You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

125 rivejä
3.1 KiB

  1. #include <stdio.h>
  2. #include <string.h>
  3. #include <stdint.h>
  4. #include "../xmss.h"
  5. #include "../params.h"
  6. #include "../randombytes.h"
  7. #define MLEN 3491
  8. #define SIGNATURES 5
  9. unsigned char mi[MLEN];
  10. unsigned long long smlen;
  11. unsigned long long mlen;
  12. int main()
  13. {
  14. // TODO test more different OIDs
  15. uint32_t oid = 0x01000001;
  16. xmss_parse_oid(oid); // Parse it to make sure the sizes are set
  17. int r;
  18. unsigned long long i, j;
  19. unsigned long errors = 0;
  20. unsigned char sk[XMSS_OID_LEN + XMSS_PRIVATEKEY_BYTES];
  21. unsigned char pk[XMSS_OID_LEN + XMSS_PUBLICKEY_BYTES];
  22. unsigned char mo[MLEN+XMSS_BYTES];
  23. unsigned char sm[MLEN+XMSS_BYTES];
  24. printf("keypair\n");
  25. xmss_keypair(pk, sk, oid);
  26. // check pub_seed in SK
  27. for (i = 0; i < XMSS_N; i++) {
  28. if (pk[XMSS_OID_LEN+XMSS_N+i] != sk[XMSS_OID_LEN+XMSS_INDEX_LEN+2*XMSS_N+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
  29. if (pk[XMSS_OID_LEN+i] != sk[XMSS_OID_LEN+XMSS_INDEX_LEN+3*XMSS_N+i]) printf("pk.root != sk.root %llu",i);
  30. }
  31. // check index
  32. unsigned long idx = ((unsigned long)sk[4] << 24) | ((unsigned long)sk[5] << 16) | ((unsigned long)sk[6] << 8) | sk[7];
  33. if (idx) printf("\nidx != 0 %lu\n",idx);
  34. for (i = 0; i < SIGNATURES; i++) {
  35. randombytes(mi, MLEN);
  36. printf("sign\n");
  37. xmss_sign(sk, sm, &smlen, mi, MLEN);
  38. idx = ((unsigned long)sm[0] << 24) | ((unsigned long)sm[1] << 16) | ((unsigned long)sm[2] << 8) | sm[3];
  39. printf("\nidx = %lu\n",idx);
  40. for (j = 0; j < smlen; j++) {
  41. printf("%02X", sm[j]);
  42. }
  43. printf("\n");
  44. r = memcmp(mi, sm+XMSS_BYTES,MLEN);
  45. printf("%d\n", r);
  46. /* Test valid signature */
  47. printf("verify\n");
  48. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  49. printf("%d\n", r);
  50. if (r != 0) errors++;
  51. r = memcmp(mi,mo,MLEN);
  52. printf("%d\n", r);
  53. printf("%llu\n", MLEN-mlen);
  54. /* Test with modified message */
  55. sm[XMSS_BYTES+10] ^= 1;
  56. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  57. printf("%d\n", r+1);
  58. if (r == 0) errors++;
  59. r = memcmp(mi,mo,MLEN);
  60. printf("%d\n", (r!=0) - 1);
  61. printf("%llu\n", mlen+1);
  62. /* Test with modified signature */
  63. /* Modified index */
  64. sm[XMSS_BYTES+10] ^= 1;
  65. sm[2] ^= 1;
  66. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  67. printf("%d\n", r+1);
  68. if (r == 0) errors++;
  69. r = memcmp(mi,mo,MLEN);
  70. printf("%d\n", (r!=0) - 1);
  71. printf("%llu\n", mlen+1);
  72. /* Modified R */
  73. sm[2] ^= 1;
  74. sm[5] ^= 1;
  75. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  76. printf("%d\n", r+1);
  77. if (r == 0) errors++;
  78. r = memcmp(mi,mo,MLEN);
  79. printf("%d\n", (r!=0) - 1);
  80. printf("%llu\n", mlen+1);
  81. /* Modified OTS sig */
  82. sm[5] ^= 1;
  83. sm[240] ^= 1;
  84. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  85. printf("%d\n", r+1);
  86. if (r == 0) errors++;
  87. r = memcmp(mi,mo,MLEN);
  88. printf("%d\n", (r!=0) - 1);
  89. printf("%llu\n", mlen+1);
  90. /* Modified AUTH */
  91. sm[240] ^= 1;
  92. sm[XMSS_BYTES - 10] ^= 1;
  93. r = xmss_sign_open(mo, &mlen, sm, smlen, pk);
  94. printf("%d\n", r+1);
  95. if (r == 0) errors++;
  96. r = memcmp(mi,mo,MLEN);
  97. printf("%d\n", (r!=0) - 1);
  98. printf("%llu\n", mlen+1);
  99. }
  100. printf("#errors = %lu\n", errors);
  101. return 0;
  102. }