#include #include #include "../xmss_core_fast.h" #include "../params.h" #include "../randombytes.h" #define MLEN 3491 #define SIGNATURES 128 unsigned char mi[MLEN]; unsigned long long smlen; unsigned long long mlen; unsigned long long t1, t2; unsigned long long cpucycles(void) { unsigned long long result; asm volatile(".byte 15;.byte 49;shlq $32,%%rdx;orq %%rdx,%%rax" : "=a" (result) :: "%rdx"); return result; } int main() { xmss_params params; // TODO test more different OIDs uint32_t oid = 0x01000001; xmssmt_parse_oid(¶ms, oid); int r; unsigned long long i,j; unsigned int n = params.n; unsigned int h = params.full_height; unsigned int d = params.d; unsigned int k = params.bds_k; unsigned int tree_h = h / d; // stack needs to be larger than regular (H-K-1), since we re-use for 'next' unsigned char stack[(2*d-1) * (tree_h + 1)*n]; unsigned char stacklevels[(2*d-1) * (tree_h + 1)*n]; unsigned char auth[(2*d-1) * tree_h*n]; unsigned char keep[(2*d-1) * (tree_h >> 1)*n]; treehash_inst treehash[(2*d-1) * (tree_h-k)]; unsigned char th_nodes[(2*d-1) * (tree_h-k)*n]; unsigned char retain[(2*d-1) * ((1 << k) - k - 1)*n]; unsigned char wots_sigs[d * params.wots_sig_bytes]; // first d are 'regular' states, second d are 'next'; top tree has no 'next' bds_state states[2*d-1]; for (i = 0; i < 2*d-1; i++) { for (j = 0; j < tree_h-k; j++) treehash[i*(tree_h-k) + j].node = th_nodes + (i*(tree_h-k) + j) * n; xmss_set_bds_state(states + i, stack + i*(tree_h + 1)*n, 0, stacklevels + i*(tree_h + 1), auth + i*tree_h*n, keep + i*(tree_h >> 1)*n, treehash + i*(tree_h-k), retain + i*((1 << k) - k - 1)*n, 0 ); } unsigned char sk[(params.index_bytes+4*n)]; unsigned char pk[2*n]; unsigned long long signature_length = params.index_bytes + n + (d*params.wots_sig_bytes) + h*n; unsigned char mo[MLEN+signature_length]; unsigned char sm[MLEN+signature_length]; randombytes(mi, MLEN); printf("keypair\n"); xmssmt_core_keypair(¶ms, pk, sk, states, wots_sigs); // check pub_seed in SK for (i = 0; i < n; i++) { if (pk[n+i] != sk[params.index_bytes+2*n+i]) printf("pk.pub_seed != sk.pub_seed %llu",i); if (pk[i] != sk[params.index_bytes+3*n+i]) printf("pk.root != sk.root %llu",i); } printf("pk checked\n"); unsigned int idx_len = params.index_bytes; // check index unsigned long long idx = 0; for (i = 0; i < idx_len; i++) { idx |= ((unsigned long long)sk[i]) << 8*(idx_len - 1 - i); } if (idx) printf("\nidx != 0: %llu\n",idx); for (i = 0; i < SIGNATURES; i++) { printf("sign\n"); t1 = cpucycles(); xmssmt_core_sign(¶ms, sk, states, wots_sigs, sm, &smlen, mi, MLEN); t2 = cpucycles(); printf("signing cycles = %llu\n", (t2-t1)); idx = 0; for (j = 0; j < idx_len; j++) { idx += ((unsigned long long)sm[j]) << 8*(idx_len - 1 - j); } printf("\nidx = %llu\n",idx); r = memcmp(mi, sm+signature_length,MLEN); printf("%d\n", r); /* Test valid signature */ printf("verify\n"); t1 = cpucycles(); r = xmssmt_core_sign_open(¶ms, mo, &mlen, sm, smlen, pk); t2 = cpucycles(); printf("verification cycles = %llu\n", (t2-t1)); printf("%d\n", r); r = memcmp(mi,mo,MLEN); printf("%d\n", r); printf("%llu\n", MLEN-mlen); /* Test with modified message */ sm[52] ^= 1; r = xmssmt_core_sign_open(¶ms, mo, &mlen, sm, smlen, pk); printf("%d\n", r+1); r = memcmp(mi,mo,MLEN); printf("%d\n", (r!=0) - 1); printf("%llu\n", mlen+1); /* Test with modified signature */ sm[260] ^= 1; sm[52] ^= 1; sm[2] ^= 1; r = xmssmt_core_sign_open(¶ms, mo, &mlen, sm, smlen, pk); printf("%d\n", r+1); r = memcmp(mi,mo,MLEN); printf("%d\n", (r!=0) - 1); printf("%llu\n", mlen+1); } return 0; }