123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174 |
- /*
- * Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the License); you may
- * not use this file except in compliance with the License.
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- */
- #include <stdio.h>
- #include <string.h>
- #include <stdlib.h>
- #include <assert.h>
- #include <gmssl/sm2.h>
- #include <gmssl/sm2_ring.h>
- #include <gmssl/error.h>
- static int test_sm2_ring_do_sign(void)
- {
- SM2_KEY sign_key;
- SM2_POINT public_keys[5];
- size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
- size_t sign_index, i;
- uint8_t dgst[32];
- uint8_t r[32];
- uint8_t s[sizeof(public_keys)/sizeof(public_keys[0])][32];
- for (sign_index = 0; sign_index < 5; sign_index++) {
- for (i = 0; i < public_keys_count; i++) {
- SM2_KEY key;
- sm2_key_generate(&key);
- memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
- if (i == sign_index) {
- memcpy(&sign_key, &key, sizeof(SM2_KEY));
- }
- }
- if (sm2_ring_do_sign(&sign_key, public_keys, public_keys_count, dgst, r, s) != 1) {
- error_print();
- return -1;
- }
- if (sm2_ring_do_verify(public_keys, public_keys_count, dgst, r, s) != 1) {
- error_print();
- return -1;
- }
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_sm2_ring_sign(void)
- {
- SM2_KEY sign_key;
- SM2_POINT public_keys[5];
- size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
- size_t sign_index = 2, i;
- uint8_t dgst[32];
- uint8_t sig[9 + (2 + 33) * (1 + sizeof(public_keys)/sizeof(public_keys[0]))];
- size_t siglen = 0;
- for (i = 0; i < public_keys_count; i++) {
- SM2_KEY key;
- sm2_key_generate(&key);
- memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
- if (i == sign_index) {
- memcpy(&sign_key, &key, sizeof(SM2_KEY));
- }
- }
- if (sm2_ring_sign(&sign_key, public_keys, public_keys_count, dgst, sig, &siglen) != 1) {
- error_print();
- return -1;
- }
- if (sm2_ring_verify(public_keys, 5, dgst, sig, siglen) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_sm2_ring_sign_crosscheck(void)
- {
- SM2_KEY sign_key;
- SM2_POINT public_key;
- uint8_t dgst[32];
- uint8_t sig[SM2_MAX_SIGNATURE_SIZE];
- size_t siglen = 0;
- sm2_key_generate(&sign_key);
- public_key = sign_key.public_key;
- if (sm2_ring_sign(&sign_key, &public_key, 1, dgst, sig, &siglen) != 1) {
- error_print();
- return -1;
- }
- if (sm2_ring_verify(&public_key, 1, dgst, sig, siglen) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- static int test_sm2_ring_sign_update(void)
- {
- SM2_KEY keys[5];
- SM2_RING_SIGN_CTX sign_ctx;
- SM2_RING_SIGN_CTX verify_ctx;
- size_t public_keys_count = sizeof(keys)/sizeof(keys[0]);
- char *id = "Alice";
- uint8_t msg[128] = {0};
- uint8_t sig[9 + (2 + 33) * (1 + sizeof(keys)/sizeof(keys[0]))];
- size_t siglen = 0;
- size_t i;
- for (i = 0; i < public_keys_count; i++) {
- sm2_key_generate(&keys[i]);
- }
- if (sm2_ring_sign_init(&sign_ctx, &keys[0], id, strlen(id)) != 1) {
- error_print();
- return -1;
- }
- for (i = 1; i < public_keys_count; i++) {
- if (sm2_ring_sign_add_signer(&sign_ctx, &keys[i]) != 1) {
- error_print();
- return -1;
- }
- }
- if (sm2_ring_sign_update(&sign_ctx, msg, 32) != 1
- || sm2_ring_sign_update(&sign_ctx, msg + 32, 32) != 1
- || sm2_ring_sign_update(&sign_ctx, msg + 64, 64) != 1
- || sm2_ring_sign_finish(&sign_ctx, sig, &siglen) != 1) {
- error_print();
- return -1;
- }
- if (sm2_ring_verify_init(&verify_ctx, id, strlen(id)) != 1) {
- error_print();
- return -1;
- }
- for (i = 0; i < public_keys_count; i++) {
- if (sm2_ring_verify_add_signer(&verify_ctx, &keys[i]) != 1) {
- error_print();
- return -1;
- }
- }
- if (sm2_ring_verify_update(&verify_ctx, msg, sizeof(msg)) != 1) {
- error_print();
- return -1;
- }
- if (sm2_ring_verify_finish(&verify_ctx, sig, siglen) != 1) {
- error_print();
- return -1;
- }
- printf("%s() ok\n", __FUNCTION__);
- return 1;
- }
- int main(void)
- {
- if (test_sm2_ring_do_sign() != 1) { error_print(); return -1; }
- if (test_sm2_ring_sign() != 1) { error_print(); return -1; }
- if (test_sm2_ring_sign_crosscheck() != 1) { error_print(); return -1; }
- if (test_sm2_ring_sign_update() != 1) { error_print(); return -1; }
- return 0;
- }
|