blob: b1443b021e68b79f35f9d5d9db2c2e16679563da [file] [log] [blame]
/**
* @file test_mpin_ZZZ.c
* @author Kealan McCusker
* @brief Test Designated Verifier Signature (DVS) scheme with incorrect PIN
*
* LICENSE
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/* Test Designated Verifier Signature (DVS) scheme with incorrect PIN*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include "config_curve_ZZZ.h"
#include "pbc_support.h"
#include "randapi.h"
#if CURVE_SECURITY_ZZZ == 128
#include "mpin_ZZZ.h"
#elif CURVE_SECURITY_ZZZ == 192
#include "mpin192_ZZZ.h"
#elif CURVE_SECURITY_ZZZ == 256
#include "mpin256_ZZZ.h"
#endif
#if CURVE_SECURITY_ZZZ == 128
#define G2LEN 4*PFS_ZZZ
#elif CURVE_SECURITY_ZZZ == 192
#define G2LEN 8*PFS_ZZZ
#elif CURVE_SECURITY_ZZZ == 256
#define G2LEN 16*PFS_ZZZ
#endif
#define GTLEN 3*G2LEN
int main()
{
int i,PIN1,PIN2,rtn;
char id[256+G2LEN];
octet ID = {0,sizeof(id),id};
// Message to sign
char m[256];
octet M= {0,sizeof(m),m};
/* Hash of the message */
char hm[PFS_ZZZ];
octet HM= {0,sizeof(hm), hm};
char x[PGS_ZZZ],y1[PGS_ZZZ],y2[PGS_ZZZ];
octet X= {0, sizeof(x),x};
octet Y1= {0,sizeof(y1),y1};
octet Y2= {0,sizeof(y2),y2};
/* Master secret shares */
char ms1[PGS_ZZZ], ms2[PGS_ZZZ];
octet MS1= {0,sizeof(ms1),ms1};
octet MS2= {0,sizeof(ms2),ms2};
/* Hash values of Client ID */
char hcid[PFS_ZZZ];
octet HCID= {0,sizeof(hcid), hcid};
/* Client secret and shares */
char cs1[2*PFS_ZZZ+1], cs2[2*PFS_ZZZ+1], sec[2*PFS_ZZZ+1];
octet SEC= {0,sizeof(sec),sec};
octet CS1= {0,sizeof(cs1), cs1};
octet CS2= {0,sizeof(cs2), cs2};
/* Client Public Key and z */
char z1[PGS_ZZZ], z2[PGS_ZZZ], pa1[G2LEN], pa2[G2LEN];
octet Z1= {0,sizeof(z1),z1};
octet Z2= {0,sizeof(z2),z2};
octet Pa1= {0,sizeof(pa1),pa1};
octet Pa2= {0,sizeof(pa2),pa2};
/* Server secret and shares */
char ss1[G2LEN], ss2[G2LEN], serverSecret[G2LEN];
octet ServerSecret= {0,sizeof(serverSecret),serverSecret};
octet SS1= {0,sizeof(ss1),ss1};
octet SS2= {0,sizeof(ss2),ss2};
/* Token stored on computer */
char token[2*PFS_ZZZ+1];
octet TOKEN= {0,sizeof(token),token};
char u[2*PFS_ZZZ+1];
octet U= {0,sizeof(u),u};
char hid[2*PFS_ZZZ+1];
octet HID= {0,sizeof(hid),hid};
int TimeValue = 0;
PIN1 = 1234;
PIN2 = 1234;
/* Assign the End-User an ID */
char* user = "alice@milagro.com";
OCT_jstring(&ID,user);
printf("CLIENT: ID %s\n", user);
char seed[32] = {0};
octet SEED = {0,sizeof(seed),seed};
csprng RNG;
/* non random seed value! */
SEED.len=32;
for (i=0; i<32; i++) SEED.val[i]=i+1;
/* initialise random number generator */
CREATE_CSPRNG(&RNG,&SEED);
/* Generate random public key and z */
rtn = MPIN_ZZZ_GET_DVS_KEYPAIR(&RNG,&Z1,&Pa1);
if (rtn!=0)
{
printf("MPIN_ZZZ_GET_DVS_KEYPAIR(&RNG,&Z1,&Pa1) Error %d\n", rtn);
return 1;
}
printf("Z1: 0x");
OCT_output(&Z1);
printf("Pa1: 0x");
OCT_output(&Pa1);
rtn = MPIN_ZZZ_GET_DVS_KEYPAIR(&RNG,&Z2,&Pa2);
if (rtn!=0)
{
printf("MPIN_ZZZ_GET_DVS_KEYPAIR(&RNG,&Z2,&Pa2) Error %d\n", rtn);
return 1;
}
printf("Z2: 0x");
OCT_output(&Z2);
printf("Pa2: 0x");
OCT_output(&Pa2);
/* Append Pa to ID */
OCT_joctet(&ID,&Pa1);
printf("ID|Pa1: 0x");
OCT_output(&ID);
/* Hash ID */
HASH_ID(HASH_TYPE_ZZZ,&ID,&HCID);
OCT_output(&HCID);
/* Generate Client master secret for MILAGRO and Customer */
rtn = MPIN_ZZZ_RANDOM_GENERATE(&RNG,&MS1);
if (rtn != 0)
{
