sm2_ringtest.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. /*
  2. * Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the License); you may
  5. * not use this file except in compliance with the License.
  6. *
  7. * http://www.apache.org/licenses/LICENSE-2.0
  8. */
  9. #include <stdio.h>
  10. #include <string.h>
  11. #include <stdlib.h>
  12. #include <assert.h>
  13. #include <gmssl/sm2.h>
  14. #include <gmssl/sm2_ring.h>
  15. #include <gmssl/error.h>
  16. static int test_sm2_ring_do_sign(void)
  17. {
  18. SM2_KEY sign_key;
  19. SM2_POINT public_keys[5];
  20. size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
  21. size_t sign_index, i;
  22. uint8_t dgst[32];
  23. uint8_t r[32];
  24. uint8_t s[sizeof(public_keys)/sizeof(public_keys[0])][32];
  25. for (sign_index = 0; sign_index < 5; sign_index++) {
  26. for (i = 0; i < public_keys_count; i++) {
  27. SM2_KEY key;
  28. sm2_key_generate(&key);
  29. memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
  30. if (i == sign_index) {
  31. memcpy(&sign_key, &key, sizeof(SM2_KEY));
  32. }
  33. }
  34. if (sm2_ring_do_sign(&sign_key, public_keys, public_keys_count, dgst, r, s) != 1) {
  35. error_print();
  36. return -1;
  37. }
  38. if (sm2_ring_do_verify(public_keys, public_keys_count, dgst, r, s) != 1) {
  39. error_print();
  40. return -1;
  41. }
  42. }
  43. printf("%s() ok\n", __FUNCTION__);
  44. return 1;
  45. }
  46. static int test_sm2_ring_sign(void)
  47. {
  48. SM2_KEY sign_key;
  49. SM2_POINT public_keys[5];
  50. size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
  51. size_t sign_index = 2, i;
  52. uint8_t dgst[32];
  53. uint8_t sig[9 + (2 + 33) * (1 + sizeof(public_keys)/sizeof(public_keys[0]))];
  54. size_t siglen = 0;
  55. for (i = 0; i < public_keys_count; i++) {
  56. SM2_KEY key;
  57. sm2_key_generate(&key);
  58. memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
  59. if (i == sign_index) {
  60. memcpy(&sign_key, &key, sizeof(SM2_KEY));
  61. }
  62. }
  63. if (sm2_ring_sign(&sign_key, public_keys, public_keys_count, dgst, sig, &siglen) != 1) {
  64. error_print();
  65. return -1;
  66. }
  67. if (sm2_ring_verify(public_keys, 5, dgst, sig, siglen) != 1) {
  68. error_print();
  69. return -1;
  70. }
  71. printf("%s() ok\n", __FUNCTION__);
  72. return 1;
  73. }
  74. static int test_sm2_ring_sign_crosscheck(void)
  75. {
  76. SM2_KEY sign_key;
  77. SM2_POINT public_key;
  78. uint8_t dgst[32];
  79. uint8_t sig[SM2_MAX_SIGNATURE_SIZE];
  80. size_t siglen = 0;
  81. sm2_key_generate(&sign_key);
  82. public_key = sign_key.public_key;
  83. if (sm2_ring_sign(&sign_key, &public_key, 1, dgst, sig, &siglen) != 1) {
  84. error_print();
  85. return -1;
  86. }
  87. if (sm2_ring_verify(&public_key, 1, dgst, sig, siglen) != 1) {
  88. error_print();
  89. return -1;
  90. }
  91. printf("%s() ok\n", __FUNCTION__);
  92. return 1;
  93. }
  94. static int test_sm2_ring_sign_update(void)
  95. {
  96. SM2_KEY keys[5];
  97. SM2_RING_SIGN_CTX sign_ctx;
  98. SM2_RING_SIGN_CTX verify_ctx;
  99. size_t public_keys_count = sizeof(keys)/sizeof(keys[0]);
  100. char *id = "Alice";
  101. uint8_t msg[128] = {0};
  102. uint8_t sig[9 + (2 + 33) * (1 + sizeof(keys)/sizeof(keys[0]))];
  103. size_t siglen = 0;
  104. size_t i;
  105. for (i = 0; i < public_keys_count; i++) {
  106. sm2_key_generate(&keys[i]);
  107. }
  108. if (sm2_ring_sign_init(&sign_ctx, &keys[0], id, strlen(id)) != 1) {
  109. error_print();
  110. return -1;
  111. }
  112. for (i = 1; i < public_keys_count; i++) {
  113. if (sm2_ring_sign_add_signer(&sign_ctx, &keys[i]) != 1) {
  114. error_print();
  115. return -1;
  116. }
  117. }
  118. if (sm2_ring_sign_update(&sign_ctx, msg, 32) != 1
  119. || sm2_ring_sign_update(&sign_ctx, msg + 32, 32) != 1
  120. || sm2_ring_sign_update(&sign_ctx, msg + 64, 64) != 1
  121. || sm2_ring_sign_finish(&sign_ctx, sig, &siglen) != 1) {
  122. error_print();
  123. return -1;
  124. }
  125. if (sm2_ring_verify_init(&verify_ctx, id, strlen(id)) != 1) {
  126. error_print();
  127. return -1;
  128. }
  129. for (i = 0; i < public_keys_count; i++) {
  130. if (sm2_ring_verify_add_signer(&verify_ctx, &keys[i]) != 1) {
  131. error_print();
  132. return -1;
  133. }
  134. }
  135. if (sm2_ring_verify_update(&verify_ctx, msg, sizeof(msg)) != 1) {
  136. error_print();
  137. return -1;
  138. }
  139. if (sm2_ring_verify_finish(&verify_ctx, sig, siglen) != 1) {
  140. error_print();
  141. return -1;
  142. }
  143. printf("%s() ok\n", __FUNCTION__);
  144. return 1;
  145. }
  146. int main(void)
  147. {
  148. if (test_sm2_ring_do_sign() != 1) { error_print(); return -1; }
  149. if (test_sm2_ring_sign() != 1) { error_print(); return -1; }
  150. if (test_sm2_ring_sign_crosscheck() != 1) { error_print(); return -1; }
  151. if (test_sm2_ring_sign_update() != 1) { error_print(); return -1; }
  152. return 0;
  153. }