2025-01-17 18:27:46 +03:00

84 lines
4.2 KiB
Python

# SPDX-License-Identifier: MIT
import helpers
import os
import os.path
import pytest
import platform
import yaml
@helpers.filtered_test
@pytest.mark.parametrize('kem_name', helpers.available_kems_by_name())
def test_alg_info_kem(kem_name):
if not(helpers.is_kem_enabled_by_name(kem_name)): pytest.skip('Not enabled')
# get the algorithm info from liboqs
output = helpers.run_subprocess([helpers.path_to_executable('dump_alg_info')])
alg_info = yaml.safe_load(output)['KEMs'][kem_name]
assert(not(alg_info['isnull']))
# find and load the datasheet
if platform.system() == 'Windows':
command = f"Select-String -Path 'docs/algorithms/kem/*' -Pattern '{kem_name}' -SimpleMatch -List | Select-Object -ExpandProperty Path"
datasheet_filename = helpers.run_subprocess(['powershell', '-Command', command]).splitlines()[0]
else:
datasheet_filename = helpers.run_subprocess(['grep', '-r', '-l', kem_name, 'docs/algorithms/kem']).splitlines()[0]
datasheet_filename = datasheet_filename.replace('.md','.yml')
with open(datasheet_filename, 'r', encoding='utf8') as datasheet_fh:
datasheet = yaml.safe_load(datasheet_fh.read())
# find the parameter set in the datasheet
foundit = False
for parameter_set in datasheet['parameter-sets']:
if parameter_set['name'] == kem_name or ('alias' in parameter_set and parameter_set['alias'] == kem_name):
foundit = True
# check that the values match
assert(alg_info['claimed-nist-level'] == parameter_set['claimed-nist-level'])
assert(alg_info['claimed-security'] == parameter_set['claimed-security'])
assert(alg_info['length-public-key'] == parameter_set['length-public-key'])
assert(alg_info['length-ciphertext'] == parameter_set['length-ciphertext'])
assert(alg_info['length-secret-key'] == parameter_set['length-secret-key'])
assert(alg_info['length-shared-secret'] == parameter_set['length-shared-secret'])
print("{:s} datasheet matches C algorithm info".format(kem_name))
break
assert(foundit)
@helpers.filtered_test
@pytest.mark.parametrize('sig_name', helpers.available_sigs_by_name())
def test_alg_info_sig(sig_name):
if not(helpers.is_sig_enabled_by_name(sig_name)): pytest.skip('Not enabled')
# get the algorithm info from liboqs
output = helpers.run_subprocess([helpers.path_to_executable('dump_alg_info')])
alg_info = yaml.safe_load(output)['SIGs'][sig_name]
assert(not(alg_info['isnull']))
# find and load the datasheet
if platform.system() == 'Windows':
command = f"Select-String -Path 'docs/algorithms/sig/*' -Pattern '{sig_name}' -SimpleMatch -List | Select-Object -ExpandProperty Path"
datasheet_filename = helpers.run_subprocess(['powershell', '-Command', command]).splitlines()[0]
else:
datasheet_filename = helpers.run_subprocess(['grep', '-r', '-l', sig_name, 'docs/algorithms/sig']).splitlines()[0]
datasheet_filename = datasheet_filename.replace('.md','.yml')
with open(datasheet_filename, 'r', encoding='utf8') as datasheet_fh:
datasheet = yaml.safe_load(datasheet_fh.read())
# find the parameter set in the datasheet
foundit = False
for parameter_set in datasheet['parameter-sets']:
if parameter_set['name'] == sig_name or ('alias' in parameter_set and parameter_set['alias'] == sig_name):
foundit = True
# SUF-CMA implies EUF-CMA
claimed_security = [parameter_set['claimed-security']]
if parameter_set['claimed-security'] == 'SUF-CMA':
claimed_security.append("EUF-CMA")
# check that the values match
assert(alg_info['claimed-nist-level'] == parameter_set['claimed-nist-level'])
assert(alg_info['claimed-security'] in claimed_security)
assert(alg_info['length-public-key'] == parameter_set['length-public-key'])
assert(alg_info['length-secret-key'] == parameter_set['length-secret-key'])
assert(alg_info['length-signature'] == parameter_set['length-signature'])
print("{:s} datasheet matches C algorithm info".format(sig_name))
break
assert(foundit)
if __name__ == "__main__":
import sys
pytest.main(sys.argv)