// Copyright 2024 The BoringSSL Authors // // Permission to use, copy, modify, and/or distribute this software for any // purpose with or without fee is hereby granted, provided that the above // copyright notice and this permission notice appear in all copies. // // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY // SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION // OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN // CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. package subprocess import ( "bytes" "encoding/hex" "encoding/json" "fmt" ) // The following structures reflect the JSON of ACVP EDDSA tests. See // https://pages.nist.gov/ACVP/draft-celi-acvp-eddsa.html#name-test-types type eddsaTestVectorSet struct { Groups []eddsaTestGroup `json:"testGroups"` Mode string `json:"mode"` } type eddsaTestGroup struct { ID uint64 `json:"tgId"` Type string `json:"testType"` Curve string `json:"curve"` Prehash bool `json:"prehash"` Tests []struct { ID uint64 `json:"tcId"` QHex string `json:"q,omitempty"` ContextHex string `json:"context,omitempty"` ContextLength uint64 `json:"contextLength,omitempty"` MsgHex string `json:"message,omitempty"` SignatureHex string `json:"signature,omitempty"` } `json:"tests"` } type eddsaTestGroupResponse struct { ID uint64 `json:"tgId"` Tests []eddsaTestResponse `json:"tests"` QHex string `json:"q,omitempty"` } type eddsaTestResponse struct { ID uint64 `json:"tcId"` DHex string `json:"d,omitempty"` QHex string `json:"q,omitempty"` Passed *bool `json:"testPassed,omitempty"` // using pointer so value is not omitted when it is false SignatureHex string `json:"signature,omitempty"` } // eddsa implements an ACVP algorithm by making requests to the // subprocess to generate and verify EDDSA keys and signatures. type eddsa struct { algo string curves map[string]bool // supported curve names } func (e *eddsa) Process(vectorSet []byte, m Transactable) (any, error) { var parsed eddsaTestVectorSet if err := json.Unmarshal(vectorSet, &parsed); err != nil { return nil, err } var ret []eddsaTestGroupResponse // See // https://pages.nist.gov/ACVP/draft-celi-acvp-eddsa.html#name-test-vectors // for details about the tests. for _, group := range parsed.Groups { group := group if _, ok := e.curves[group.Curve]; !ok { return nil, fmt.Errorf("curve %q in test group %d not supported", group.Curve, group.ID) } response := eddsaTestGroupResponse{ ID: group.ID, } var sigGenPrivKeySeed []byte var sigGenPrivKeyQHex string for _, test := range group.Tests { test := test var testResp eddsaTestResponse testResp.ID = test.ID switch parsed.Mode { case "keyGen": if group.Type != "AFT" { return nil, fmt.Errorf("unknown test type %q in keyGen test group %d", group.Type, group.ID) } m.TransactAsync(e.algo+"/keyGen", 2, [][]byte{[]byte(group.Curve)}, func(result [][]byte) error { testResp.DHex = hex.EncodeToString(result[0]) testResp.QHex = hex.EncodeToString(result[1]) response.Tests = append(response.Tests, testResp) return nil }) case "keyVer": if group.Type != "AFT" { return nil, fmt.Errorf("unknown test type %q in keyGen test group %d", group.Type, group.ID) } q, err := hex.DecodeString(test.QHex) if err != nil { return nil, fmt.Errorf("failed to decode q in test case %d/%d: %s", group.ID, test.ID, err) } m.TransactAsync(e.algo+"/keyVer", 1, [][]byte{[]byte(group.Curve), q}, func(result [][]byte) error { // result[0] should be a single byte: zero if false, one if true switch { case bytes.Equal(result[0], []byte{00}): f := false testResp.Passed = &f case bytes.Equal(result[0], []byte{01}): t := true testResp.Passed = &t default: return fmt.Errorf("key verification returned unexpected result: %q", result[0]) } response.Tests = append(response.Tests, testResp) return nil }) case "sigGen": if group.Type != "AFT" && group.Type != "BFT" { return nil, fmt.Errorf("unknown test type %q in keyGen test group %d", group.Type, group.ID) } if len(sigGenPrivKeySeed) == 0 { result, err := m.Transact(e.algo+"/keyGen", 2, []byte(group.Curve)) if err != nil { return nil, fmt.Errorf("key generation failed for test case %d/%d: %s", group.ID, test.ID, err) } sigGenPrivKeySeed = result[0] sigGenPrivKeyQHex = hex.EncodeToString(result[1]) } response.QHex = sigGenPrivKeyQHex msg, err := hex.DecodeString(test.MsgHex) if err != nil { return nil, fmt.Errorf("failed to decode message hex in test case %d/%d: %s", group.ID, test.ID, err) } prehash := []byte{0} if group.Prehash { prehash = []byte{1} } var context []byte if test.ContextHex != "" { if uint64(len(test.ContextHex)) != test.ContextLength*2 { return nil, fmt.Errorf("context hex length %d does not match context length %d in test case %d/%d", len(test.ContextHex), test.ContextLength, group.ID, test.ID) } context, err = hex.DecodeString(test.ContextHex) if err != nil { return nil, fmt.Errorf("failed to decode context hex in test case %d/%d: %s", group.ID, test.ID, err) } } args := [][]byte{[]byte(group.Curve), sigGenPrivKeySeed, msg, prehash, context} m.TransactAsync(e.algo+"/sigGen", 1, args, func(result [][]byte) error { testResp.SignatureHex = hex.EncodeToString(result[0]) response.Tests = append(response.Tests, testResp) return nil }) case "sigVer": if group.Type != "AFT" { return nil, fmt.Errorf("unknown test type %q in keyGen test group %d", group.Type, group.ID) } if test.ContextHex != "" { return nil, fmt.Errorf("unexpected context field in sigVer test case %d/%d", group.ID, test.ID) } msg, err := hex.DecodeString(test.MsgHex) if err != nil { return nil, fmt.Errorf("failed to decode message hex in test case %d/%d: %s", group.ID, test.ID, err) } q, err := hex.DecodeString(test.QHex) if err != nil { return nil, fmt.Errorf("failed to decode q in test case %d/%d: %s", group.ID, test.ID, err) } signature, err := hex.DecodeString(test.SignatureHex) if err != nil { return nil, fmt.Errorf("failed to decode signature in test case %d/%d: %s", group.ID, test.ID, err) } prehash := []byte{0} if group.Prehash { prehash = []byte{1} } args := [][]byte{[]byte(group.Curve), msg, q, signature, prehash} m.TransactAsync(e.algo+"/sigVer", 1, args, func(result [][]byte) error { // result[0] should be a single byte: zero if false, one if true switch { case bytes.Equal(result[0], []byte{00}): f := false testResp.Passed = &f case bytes.Equal(result[0], []byte{01}): t := true testResp.Passed = &t default: return fmt.Errorf("signature verification returned unexpected result: %q", result[0]) } response.Tests = append(response.Tests, testResp) return nil }) default: return nil, fmt.Errorf("invalid mode %q in EDDSA vector set", parsed.Mode) } } m.Barrier(func() { ret = append(ret, response) }) } if err := m.Flush(); err != nil { return nil, err } return ret, nil }