printf("MPIN_ZZZ_RANDOM_GENERATE(&RNG,&MS1) Error %d\n", rtn);
return 1;
}
rtn = MPIN_ZZZ_RANDOM_GENERATE(&RNG,&MS2);
if (rtn != 0)
{
printf("MPIN_ZZZ_RANDOM_GENERATE(&RNG,&MS2) Error %d\n", rtn);
return 1;
}
printf("MASTER SECRET MILAGRO:= 0x");
OCT_output(&MS1);
printf("MASTER SECRET CUSTOMER:= 0x");
OCT_output(&MS2);
/* Generate server secret shares */
rtn = MPIN_ZZZ_GET_SERVER_SECRET(&MS1,&SS1);
if (rtn != 0)
{
printf("MPIN_ZZZ_GET_SERVER_SECRET(&MS1,&SS1) Error %d\n", rtn);
return 1;
}
rtn = MPIN_ZZZ_GET_SERVER_SECRET(&MS2,&SS2);
if (rtn != 0)
{
printf("MPIN_ZZZ_GET_SERVER_SECRET(&MS2,&SS2) Error %d\n", rtn);
return 1;
}
printf("SS1 = 0x");
OCT_output(&SS1);
printf("SS2 = 0x");
OCT_output(&SS2);
/* Combine server secret share */
rtn = MPIN_ZZZ_RECOMBINE_G2(&SS1, &SS2, &ServerSecret);
if (rtn != 0)
{
printf("MPIN_ZZZ_RECOMBINE_G2(&SS1, &SS2, &ServerSecret) Error %d\n", rtn);
return 1;
}
printf("ServerSecret = 0x");
OCT_output(&ServerSecret);
/* Generate client secret shares */
rtn = MPIN_ZZZ_GET_CLIENT_SECRET(&MS1,&HCID,&CS1);
if (rtn != 0)
{
printf("MPIN_ZZZ_GET_CLIENT_SECRET(&MS1,&HCID,&CS1) Error %d\n", rtn);
return 1;
}
rtn = MPIN_ZZZ_GET_CLIENT_SECRET(&MS2,&HCID,&CS2);
if (rtn != 0)
{
printf("MPIN_ZZZ_GET_CLIENT_SECRET(&MS2,&HCID,&CS2) Error %d\n", rtn);
return 1;
}
printf("CS1 = 0x");
OCT_output(&CS1);
printf("CS2 = 0x");
OCT_output(&CS2);
/* Combine client secret shares : TOKEN is the full client secret */
rtn = MPIN_ZZZ_RECOMBINE_G1(&CS1, &CS2, &TOKEN);
if (rtn != 0)
{
printf("MPIN_ZZZ_RECOMBINE_G1(&CS1, &CS2, &TOKEN) Error %d\n", rtn);
return 1;
}
printf("Client Secret CS = 0x");
OCT_output(&TOKEN);
/* Compute client secret for key escrow less scheme z.CS */
rtn = MPIN_ZZZ_GET_G1_MULTIPLE(NULL,0,&Z2,&TOKEN,&TOKEN);
if (rtn != 0)
{
printf("MPIN_ZZZ_GET_G1_MULTIPLE(NULL,0,&Z,&CS,&CS) Error %d\n", rtn);
return 1;
}
printf("z2.CS: 0x");
OCT_output(&TOKEN);
/* Client extracts PIN1 from secret to create Token */
rtn = MPIN_ZZZ_EXTRACT_PIN(HASH_TYPE_ZZZ,&ID, PIN1, &TOKEN);
if (rtn != 0)
{
printf("MPIN_ZZZ_EXTRACT_PIN( &ID, PIN, &TOKEN) Error %d\n", rtn);
return 1;
}
printf("Token = 0x");
OCT_output(&TOKEN);
/* Client: Sign message */
TimeValue = GET_TIME();
printf("TimeValue %d \n", TimeValue);
char* message = "sign this message";
OCT_jstring(&M,message);
HASH_ID(HASH_TYPE_ZZZ,&M,&HM);
printf("HM: 0x");
OCT_output(&HM);
rtn = MPIN_ZZZ_CLIENT(HASH_TYPE_ZZZ,0,&ID,&RNG,&X,PIN2,&TOKEN,&SEC,&U,NULL,NULL,&HM,TimeValue,&Y1);
if (rtn != 0)
{
printf("MPIN_ZZZ_CLIENT ERROR %d\n", rtn);
return 1;
}
printf("Y1 = 0x");
OCT_output(&Y1);
printf("V = 0x");
OCT_output(&SEC);
/* Server: Verify message */
rtn = MPIN_ZZZ_SERVER(HASH_TYPE_ZZZ,0,&HID,NULL,&Y2,&ServerSecret,&U,NULL,&SEC,NULL,NULL,&ID,&HM,TimeValue,&Pa1);
printf("Y2 = 0x");
OCT_output(&Y2);
if (rtn != 0)
{
printf("FAILURE Signature Verification Error Code %d\n", rtn);
}
else
{
printf("SUCCESS Error Code %d\n", rtn);
}
/* clear memory */
OCT_clear(&ID);
OCT_clear(&X);
OCT_clear(&Y1);
OCT_clear(&Y2);
OCT_clear(&MS1);
OCT_clear(&MS2);
OCT_clear(&HCID);
OCT_clear(&SEC);
OCT_clear(&CS1);
OCT_clear(&CS2);
OCT_clear(&ServerSecret);
OCT_clear(&SS1);
OCT_clear(&SS2);
OCT_clear(&TOKEN);
OCT_clear(&U);
OCT_clear(&HID);
OCT_clear(&SEED);
OCT_clear(&Z1);
OCT_clear(&Z2);
OCT_clear(&Pa1);
OCT_clear(&Pa2);
KILL_CSPRNG(&RNG);
return 0;
}