xmss-KAT-generator/ui/sign.c

103 строки
2.9 KiB
C
Исходник Обычный вид История

#include <stdio.h>
#include <stdlib.h>
2017-10-26 13:47:34 +01:00
#include "../params.h"
#include "../xmss.h"
#include "../utils.h"
2017-10-26 12:47:29 +01:00
#ifdef XMSSMT
#define XMSS_PARSE_OID xmssmt_parse_oid
#define XMSS_SIGN xmssmt_sign
2017-10-26 12:47:29 +01:00
#else
#define XMSS_PARSE_OID xmss_parse_oid
#define XMSS_SIGN xmss_sign
2017-10-26 12:47:29 +01:00
#endif
int main(int argc, char **argv) {
2017-10-26 13:47:34 +01:00
FILE *keypair_file;
FILE *m_file;
xmss_params params;
uint32_t oid_pk = 0;
uint32_t oid_sk = 0;
uint8_t buffer[XMSS_OID_LEN];
int parse_oid_result;
2017-10-26 13:47:34 +01:00
unsigned long long mlen;
if (argc != 3) {
fprintf(stderr, "Expected keypair and message filenames as two "
"parameters.\n"
"The keypair is updated with the changed state, "
"and the message + signature is output via stdout.\n");
return -1;
}
2017-10-26 13:47:34 +01:00
keypair_file = fopen(argv[1], "r+b");
if (keypair_file == NULL) {
fprintf(stderr, "Could not open keypair file.\n");
return -1;
}
2017-10-26 13:47:34 +01:00
m_file = fopen(argv[2], "rb");
if (m_file == NULL) {
fprintf(stderr, "Could not open message file.\n");
fclose(keypair_file);
2017-10-26 13:47:34 +01:00
return -1;
}
/* Find out the message length. */
fseek(m_file, 0, SEEK_END);
mlen = ftell(m_file);
/* Read the OID from the public key, as we need its length to seek past it */
fread(&buffer, 1, XMSS_OID_LEN, keypair_file);
/* The XMSS_OID_LEN bytes in buffer are a big-endian uint32. */
oid_pk = (uint32_t)bytes_to_ull(buffer, XMSS_OID_LEN);
parse_oid_result = XMSS_PARSE_OID(&params, oid_pk);
if (parse_oid_result != 0) {
fprintf(stderr, "Error parsing public key oid.\n");
fclose(keypair_file);
fclose(m_file);
return parse_oid_result;
}
/* fseek past the public key */
2017-10-26 13:47:34 +01:00
fseek(keypair_file, params.pk_bytes, SEEK_CUR);
/* This is the OID we're actually going to use. Likely the same, but still. */
fread(&buffer, 1, XMSS_OID_LEN, keypair_file);
oid_sk = (uint32_t)bytes_to_ull(buffer, XMSS_OID_LEN);
parse_oid_result = XMSS_PARSE_OID(&params, oid_sk);
if (parse_oid_result != 0) {
fprintf(stderr, "Error parsing secret key oid.\n");
fclose(keypair_file);
fclose(m_file);
return parse_oid_result;
}
unsigned char sk[XMSS_OID_LEN + params.sk_bytes];
unsigned char *m = malloc(mlen);
unsigned char *sm = malloc(params.sig_bytes + mlen);
unsigned long long smlen;
/* fseek back to start of sk. */
2017-10-26 13:47:34 +01:00
fseek(keypair_file, -((long int)XMSS_OID_LEN), SEEK_CUR);
fseek(m_file, 0, SEEK_SET);
fread(sk, 1, XMSS_OID_LEN + params.sk_bytes, keypair_file);
fread(m, 1, mlen, m_file);
2017-10-26 13:47:34 +01:00
XMSS_SIGN(sk, sm, &smlen, m, mlen);
2017-10-26 13:47:34 +01:00
fseek(keypair_file, -((long int)params.sk_bytes), SEEK_CUR);
fwrite(sk + XMSS_OID_LEN, 1, params.sk_bytes, keypair_file);
fwrite(sm, 1, smlen, stdout);
2017-10-26 13:47:34 +01:00
fclose(keypair_file);
fclose(m_file);
free(m);
free(sm);
return 0;
}