summaryrefslogtreecommitdiff
path: root/src/libsodium/crypto_sign/try.c
blob: 8ea81b657b6ffd1258a49cff24a5d80389c54934 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
/*
 * crypto_sign/try.c version 20090118
 * D. J. Bernstein
 * Public domain.
 */

#include <stdlib.h>
#include "randombytes.h"
#include "crypto_sign.h"
#include "windows/windows-quirks.h"

#define MAXTEST_BYTES 10000
#define TUNE_BYTES 1536

extern unsigned char *alignedcalloc(unsigned long long);

const char *primitiveimplementation = crypto_sign_IMPLEMENTATION;

static unsigned char *pk;
static unsigned char *sk;
static unsigned char *m; unsigned long long mlen;
static unsigned char *sm; unsigned long long smlen;
static unsigned char *t; unsigned long long tlen;

void preallocate(void)
{
#ifdef RAND_R_PRNG_NOT_SEEDED
  RAND_status();
#endif
}

void allocate(void)
{
  pk = alignedcalloc(crypto_sign_PUBLICKEYBYTES);
  sk = alignedcalloc(crypto_sign_SECRETKEYBYTES);
  m = alignedcalloc(MAXTEST_BYTES + crypto_sign_BYTES);
  sm = alignedcalloc(MAXTEST_BYTES + crypto_sign_BYTES);
  t = alignedcalloc(MAXTEST_BYTES + crypto_sign_BYTES);
}

void predoit(void)
{
  crypto_sign_keypair(pk,sk);
  mlen = TUNE_BYTES;
  smlen = 0;
  randombytes(m,mlen);
  crypto_sign(sm,&smlen,m,mlen,sk);
}

void doit(void)
{
  crypto_sign_open(t,&tlen,sm,smlen,pk);
}

char checksum[crypto_sign_BYTES * 2 + 1];

const char *checksum_compute(void)
{
  long long mlen;
  long long i;
  long long j;

  if (crypto_sign_keypair(pk,sk) != 0) return "crypto_sign_keypair returns nonzero";
  for (mlen = 0;mlen < MAXTEST_BYTES;mlen += 1 + (mlen / 16)) {
    if (crypto_sign(sm,&smlen,m,mlen,sk) != 0) return "crypto_sign returns nonzero";
    if (crypto_sign_open(t,&tlen,sm,smlen,pk) != 0) return "crypto_sign_open returns nonzero";
    if (tlen != mlen) return "crypto_sign_open does not match length";
    for (i = 0;i < tlen;++i)
      if (t[i] != m[i])
        return "crypto_sign_open does not match contents";

    j = rand() % smlen;
    sm[j] ^= 1;
    if (crypto_sign_open(t,&tlen,sm,smlen,pk) == 0) {
      if (tlen != mlen) return "crypto_sign_open allows trivial forgery of length";
      for (i = 0;i < tlen;++i)
        if (t[i] != m[i])
          return "crypto_sign_open allows trivial forgery of contents";
    }
    sm[j] ^= 1;

  }

  /* do some long-term checksum */
  checksum[0] = 0;
  return 0;
}