1
1
mirror of https://github.com/henrydcase/pqc.git synced 2024-12-04 21:34:01 +00:00
pqcrypto/test/crypto_sign/testvectors.c

82 lines
2.1 KiB
C
Raw Normal View History

#include <stddef.h>
#include <stdint.h>
2019-01-16 13:21:52 +00:00
#include <stdio.h>
#include <string.h>
#include "api.h"
#include "randombytes.h"
2019-01-16 13:21:52 +00:00
#define MAXMLEN 2048
static void printbytes(const uint8_t *x, size_t xlen) {
size_t i;
2019-01-16 13:21:52 +00:00
for (i = 0; i < xlen; i++) {
printf("%02x", x[i]);
}
printf("\n");
}
2019-01-22 16:37:58 +00:00
// https://stackoverflow.com/a/1489985/1711232
#define PASTER(x, y) x##_##y
#define EVALUATOR(x, y) PASTER(x, y)
#define NAMESPACE(fun) EVALUATOR(PQCLEAN_NAMESPACE, fun)
2019-03-19 13:28:15 +00:00
#define CRYPTO_PUBLICKEYBYTES NAMESPACE(CRYPTO_PUBLICKEYBYTES)
#define CRYPTO_SECRETKEYBYTES NAMESPACE(CRYPTO_SECRETKEYBYTES)
#define CRYPTO_BYTES NAMESPACE(CRYPTO_BYTES)
2019-01-22 16:37:58 +00:00
#define crypto_sign_keypair NAMESPACE(crypto_sign_keypair)
#define crypto_sign NAMESPACE(crypto_sign)
#define crypto_sign_open NAMESPACE(crypto_sign_open)
#define crypto_sign_signature NAMESPACE(crypto_sign_signature)
#define crypto_sign_verify NAMESPACE(crypto_sign_verify)
2019-01-22 16:37:58 +00:00
2019-01-16 13:21:52 +00:00
int main(void) {
uint8_t sk[CRYPTO_SECRETKEYBYTES];
uint8_t pk[CRYPTO_PUBLICKEYBYTES];
2019-01-16 13:21:52 +00:00
uint8_t mi[MAXMLEN];
uint8_t sm[MAXMLEN + CRYPTO_BYTES];
uint8_t sig[CRYPTO_BYTES];
2019-03-04 14:12:38 +00:00
size_t smlen;
size_t siglen;
size_t mlen;
2019-01-16 13:21:52 +00:00
int r;
size_t i, k;
2019-01-16 13:21:52 +00:00
/* i = 0, 1, 4, 16, 64, 256, 1024 */
for (i = 0; i < MAXMLEN; i = (i == 0) ? i + 1 : i << 2) {
2019-01-16 13:21:52 +00:00
randombytes(mi, i);
crypto_sign_keypair(pk, sk);
printbytes(pk, CRYPTO_PUBLICKEYBYTES);
printbytes(sk, CRYPTO_SECRETKEYBYTES);
crypto_sign(sm, &smlen, mi, i, sk);
crypto_sign_signature(sig, &siglen, mi, i, sk);
2019-01-16 13:21:52 +00:00
printbytes(sm, smlen);
printbytes(sig, siglen);
2019-01-16 13:21:52 +00:00
// By relying on m == sm we prevent having to allocate CRYPTO_BYTES
// twice
r = crypto_sign_open(sm, &mlen, sm, smlen, pk);
r |= crypto_sign_verify(sig, siglen, mi, i, pk);
2019-01-16 13:21:52 +00:00
if (r) {
printf("ERROR: signature verification failed\n");
return -1;
}
for (k = 0; k < i; k++) {
if (sm[k] != mi[k]) {
printf("ERROR: message recovery failed\n");
return -1;
}
}
}
return 0;
}