
|
// and removed after thread is finished. Operation
|
|
|
|
// is synchronized.
|
|
|
|
lazy_static! {
|
|
|
|
static ref DRBGV: Mutex<HashMap<thread::ThreadId, DrbgCtx>> = Mutex::new(HashMap::new());
|
2021-03-25 00:46:42 +00:00
|
|
|
}
|
|
|
|
|
2021-05-17 16:00:10 +01:00
|
|
|
// We have to provide the implementation for randombytes
|
2021-03-30 01:12:11 +01:00
|
|
|
#[no_mangle]
|
|
|
|
unsafe extern "C" fn randombytes(
|
|
|
|
data: *mut ::std::os::raw::c_uchar,
|
|
|
|
len: usize
|
|
|
|
) {
|
|
|
|
let mut slice = std::slice::from_raw_parts_mut(data, len);
|
2021-04-04 12:50:46 +01:00
|
|
|
// get thread specific DRBG.
|
|
|
|
if let Some(drbg) = DRBGV.lock().unwrap().get_mut(&thread::current().id()) {
|
|
|
|
drbg.get_random(&mut slice);
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
type ExecFn = fn(&TestVector);
|
|
|
|
struct Register {
|
|
|
|
kat: katwalk::reader::Kat,
|
|
|
|
execfn: ExecFn,
|
2021-03-30 01:12:11 +01:00
|
|
|
}
|
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
fn test_sign_vector(el: &TestVector) {
|
2021-03-30 01:12:11 +01:00
|
|
|
let mut pk = Vec::new();
|
|
|
|
let mut sk = Vec::new();
|
|
|
|
let mut sm = Vec::new();
|
|
|
|
|
2021-04-04 12:50:46 +01:00
|
|
|
if let Some(drbg) = DRBGV.lock().unwrap().get_mut(&thread::current().id()) {
|
|
|
|
drbg.init(el.sig.seed.as_slice(), Vec::new());
|
|
|
|
}
|
|
|
|
|
|
|
|
unsafe {
|
2021-03-30 01:12:11 +01:00
|
|
|
// Check Verification
|
2021-03-26 23:25:45 +00:00
|
|
|
// pqc doesn't use "envelope" API. From the other
|
|
|
|
// hand in KATs for signature scheme, the signature
|
|
|
|
// is concatenaed with a message. Use only part with
|
|
|
|
// the signature.
|
|
|
|
let sm_len = el.sig.sm.len() - el.sig.msg.len();
|
2021-03-30 01:12:11 +01:00
|
|
|
|
|
|
|
let p = pqc_sig_alg_by_id(el.scheme_id as u8);
|
|
|
|
assert_ne!(p.is_null(), true);
|
|
|
|
|
|
|
|
// Check keygen
|
|
|
|
pk.resize(el.sig.pk.len(), 0);
|
|
|
|
sk.resize(el.sig.sk.len(), 0);
|
|
|
|
assert_eq!(
|
|
|
|
pqc_keygen(p, pk.as_mut_ptr(), sk.as_mut_ptr()),
|
|
|
|
true);
|
|
|
|
assert_eq!(sk, el.sig.sk);
|
|
|
|
assert_eq!(pk, el.sig.pk);
|
|
|
|
|
|
|
|
// Check signing
|
|
|
|
sm.resize(sm_len, 0);
|
|
|
|
let mut siglen: u64 = sm_len.try_into().unwrap();
|
|
|
|
assert_eq!(
|
|
|
|
pqc_sig_create(p, sm.as_mut_ptr(), &mut siglen,
|
|
|
|
el.sig.msg.as_ptr(), el.sig.msg.len().try_into().unwrap(),
|
|
|
|
el.sig.sk.as_ptr()),
|
|
|
|
true);
|
|
|
|
assert_eq!(siglen, sm_len.try_into().unwrap());
|
|
|
|
assert_eq!(sm, el.sig.sm[0..sm_len]);
|
|
|
|
|
|
|
|
// Check verification
|
2021-03-26 23:25:45 +00:00
|
|
|
assert_eq!(
|
|
|
|
pqc_sig_verify(p,
|
|
|
|
el.sig.sm.as_ptr(), sm_len as u64,
|
|
|
|
el.sig.msg.as_ptr(), el.sig.msg.len() as u64,
|
|
|
|
el.sig.pk.as_ptr()),
|
|
|
|
true);
|
|
|
|
}
|
|
|
|
}
|
2021-03-25 00:46:42 +00:00
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
fn test_kem_vector(el: &TestVector) {
|
2021-03-30 01:12:11 +01:00
|
|
|
let mut pk = Vec::new();
|
|
|
|
let mut sk = Vec::new();
|
|
|
|
let mut ct = Vec::new();
|
2021-03-26 23:25:45 +00:00
|
|
|
let mut ss = Vec::new();
|
|
|
|
|
2021-04-04 12:50:46 +01:00
|
|
|
if let Some(drbg) = DRBGV.lock().unwrap().get_mut(&thread::current().id()) {
|
2021-04-04 15:32:25 +01:00
|
|
|
drbg.init(el.kem.seed.as_slice(), Vec::new());
|
2021-04-04 12:50:46 +01:00
|
|
|
}
|
