You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

151 rivejä
4.3 KiB

  1. #include <stdio.h>
  2. #include <string.h>
  3. #include <stdlib.h>
  4. #include "../xmss_core_fast.h"
  5. #include "../params.h"
  6. #include "../randombytes.h"
  7. #define MLEN 3491
  8. #define SIGNATURES 256
  9. unsigned long long t1, t2;
  10. unsigned long long cpucycles(void)
  11. {
  12. unsigned long long result;
  13. asm volatile(".byte 15;.byte 49;shlq $32,%%rdx;orq %%rdx,%%rax" : "=a" (result) :: "%rdx");
  14. return result;
  15. }
  16. int main()
  17. {
  18. xmss_params params;
  19. // TODO test more different OIDs
  20. uint32_t oid = 0x01000001;
  21. xmss_parse_oid(&params, oid);
  22. int r;
  23. unsigned long long i;
  24. unsigned int k = params.bds_k;
  25. unsigned long errors = 0;
  26. unsigned char sk[4*params.n+4];
  27. unsigned char pk[2*params.n];
  28. // TODO should we hide this into xmss_fast.c and just allocate a large enough chunk of memory here?
  29. unsigned char stack[(params.tree_height+1)*params.n];
  30. unsigned int stackoffset = 0;
  31. unsigned char stacklevels[params.tree_height+1];
  32. unsigned char auth[(params.tree_height)*params.n];
  33. unsigned char keep[(params.tree_height >> 1)*params.n];
  34. treehash_inst treehash[params.tree_height-k];
  35. unsigned char th_nodes[(params.tree_height-k)*params.n];
  36. unsigned char retain[((1 << k) - k - 1)*params.n];
  37. bds_state s;
  38. bds_state *state = &s;
  39. for (i = 0; i < params.tree_height-k; i++)
  40. treehash[i].node = &th_nodes[params.n*i];
  41. xmss_set_bds_state(state, stack, stackoffset, stacklevels, auth, keep, treehash, retain, 0);
  42. unsigned long long signature_length = 4+params.n+params.wots_sig_bytes+params.tree_height*params.n;
  43. unsigned char mi[MLEN];
  44. unsigned char mo[MLEN+signature_length];
  45. unsigned char sm[MLEN+signature_length];
  46. unsigned long long smlen;
  47. unsigned long long mlen;
  48. randombytes(mi, MLEN);
  49. printf("keypair\n");
  50. t1 = cpucycles();
  51. xmss_core_keypair(&params, pk, sk, state);
  52. t2 = cpucycles();
  53. printf("cycles = %llu\n", (t2-t1));
  54. double sec = (t2-t1)/3500000;
  55. printf("ms = %f\n", sec);
  56. // check pub_seed in SK
  57. for (i = 0; i < params.n; i++) {
  58. if (pk[params.n+i] != sk[4+2*params.n+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
  59. if (pk[i] != sk[4+3*params.n+i]) printf("pk.root != sk.root %llu",i);
  60. }
  61. // check index
  62. unsigned long idx = ((unsigned long)sk[0] << 24) | ((unsigned long)sk[1] << 16) | ((unsigned long)sk[2] << 8) | sk[3];
  63. if (idx) printf("\nidx != 0 %lu\n",idx);
  64. for (i = 0; i < SIGNATURES; i++) {
  65. printf("sign\n");
  66. xmss_core_sign(&params, sk, state, sm, &smlen, mi, MLEN);
  67. idx = ((unsigned long)sm[0] << 24) | ((unsigned long)sm[1] << 16) | ((unsigned long)sm[2] << 8) | sm[3];
  68. printf("\nidx = %lu\n",idx);
  69. r = memcmp(mi, sm+signature_length,MLEN);
  70. printf("%d\n", r);
  71. /* Test valid signature */
  72. printf("verify\n");
  73. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  74. printf("%d\n", r);
  75. if (r != 0) errors++;
  76. r = memcmp(mi,mo,MLEN);
  77. printf("%d\n", r);
  78. printf("%llu\n", MLEN-mlen);
  79. /* Test with modified message */
  80. sm[signature_length+10] ^= 1;
  81. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  82. printf("%d\n", r+1);
  83. if (r == 0) errors++;
  84. r = memcmp(mi,mo,MLEN);
  85. printf("%d\n", (r!=0) - 1);
  86. printf("%llu\n", mlen+1);
  87. /* Test with modified signature */
  88. /* Modified index */
  89. sm[signature_length+10] ^= 1;
  90. sm[2] ^= 1;
  91. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  92. printf("%d\n", r+1);
  93. if (r == 0) errors++;
  94. r = memcmp(mi,mo,MLEN);
  95. printf("%d\n", (r!=0) - 1);
  96. printf("%llu\n", mlen+1);
  97. /* Modified R */
  98. sm[2] ^= 1;
  99. sm[5] ^= 1;
  100. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  101. printf("%d\n", r+1);
  102. if (r == 0) errors++;
  103. r = memcmp(mi,mo,MLEN);
  104. printf("%d\n", (r!=0) - 1);
  105. printf("%llu\n", mlen+1);
  106. /* Modified OTS sig */
  107. sm[5] ^= 1;
  108. sm[240] ^= 1;
  109. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  110. printf("%d\n", r+1);
  111. if (r == 0) errors++;
  112. r = memcmp(mi,mo,MLEN);
  113. printf("%d\n", (r!=0) - 1);
  114. printf("%llu\n", mlen+1);
  115. /* Modified AUTH */
  116. sm[240] ^= 1;
  117. sm[signature_length - 10] ^= 1;
  118. r = xmss_core_sign_open(&params, mo, &mlen, sm, smlen, pk);
  119. printf("%d\n", r+1);
  120. if (r == 0) errors++;
  121. r = memcmp(mi,mo,MLEN);
  122. printf("%d\n", (r!=0) - 1);
  123. printf("%llu\n", mlen+1);
  124. }
  125. printf("#errors = %lu\n", errors);
  126. printf("finished loop\n");
  127. return 0;
  128. }