xmss-KAT-generator/test/test_xmss.c

126 lines
3.0 KiB
C
Raw Normal View History

2015-08-11 11:08:27 +01:00
#include <stdio.h>
#include <string.h>
#include "../xmss.h"
#define MLEN 3491
2015-08-12 13:37:49 +01:00
#define SIGNATURES 50
2015-08-11 11:08:27 +01:00
2015-10-28 14:49:46 +00:00
2015-08-11 11:08:27 +01:00
unsigned char mi[MLEN];
unsigned long long smlen;
unsigned long long mlen;
int main()
{
int r;
unsigned long long i;
2015-10-28 14:49:46 +00:00
int m = 64;
int n = 64;
2015-08-11 11:08:27 +01:00
int h = 8;
int w = 16;
2015-10-28 10:08:36 +00:00
unsigned long errors = 0;
2015-10-28 14:49:46 +00:00
unsigned char sk[3*n+4];
unsigned char pk[2*n];
2015-08-11 11:08:27 +01:00
xmss_params p;
xmss_params *params = &p;
xmss_set_params(params, m, n, h, w);
2015-08-12 13:37:49 +01:00
unsigned long long signature_length = 4+m+params->wots_par.keysize+h*n;
2015-08-11 11:08:27 +01:00
unsigned char mo[MLEN+signature_length];
unsigned char sm[MLEN+signature_length];
FILE *urandom = fopen("/dev/urandom", "r");
for(i=0;i<MLEN;i++) mi[i] = fgetc(urandom);
printf("keypair\n");
xmss_keypair(pk, sk, params);
// check pub_seed in SK
for(i=0;i<n;i++)
{
2015-08-12 13:37:49 +01:00
if(pk[n+i] != sk[4+m+n+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
2015-08-11 11:08:27 +01:00
}
// check index
2015-08-12 13:37:49 +01:00
unsigned long idx = ((unsigned long)sk[0] << 24) | ((unsigned long)sk[1] << 16) | ((unsigned long)sk[2] << 8) | sk[3];
if(idx) printf("\nidx != 0 %lu\n",idx);
2015-10-28 10:08:36 +00:00
for(i=0;i<(1<<h);i++){
2015-08-12 13:37:49 +01:00
printf("sign\n");
xmss_sign(sk, sm, &smlen, mi, MLEN, params);
idx = ((unsigned long)sm[0] << 24) | ((unsigned long)sm[1] << 16) | ((unsigned long)sm[2] << 8) | sm[3];
printf("\nidx = %lu\n",idx);
2015-08-11 11:08:27 +01:00
r = memcmp(mi, sm+signature_length,MLEN);
printf("%d\n", r);
2015-08-11 11:08:27 +01:00
2015-10-28 10:08:36 +00:00
/* Test valid signature */
printf("verify\n");
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r);
2015-10-28 10:08:36 +00:00
if(r != 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", r);
printf("%llu\n", MLEN-mlen);
2015-08-11 11:08:27 +01:00
/* Test with modified message */
2015-10-28 10:08:36 +00:00
sm[signature_length+10] ^= 1;
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
2015-10-28 10:08:36 +00:00
if(r == 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
/* Test with modified signature */
2015-10-28 10:08:36 +00:00
/* Modified index */
2015-10-28 14:49:46 +00:00
sm[signature_length+10] ^= 1;
sm[2] ^= 1;
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
2015-10-28 10:08:36 +00:00
if(r == 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
/* Modified R */
sm[2] ^= 1;
sm[5] ^= 1;
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
if(r == 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
/* Modified OTS sig */
sm[5] ^= 1;
sm[240] ^= 1;
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
if(r == 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
/* Modified AUTH */
sm[240] ^= 1;
sm[signature_length - 10] ^= 1;
r = xmss_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
if(r == 0) errors++;
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
}
2015-08-11 11:08:27 +01:00
2015-10-28 10:08:36 +00:00
printf("#errors = %lu\n", errors);
2015-08-11 11:08:27 +01:00
fclose(urandom);
return 0;
}