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
unsafe {
|
2021-04-04 12:50:46 +01:00
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
let p = pqc_kem_alg_by_id(el.scheme_id as u8);
|
|
|
|
assert_ne!(p.is_null(), true);
|
2021-03-30 01:12:11 +01:00
|
|
|
|
|
|
|
// Check keygen
|
|
|
|
pk.resize(el.kem.pk.len(), 0);
|
|
|
|
sk.resize(el.kem.sk.len(), 0);
|
2021-04-06 23:41:01 +01:00
|
|
|
assert_eq!(
|
|
|
|
pqc_keygen(p, pk.as_mut_ptr(), sk.as_mut_ptr()),
|
|
|
|
true);
|
|
|
|
|
2021-03-30 01:12:11 +01:00
|
|
|
assert_eq!(sk, el.kem.sk);
|
|
|
|
assert_eq!(pk, el.kem.pk);
|
|
|
|
|
|
|
|
// Check encapsulation
|
|
|
|
ss.resize(el.kem.ss.len(), 0);
|
|
|
|
ct.resize(el.kem.ct.len(), 0);
|
|
|
|
assert_eq!(
|
|
|
|
pqc_kem_encapsulate(p,
|
|
|
|
ct.as_mut_ptr(), ss.as_mut_ptr(), el.kem.pk.as_ptr()),
|
|
|
|
true);
|
|
|
|
assert_eq!(ct, el.kem.ct);
|
|
|
|
assert_eq!(ss, el.kem.ss);
|
|
|
|
|
|
|
|
// Check decapsulation
|
|
|
|
ss.clear();
|
|
|
|
ss.resize(el.kem.ss.len(), 0);
|
2021-03-26 23:25:45 +00:00
|
|
|
assert_eq!(
|
2021-03-30 01:12:11 +01:00
|
|
|
pqc_kem_decapsulate(p,
|
|
|
|
ss.as_mut_ptr(), el.kem.ct.as_ptr(), el.kem.sk.as_ptr()),
|
2021-03-26 23:25:45 +00:00
|
|
|
true);
|
2021-03-30 01:12:11 +01:00
|
|
|
assert_eq!(ss, el.kem.ss);
|
2021-03-26 23:25:45 +00:00
|
|
|
}
|
2021-03-25 00:46:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// KAT test register
|
2021-03-26 10:05:25 +00:00
|
|
|
const KATS: &'static[Register] = &[
|
2021-03-26 23:25:45 +00:00
|
|
|
REG_SIGN!(DILITHIUM2, "round3/dilithium/dilithium2/PQCsignKAT_2544.rsp"),
|
|
|
|
REG_SIGN!(DILITHIUM3, "round3/dilithium/dilithium3/PQCsignKAT_4016.rsp"),
|
|
|
|
REG_SIGN!(DILITHIUM5, "round3/dilithium/dilithium5/PQCsignKAT_4880.rsp"),
|
|
|
|
//REG_SIGN!(FALCON512, "round3/falcon/falcon512-KAT.rsp"),
|
|
|
|
//REG_SIGN!(FALCON1024, "round3/falcon/falcon1024-KAT.rsp"),
|
2021-03-26 10:05:25 +00:00
|
|
|
|
|
|
|
// Some implementations of sphincs are for round3
|
2021-03-26 19:51:45 +00:00
|
|
|
REG_SIGN!(SPHINCSSHA256128SSIMPLE,"round3/sphincs/sphincs-sha256-128s-simple/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256128SROBUST,"round3/sphincs/sphincs-sha256-128s-robust/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256128FSIMPLE,"round3/sphincs/sphincs-sha256-128f-simple/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256128FROBUST,"round3/sphincs/sphincs-sha256-128f-robust/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256192SSIMPLE,"round3/sphincs/sphincs-sha256-192s-simple/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256192SROBUST,"round3/sphincs/sphincs-sha256-192s-robust/PQCsignKAT_96.rsp"),
|
2021-03-26 10:05:25 +00:00
|
|
|
REG_SIGN!(SPHINCSSHA256192FSIMPLE,"round3/sphincs/sphincs-sha256-192f-simple/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256192FROBUST,"round3/sphincs/sphincs-sha256-192f-robust/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256256SSIMPLE,"round3/sphincs/sphincs-sha256-256s-simple/PQCsignKAT_128.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256256SROBUST,"round3/sphincs/sphincs-sha256-256s-robust/PQCsignKAT_128.rsp"),
|
2021-03-26 19:51:45 +00:00
|
|
|
