initial version of SQIsign
Co-authored-by: Jorge Chavez-Saab <jorgechavezsaab@gmail.com> Co-authored-by: Maria Corte-Real Santos <36373796+mariascrs@users.noreply.github.com> Co-authored-by: Luca De Feo <github@defeo.lu> Co-authored-by: Jonathan Komada Eriksen <jonathan.eriksen97@gmail.com> Co-authored-by: Basil Hess <bhe@zurich.ibm.com> Co-authored-by: Antonin Leroux <18654258+tonioecto@users.noreply.github.com> Co-authored-by: Patrick Longa <plonga@microsoft.com> Co-authored-by: Lorenz Panny <lorenz@yx7.cc> Co-authored-by: Francisco Rodríguez-Henríquez <francisco.rodriguez@tii.ae> Co-authored-by: Sina Schaeffler <108983332+syndrakon@users.noreply.github.com> Co-authored-by: Benjamin Wesolowski <19474926+Calodeon@users.noreply.github.com>
This commit is contained in:
89
apps/example_nistapi.c
Normal file
89
apps/example_nistapi.c
Normal file
@@ -0,0 +1,89 @@
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
/**
|
||||
* An example to demonstrate how to use SQIsign with the NIST API.
|
||||
*/
|
||||
|
||||
#include <api.h>
|
||||
#include <mem.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdio.h>
|
||||
|
||||
/**
|
||||
* Example for SQIsign variant:
|
||||
* - crypto_sign_keypair
|
||||
* - crypto_sign
|
||||
* - crypto_sign_open
|
||||
*
|
||||
* @return int return code
|
||||
*/
|
||||
static int example_sqisign(void) {
|
||||
|
||||
unsigned long long msglen = 32;
|
||||
unsigned long long smlen = CRYPTO_BYTES + msglen;
|
||||
|
||||
unsigned char *pk = calloc(CRYPTO_PUBLICKEYBYTES, 1);
|
||||
unsigned char *sk = calloc(CRYPTO_SECRETKEYBYTES, 1);
|
||||
|
||||
unsigned char *sig = calloc(smlen, 1);
|
||||
|
||||
unsigned char msg[32] = { 0xe };
|
||||
unsigned char msg2[32] = { 0 };
|
||||
|
||||
printf("Example with %s\n", CRYPTO_ALGNAME);
|
||||
|
||||
printf("crypto_sign_keypair -> ");
|
||||
int res = crypto_sign_keypair(pk, sk);
|
||||
if (res) {
|
||||
printf("FAIL\n");
|
||||
res = -1;
|
||||
goto err;
|
||||
} else {
|
||||
printf("OK\n");
|
||||
}
|
||||
|
||||
printf("crypto_sign -> ");
|
||||
res = crypto_sign(sig, &smlen, msg, msglen, sk);
|
||||
if (res) {
|
||||
printf("FAIL\n");
|
||||
res = -1;
|
||||
goto err;
|
||||
} else {
|
||||
printf("OK\n");
|
||||
}
|
||||
|
||||
printf("crypto_sign_open (with correct signature) -> ");
|
||||
res = crypto_sign_open(msg2, &msglen, sig, smlen, pk);
|
||||
if (res || memcmp(msg, msg2, msglen)) {
|
||||
printf("FAIL\n");
|
||||
res = -1;
|
||||
goto err;
|
||||
} else {
|
||||
res = 0;
|
||||
printf("OK\n");
|
||||
}
|
||||
|
||||
printf("crypto_sign_open (with altered signature) -> ");
|
||||
sig[0] = ~sig[0];
|
||||
memset(msg2, 0, msglen);
|
||||
res = crypto_sign_open(msg2, &msglen, sig, smlen, pk);
|
||||
if (!res || !memcmp(msg, msg2, msglen)) {
|
||||
printf("FAIL\n");
|
||||
res = -1;
|
||||
goto err;
|
||||
} else {
|
||||
res = 0;
|
||||
printf("OK\n");
|
||||
}
|
||||
|
||||
err:
|
||||
free(pk);
|
||||
sqisign_secure_free(sk, CRYPTO_SECRETKEYBYTES);
|
||||
free(sig);
|
||||
return res;
|
||||
}
|
||||
|
||||
int main(void) {
|
||||
return example_sqisign();
|
||||
}
|
||||
Reference in New Issue
Block a user