Sfoglia il codice sorgente

Add missing xmssmt test, ignore test binaries

master
Joost Rijneveld 9 anni fa
parent
commit
5823bae426
6 ha cambiato i file con 107 aggiunte e 1 eliminazioni
  1. +7
    -0
      .gitignore
  2. +3
    -1
      Makefile
  3. BIN
     
  4. BIN
     
  5. BIN
     
  6. +97
    -0
      test/test_xmssmt.c

+ 7
- 0
.gitignore Vedi File

@@ -0,0 +1,7 @@
test/test_chacha
test/test_wots
test/test_horst
test/test_xmss
test/test_xmssmt
test/speed
test/gen_testvectors

+ 3
- 1
Makefile Vedi File

@@ -22,8 +22,10 @@ test/test_xmssmt: chacha.c hash.c prg.c randombytes.c wots.c xmss.c xmss_commons

clean:
-rm *.o *.s
-rm test/test_sign
-rm test/test_chacha
-rm test/test_wots
-rm test/test_horst
-rm test/test_xmss
-rm test/test_xmssmt
-rm test/speed
-rm test/gen_testvectors

BIN
Vedi File


BIN
Vedi File


BIN
Vedi File


+ 97
- 0
test/test_xmssmt.c Vedi File

@@ -0,0 +1,97 @@
#include <stdio.h>
#include <string.h>

#include "../xmss.h"

#define MLEN 3491
#define SIGNATURES 1024

unsigned char pk[64];
unsigned char mi[MLEN];
unsigned long long smlen;
unsigned long long mlen;

int main()
{
int r;
unsigned long long i,j;
int m = 32;
int n = 32;
int h = 10;
int d = 2;
int w = 16;
xmssmt_params p;
xmssmt_params *params = &p;
xmssmt_set_params(params, m, n, h, d, w);
unsigned char sk[(params->index_len+2*n+m)];
unsigned long long signature_length = params->index_len + m + (d*params->xmss_par.wots_par.keysize) + h*n;
unsigned char mo[MLEN+signature_length];
unsigned char sm[MLEN+signature_length];

FILE *urandom = fopen("/dev/urandom", "r");
for(i=0;i<MLEN;i++) mi[i] = fgetc(urandom);

printf("keypair\n");
xmssmt_keypair(pk, sk, params);
// check pub_seed in SK
for(i=0;i<n;i++)
{
if(pk[n+i] != sk[params->index_len+m+n+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
}
printf("pk checked\n");

unsigned int idx_len = params->index_len;
// check index
unsigned long long idx = 0;
for(i = 0; i < idx_len; i++){
idx |= ((unsigned long long)sk[i]) << 8*(idx_len - 1 - i);
}

if(idx) printf("\nidx != 0: %llu\n",idx);
for(i=0;i<SIGNATURES;i++){
printf("sign\n");
xmssmt_sign(sk, sm, &smlen, mi, MLEN, params);
idx = 0;
for(j = 0; j < idx_len; j++){
idx |= ((unsigned long long)sm[j]) << 8*(idx_len - 1 - j);
}
printf("\nidx = %lu\n",idx);
r = memcmp(mi, sm+signature_length,MLEN);
printf("%d\n", r);
/* Test valid signature */
printf("verify\n");
r = xmssmt_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r);
r = memcmp(mi,mo,MLEN);
printf("%d\n", r);
printf("%llu\n", MLEN-mlen);

/* Test with modified message */
sm[52] ^= 1;
r = xmssmt_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);

/* Test with modified signature */
sm[260] ^= 1;
sm[52] ^= 1;
sm[2] ^= 1;
r = xmssmt_sign_open(mo, &mlen, sm, smlen, pk, params);
printf("%d\n", r+1);
r = memcmp(mi,mo,MLEN);
printf("%d\n", (r!=0) - 1);
printf("%llu\n", mlen+1);
}
fclose(urandom);
return 0;
}



Caricamento…
Annulla
Salva