REG_SIGN!(SPHINCSSHA256256FROBUST,"round3/sphincs/sphincs-sha256-256f-robust/PQCsignKAT_128.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHA256256FSIMPLE,"round3/sphincs/sphincs-sha256-256f-simple/PQCsignKAT_128.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256128FSIMPLE,"round3/sphincs/sphincs-shake256-128f-simple/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256128SSIMPLE,"round3/sphincs/sphincs-shake256-128s-simple/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256128FROBUST,"round3/sphincs/sphincs-shake256-128f-robust/PQCsignKAT_64.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256128SROBUST,"round3/sphincs/sphincs-shake256-128s-robust/PQCsignKAT_64.rsp"),
|
2021-03-26 10:05:25 +00:00
|
|
|
REG_SIGN!(SPHINCSSHAKE256192FROBUST,"round3/sphincs/sphincs-shake256-192f-robust/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256192FSIMPLE,"round3/sphincs/sphincs-shake256-192f-simple/PQCsignKAT_96.rsp"),
|
2021-03-26 19:51:45 +00:00
|
|
|
REG_SIGN!(SPHINCSSHAKE256192SSIMPLE,"round3/sphincs/sphincs-shake256-192s-simple/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256192SROBUST,"round3/sphincs/sphincs-shake256-192s-robust/PQCsignKAT_96.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256256FROBUST,"round3/sphincs/sphincs-shake256-256f-robust/PQCsignKAT_128.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256256FSIMPLE,"round3/sphincs/sphincs-shake256-256f-simple/PQCsignKAT_128.rsp"),
|
2021-03-26 10:05:25 +00:00
|
|
|
REG_SIGN!(SPHINCSSHAKE256256SSIMPLE,"round3/sphincs/sphincs-shake256-256s-simple/PQCsignKAT_128.rsp"),
|
|
|
|
REG_SIGN!(SPHINCSSHAKE256256SROBUST,"round3/sphincs/sphincs-shake256-256s-robust/PQCsignKAT_128.rsp"),
|
2021-03-26 23:25:45 +00:00
|
|
|
|
|
|
|
// KEM Schemes
|
|
|
|
REG_KEM!(FRODOKEM640SHAKE, "round3/frodokem/PQCkemKAT_19888_shake.rsp"),
|
|
|
|
REG_KEM!(FRODOKEM976SHAKE, "round3/frodokem/PQCkemKAT_31296_shake.rsp"),
|
|
|
|
REG_KEM!(FRODOKEM1344SHAKE, "round3/frodokem/PQCkemKAT_43088_shake.rsp"),
|
|
|
|
REG_KEM!(KYBER768, "round3/kyber/kyber768/PQCkemKAT_2400.rsp"),
|
|
|
|
REG_KEM!(KYBER1024, "round3/kyber/kyber1024/PQCkemKAT_3168.rsp"),
|
|
|
|
REG_KEM!(KYBER512, "round3/kyber/kyber512/PQCkemKAT_1632.rsp"),
|
|
|
|
REG_KEM!(NTRUHPS4096821, "round3/ntru/ntruhps4096821/PQCkemKAT_1590.rsp"),
|
|
|
|
REG_KEM!(NTRUHPS2048509, "round3/ntru/ntruhps2048509/PQCkemKAT_935.rsp"),
|
|
|
|
REG_KEM!(NTRUHRSS701, "round3/ntru/ntruhrss701/PQCkemKAT_1450.rsp"),
|
|
|
|
REG_KEM!(NTRUHPS2048677, "round3/ntru/ntruhps2048677/PQCkemKAT_1234.rsp"),
|
2021-03-30 01:12:11 +01:00
|
|
|
// For some reason NTRUL doesn't pass the tests (keygeneration)
|
|
|
|
//REG_KEM!(NTRULPR761, "round3/ntrup/ntrulpr761/kat_kem.rsp"),
|
|
|
|
//REG_KEM!(NTRULPR653, "round3/ntrup/ntrulpr653/kat_kem.rsp"),
|
|
|
|
//REG_KEM!(NTRULPR857, "round3/ntrup/ntrulpr857/kat_kem.rsp"),
|
2021-03-26 23:25:45 +00:00
|
|
|
REG_KEM!(LIGHTSABER, "round3/saber/LightSaber/PQCkemKAT_1568.rsp"),
|
|
|
|
REG_KEM!(FIRESABER, "round3/saber/FireSaber/PQCkemKAT_3040.rsp"),
|
|
|
|
REG_KEM!(SABER, "round3/saber/Saber/PQCkemKAT_2304.rsp"),
|
2021-03-27 00:34:03 +00:00
|
|
|
REG_KEM!(HQCRMRS128, "round3/hqc/hqc-128/hqc-128_kat.rsp"),
|
|
|
|
REG_KEM!(HQCRMRS192, "round3/hqc/hqc-192/hqc-192_kat.rsp"),
|
|
|
|
REG_KEM!(HQCRMRS256, "round3/hqc/hqc-256/hqc-256_kat.rsp"),
|
2021-04-06 23:41:01 +01:00
|
|
|
REG_KEM!(SIKE434, "round3/sike/PQCkemKAT_374.rsp"),
|
2021-03-27 00:34:03 +00:00
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
// Those are Round2. KATs are very big, so skip testing until it makes sense to do so.
