Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

126 рядки
3.2 KiB

  1. #include <stdio.h>
  2. #include <string.h>
  3. #include <stdint.h>
  4. #include "../xmss.h"
  5. #include "../params.h"
  6. #include "../randombytes.h"
  7. #define MLEN 3491
  8. #define SIGNATURES 5
  9. unsigned char mi[MLEN];
  10. unsigned long long smlen;
  11. unsigned long long mlen;
  12. int main()
  13. {
  14. xmss_params params;
  15. // TODO test more different OIDs
  16. uint32_t oid = 0x01000001;
  17. xmss_parse_oid(&params, oid);
  18. int r;
  19. unsigned long long i, j;
  20. unsigned long errors = 0;
  21. unsigned char sk[XMSS_OID_LEN + params.sk_bytes];
  22. unsigned char pk[XMSS_OID_LEN + params.pk_bytes];
  23. unsigned char mo[MLEN+params.sig_bytes];
  24. unsigned char sm[MLEN+params.sig_bytes];
  25. printf("keypair\n");
  26. xmss_keypair(pk, sk, oid);
  27. // check pub_seed in SK
  28. for (i = 0; i < params.n; i++) {
  29. if (pk[XMSS_OID_LEN+params.n+i] != sk[XMSS_OID_LEN+params.index_bytes+2*params.n+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
  30. if (pk[XMSS_OID_LEN+i] != sk[XMSS_OID_LEN+params.index_bytes+3*params.n+i]) printf("pk.root != sk.root %llu",i);
  31. }
  32. // check index
  33. unsigned long idx = ((unsigned long)sk[4] << 24) | ((unsigned long)sk[5] << 16) | ((unsigned long)sk[6] << 8) | sk[7];
  34. if (idx) printf("\nidx != 0 %lu\n",idx);
  35. for (i = 0; i < SIGNATURES; i++) {
  36. randombytes(mi, MLEN);
  37. printf("sign\n");
  38. xmss_sign(sk, sm, &smlen, mi, MLEN);
  39. idx = ((unsigned long)sm[0] << 24) | ((unsigned long)sm[1] << 16) | ((unsigned long)sm[2] << 8) | sm[3];
  40. printf("\nidx = %lu\n",idx);
  41. for (j = 0; j < smlen; j++) {
  42. printf("%02X", sm[j]);
  43. }
  44. printf("\n");
  45. r = memcmp(mi, sm+params.sig_bytes,MLEN);
  46. printf("%d\n", r);
  47. /* Test valid signature */
  48. printf("verify\n");
  49. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  50. printf("%d\n", r);
  51. if (r != 0) errors++;
  52. r = memcmp(mi,mo,MLEN);
  53. printf("%d\n", r);
  54. printf("%llu\n", MLEN-mlen);
  55. /* Test with modified message */
  56. sm[params.sig_bytes+10] ^= 1;
  57. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  58. printf("%d\n", r+1);
  59. if (r == 0) errors++;
  60. r = memcmp(mi,mo,MLEN);
  61. printf("%d\n", (r!=0) - 1);
  62. printf("%llu\n", mlen+1);
  63. /* Test with modified signature */
  64. /* Modified index */
  65. sm[params.sig_bytes+10] ^= 1;
  66. sm[2] ^= 1;
  67. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  68. printf("%d\n", r+1);
  69. if (r == 0) errors++;
  70. r = memcmp(mi,mo,MLEN);
  71. printf("%d\n", (r!=0) - 1);
  72. printf("%llu\n", mlen+1);
  73. /* Modified R */
  74. sm[2] ^= 1;
  75. sm[5] ^= 1;
  76. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  77. printf("%d\n", r+1);
  78. if (r == 0) errors++;
  79. r = memcmp(mi,mo,MLEN);
  80. printf("%d\n", (r!=0) - 1);
  81. printf("%llu\n", mlen+1);
  82. /* Modified OTS sig */
  83. sm[5] ^= 1;
  84. sm[240] ^= 1;
  85. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  86. printf("%d\n", r+1);
  87. if (r == 0) errors++;
  88. r = memcmp(mi,mo,MLEN);
  89. printf("%d\n", (r!=0) - 1);
  90. printf("%llu\n", mlen+1);
  91. /* Modified AUTH */
  92. sm[240] ^= 1;
  93. sm[params.sig_bytes - 10] ^= 1;
  94. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  95. printf("%d\n", r+1);
  96. if (r == 0) errors++;
  97. r = memcmp(mi,mo,MLEN);
  98. printf("%d\n", (r!=0) - 1);
  99. printf("%llu\n", mlen+1);
  100. }
  101. printf("#errors = %lu\n", errors);
  102. return 0;
  103. }