Du kannst nicht mehr als 25 Themen auswählen Themen müssen entweder mit einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

146 Zeilen
4.1 KiB

  1. #include <stdio.h>
  2. #include <string.h>
  3. #include <stdlib.h>
  4. #include "../xmss_core_fast.h"
  5. #include "../params.h"
  6. #include "../randombytes.h"
  7. #define MLEN 3491
  8. #define SIGNATURES 256
  9. unsigned long long t1, t2;
  10. unsigned long long cpucycles(void)
  11. {
  12. unsigned long long result;
  13. asm volatile(".byte 15;.byte 49;shlq $32,%%rdx;orq %%rdx,%%rax" : "=a" (result) :: "%rdx");
  14. return result;
  15. }
  16. int main()
  17. {
  18. int r;
  19. unsigned long long i;
  20. unsigned int k = XMSS_BDS_K;
  21. unsigned long errors = 0;
  22. unsigned char sk[4*XMSS_N+4];
  23. unsigned char pk[2*XMSS_N];
  24. // TODO should we hide this into xmss_fast.c and just allocate a large enough chunk of memory here?
  25. unsigned char stack[(XMSS_TREEHEIGHT+1)*XMSS_N];
  26. unsigned int stackoffset = 0;
  27. unsigned char stacklevels[XMSS_TREEHEIGHT+1];
  28. unsigned char auth[(XMSS_TREEHEIGHT)*XMSS_N];
  29. unsigned char keep[(XMSS_TREEHEIGHT >> 1)*XMSS_N];
  30. treehash_inst treehash[XMSS_TREEHEIGHT-k];
  31. unsigned char th_nodes[(XMSS_TREEHEIGHT-k)*XMSS_N];
  32. unsigned char retain[((1 << k) - k - 1)*XMSS_N];
  33. bds_state s;
  34. bds_state *state = &s;
  35. for (i = 0; i < XMSS_TREEHEIGHT-k; i++)
  36. treehash[i].node = &th_nodes[XMSS_N*i];
  37. xmss_set_bds_state(state, stack, stackoffset, stacklevels, auth, keep, treehash, retain, 0);
  38. unsigned long long signature_length = 4+XMSS_N+XMSS_WOTS_KEYSIZE+XMSS_TREEHEIGHT*XMSS_N;
  39. unsigned char mi[MLEN];
  40. unsigned char mo[MLEN+signature_length];
  41. unsigned char sm[MLEN+signature_length];
  42. unsigned long long smlen;
  43. unsigned long long mlen;
  44. randombytes(mi, MLEN);
  45. printf("keypair\n");
  46. t1 = cpucycles();
  47. xmss_core_keypair(pk, sk, state);
  48. t2 = cpucycles();
  49. printf("cycles = %llu\n", (t2-t1));
  50. double sec = (t2-t1)/3500000;
  51. printf("ms = %f\n", sec);
  52. // check pub_seed in SK
  53. for (i = 0; i < XMSS_N; i++) {
  54. if (pk[XMSS_N+i] != sk[4+2*XMSS_N+i]) printf("pk.pub_seed != sk.pub_seed %llu",i);
  55. if (pk[i] != sk[4+3*XMSS_N+i]) printf("pk.root != sk.root %llu",i);
  56. }
  57. // check index
  58. unsigned long idx = ((unsigned long)sk[0] << 24) | ((unsigned long)sk[1] << 16) | ((unsigned long)sk[2] << 8) | sk[3];
  59. if (idx) printf("\nidx != 0 %lu\n",idx);
  60. for (i = 0; i < SIGNATURES; i++) {
  61. printf("sign\n");
  62. xmss_core_sign(sk, state, sm, &smlen, mi, MLEN);
  63. idx = ((unsigned long)sm[0] << 24) | ((unsigned long)sm[1] << 16) | ((unsigned long)sm[2] << 8) | sm[3];
  64. printf("\nidx = %lu\n",idx);
  65. r = memcmp(mi, sm+signature_length,MLEN);
  66. printf("%d\n", r);
  67. /* Test valid signature */
  68. printf("verify\n");
  69. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  70. printf("%d\n", r);
  71. if (r != 0) errors++;
  72. r = memcmp(mi,mo,MLEN);
  73. printf("%d\n", r);
  74. printf("%llu\n", MLEN-mlen);
  75. /* Test with modified message */
  76. sm[signature_length+10] ^= 1;
  77. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  78. printf("%d\n", r+1);
  79. if (r == 0) errors++;
  80. r = memcmp(mi,mo,MLEN);
  81. printf("%d\n", (r!=0) - 1);
  82. printf("%llu\n", mlen+1);
  83. /* Test with modified signature */
  84. /* Modified index */
  85. sm[signature_length+10] ^= 1;
  86. sm[2] ^= 1;
  87. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  88. printf("%d\n", r+1);
  89. if (r == 0) errors++;
  90. r = memcmp(mi,mo,MLEN);
  91. printf("%d\n", (r!=0) - 1);
  92. printf("%llu\n", mlen+1);
  93. /* Modified R */
  94. sm[2] ^= 1;
  95. sm[5] ^= 1;
  96. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  97. printf("%d\n", r+1);
  98. if (r == 0) errors++;
  99. r = memcmp(mi,mo,MLEN);
  100. printf("%d\n", (r!=0) - 1);
  101. printf("%llu\n", mlen+1);
  102. /* Modified OTS sig */
  103. sm[5] ^= 1;
  104. sm[240] ^= 1;
  105. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  106. printf("%d\n", r+1);
  107. if (r == 0) errors++;
  108. r = memcmp(mi,mo,MLEN);
  109. printf("%d\n", (r!=0) - 1);
  110. printf("%llu\n", mlen+1);
  111. /* Modified AUTH */
  112. sm[240] ^= 1;
  113. sm[signature_length - 10] ^= 1;
  114. r = xmss_core_sign_open(mo, &mlen, sm, smlen, pk);
  115. printf("%d\n", r+1);
  116. if (r == 0) errors++;
  117. r = memcmp(mi,mo,MLEN);
  118. printf("%d\n", (r!=0) - 1);
  119. printf("%llu\n", mlen+1);
  120. }
  121. printf("#errors = %lu\n", errors);
  122. printf("finished loop\n");
  123. return 0;
  124. }