|
|
|
|
//REG_SIGN!(RAINBOWVCLASSIC),
|
|
|
|
//REG_SIGN!(RAINBOWICLASSIC),
|
|
|
|
//REG_SIGN!(RAINBOWIIICLASSIC),
|
2021-03-25 00:46:42 +00:00
|
|
|
];
|
|
|
|
|
2021-04-04 12:50:46 +01:00
|
|
|
fn execute(kat_dir: String, thc: usize) {
|
2021-03-26 23:25:45 +00:00
|
|
|
// Can't do multi-threads as DRBG context is global
|
2021-04-04 12:50:46 +01:00
|
|
|
let pool = ThreadPool::new(thc);
|
2021-03-26 23:25:45 +00:00
|
|
|
for k in KATS.iter() {
|
|
|
|
let tmp = kat_dir.clone();
|
|
|
|
pool.execute(move || {
|
2021-04-04 12:50:46 +01:00
|
|
|
DRBGV.lock().unwrap()
|
|
|
|
.insert(thread::current().id(), DrbgCtx::new());
|
2021-03-26 23:25:45 +00:00
|
|
|
let f = Path::new(&tmp.to_string()).join(k.kat.kat_file);
|
|
|
|
let file = File::open(format!("{}", f.to_str().unwrap()));
|
|
|
|
println!("Processing file: {}", Path::new(k.kat.kat_file).to_str().unwrap());
|
|
|
|
let b = BufReader::new(file.unwrap());
|
2021-03-25 00:46:42 +00:00
|
|
|
|
2021-03-26 23:25:45 +00:00
|
|
|
for el in KatReader::new(b, k.kat.scheme_type, k.kat.scheme_id) {
|
|
|
|
(k.execfn)(&el);
|
|
|
|
}
|
2021-04-04 12:50:46 +01:00
|
|
|
DRBGV.lock().unwrap()
|
|
|
|
.remove(&thread::current().id());
|
2021-03-26 23:25:45 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
pool.join();
|
2021-03-25 00:46:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let args: Vec<String> = env::args().collect();
|
2021-04-04 12:50:46 +01:00
|
|
|
let mut argmap = HashMap::new();
|
|
|
|
|
|
|
|
if args.len() % 2 == 0 {
|
|
|
|
panic!("Wrong number of arguments");
|
|
|
|
}
|
|
|
|
|
|
|
|
for i in (1..args.len()).step_by(2) {
|
|
|
|
argmap.insert(&args[i], &args[i+1]);
|
2021-03-25 00:46:42 +00:00
|
|
|
}
|
2021-04-04 12:50:46 +01:00
|
|
|
|
|
|
|
let thread_number: usize = match argmap.get(&"--threads".to_string()) {
|
|
|
|
Some(n) => n.to_string().parse::<usize>().unwrap(),
|
|
|
|
None => 4 /* by default 4 threads */,
|
|
|
|
};
|
|
|
|
|
|
|
|
match argmap.get(&"--katdir".to_string()) {
|
|
|
|
Some(kat_dir) => execute(kat_dir.to_string(), thread_number),
|
|
|
|
None => panic!("--katdir required")
|
|
|
|
};
|
2021-03-25 00:46:42 +00:00
|
|
|
}
|