| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174 | 
							- /*
 
-  *  Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
 
-  *
 
-  *  Licensed under the Apache License, Version 2.0 (the License); you may
 
-  *  not use this file except in compliance with the License.
 
-  *
 
-  *  http://www.apache.org/licenses/LICENSE-2.0
 
-  */
 
- #include <stdio.h>
 
- #include <string.h>
 
- #include <stdlib.h>
 
- #include <assert.h>
 
- #include <gmssl/sm2.h>
 
- #include <gmssl/sm2_ring.h>
 
- #include <gmssl/error.h>
 
- static int test_sm2_ring_do_sign(void)
 
- {
 
- 	SM2_KEY sign_key;
 
- 	SM2_POINT public_keys[5];
 
- 	size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
 
- 	size_t sign_index, i;
 
- 	uint8_t dgst[32];
 
- 	uint8_t r[32];
 
- 	uint8_t s[sizeof(public_keys)/sizeof(public_keys[0])][32];
 
- 	for (sign_index = 0; sign_index < 5; sign_index++) {
 
- 		for (i = 0; i < public_keys_count; i++) {
 
- 			SM2_KEY key;
 
- 			sm2_key_generate(&key);
 
- 			memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
 
- 			if (i == sign_index) {
 
- 				memcpy(&sign_key, &key, sizeof(SM2_KEY));
 
- 			}
 
- 		}
 
- 		if (sm2_ring_do_sign(&sign_key, public_keys, public_keys_count, dgst, r, s) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 		if (sm2_ring_do_verify(public_keys, public_keys_count, dgst, r, s) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_sm2_ring_sign(void)
 
- {
 
- 	SM2_KEY sign_key;
 
- 	SM2_POINT public_keys[5];
 
- 	size_t public_keys_count = sizeof(public_keys)/sizeof(public_keys[0]);
 
- 	size_t sign_index = 2, i;
 
- 	uint8_t dgst[32];
 
- 	uint8_t sig[9 + (2 + 33) * (1 + sizeof(public_keys)/sizeof(public_keys[0]))];
 
- 	size_t siglen = 0;
 
- 	for (i = 0; i < public_keys_count; i++) {
 
- 		SM2_KEY key;
 
- 		sm2_key_generate(&key);
 
- 		memcpy(&public_keys[i], &(key.public_key), sizeof(SM2_POINT));
 
- 		if (i == sign_index) {
 
- 			memcpy(&sign_key, &key, sizeof(SM2_KEY));
 
- 		}
 
- 	}
 
- 	if (sm2_ring_sign(&sign_key, public_keys, public_keys_count, dgst, sig, &siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_ring_verify(public_keys, 5, dgst, sig, siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_sm2_ring_sign_crosscheck(void)
 
- {
 
- 	SM2_KEY sign_key;
 
- 	SM2_POINT public_key;
 
- 	uint8_t dgst[32];
 
- 	uint8_t sig[SM2_MAX_SIGNATURE_SIZE];
 
- 	size_t siglen = 0;
 
- 	sm2_key_generate(&sign_key);
 
- 	public_key = sign_key.public_key;
 
- 	if (sm2_ring_sign(&sign_key, &public_key, 1, dgst, sig, &siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_ring_verify(&public_key, 1, dgst, sig, siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- static int test_sm2_ring_sign_update(void)
 
- {
 
- 	SM2_KEY keys[5];
 
- 	SM2_RING_SIGN_CTX sign_ctx;
 
- 	SM2_RING_SIGN_CTX verify_ctx;
 
- 	size_t public_keys_count = sizeof(keys)/sizeof(keys[0]);
 
- 	char *id = "Alice";
 
- 	uint8_t msg[128] = {0};
 
- 	uint8_t sig[9 + (2 + 33) * (1 + sizeof(keys)/sizeof(keys[0]))];
 
- 	size_t siglen = 0;
 
- 	size_t i;
 
- 	for (i = 0; i < public_keys_count; i++) {
 
- 		sm2_key_generate(&keys[i]);
 
- 	}
 
- 	if (sm2_ring_sign_init(&sign_ctx, &keys[0], id, strlen(id)) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	for (i = 1; i < public_keys_count; i++) {
 
- 		if (sm2_ring_sign_add_signer(&sign_ctx, &keys[i]) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 	}
 
- 	if (sm2_ring_sign_update(&sign_ctx, msg, 32) != 1
 
- 		|| sm2_ring_sign_update(&sign_ctx, msg + 32, 32) != 1
 
- 		|| sm2_ring_sign_update(&sign_ctx, msg + 64, 64) != 1
 
- 		|| sm2_ring_sign_finish(&sign_ctx, sig, &siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_ring_verify_init(&verify_ctx, id, strlen(id)) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	for (i = 0; i < public_keys_count; i++) {
 
- 		if (sm2_ring_verify_add_signer(&verify_ctx, &keys[i]) != 1) {
 
- 			error_print();
 
- 			return -1;
 
- 		}
 
- 	}
 
- 	if (sm2_ring_verify_update(&verify_ctx, msg, sizeof(msg)) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	if (sm2_ring_verify_finish(&verify_ctx, sig, siglen) != 1) {
 
- 		error_print();
 
- 		return -1;
 
- 	}
 
- 	printf("%s() ok\n", __FUNCTION__);
 
- 	return 1;
 
- }
 
- int main(void)
 
- {
 
- 	if (test_sm2_ring_do_sign() != 1) { error_print(); return -1; }
 
- 	if (test_sm2_ring_sign() != 1) { error_print(); return -1; }
 
- 	if (test_sm2_ring_sign_crosscheck() != 1) { error_print(); return -1; }
 
- 	if (test_sm2_ring_sign_update() != 1) { error_print(); return -1; }
 
- 	return 0;
 
- }
 
 
  |