| /* |
| Licensed to the Apache Software Foundation (ASF) under one |
| or more contributor license agreements. See the NOTICE file |
| distributed with this work for additional information |
| regarding copyright ownership. The ASF licenses this file |
| to you under the Apache License, Version 2.0 (the |
| "License"); you may not use this file except in compliance |
| with the License. You may obtain a copy of the License at |
| |
| http://www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, |
| software distributed under the License is distributed on an |
| "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| KIND, either express or implied. See the License for the |
| specific language governing permissions and limitations |
| under the License. |
| */ |
| |
| /* Test WCC with and without time permits */ |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <time.h> |
| #include "wcc.h" |
| #include "utils.h" |
| |
| int main() |
| { |
| int i,rtn; |
| |
| /* Master secret */ |
| char ms[PGS]; |
| octet MS={sizeof(ms),sizeof(ms),ms}; |
| |
| // sender key |
| char akeyG1[2*PFS+1]; |
| octet AKeyG1={0,sizeof(akeyG1), akeyG1}; |
| |
| // receiver key |
| char bkeyG2[4*PFS]; |
| octet BKeyG2={0,sizeof(bkeyG2), bkeyG2}; |
| |
| char hv[HASH_BYTES],alice_id[256],bob_id[256]; |
| octet HV={0,sizeof(hv),hv}; |
| |
| octet IdA={0,sizeof(alice_id),alice_id}; |
| octet IdB={0,sizeof(bob_id),bob_id}; |
| |
| char x[PGS]; |
| octet X={sizeof(x),sizeof(x),x}; |
| char y[PGS]; |
| octet Y={sizeof(y),sizeof(y),y}; |
| char w[PGS]; |
| octet W={sizeof(w),sizeof(w),w}; |
| char pia[PGS]; |
| octet PIA={sizeof(pia),sizeof(pia),pia}; |
| char pib[PGS]; |
| octet PIB={sizeof(pib),sizeof(pib),pib}; |
| |
| char pgg1[2*PFS+1]; |
| octet PgG1={0,sizeof(pgg1), pgg1}; |
| |
| char pag1[2*PFS+1]; |
| octet PaG1={0,sizeof(pag1), pag1}; |
| |
| char pbg2[4*PFS]; |
| octet PbG2={0,sizeof(pbg2), pbg2}; |
| |
| char seed[32] = {0}; |
| octet SEED = {0,sizeof(seed),seed}; |
| csprng RNG; |
| |
| char message1[256]; |
| octet MESSAGE1 = {0, sizeof(message1), message1}; |
| OCT_jstring(&MESSAGE1,"Hello Bob"); |
| |
| char t1[16]; // Tag |
| char t2[16]; // Tag |
| char k1[16]; // AES Key |
| char k2[16]; // AES Key |
| char iv[12]; // IV - Initialisation vector |
| char c[100]; // Ciphertext |
| char p[100]; // Recovered Plaintext |
| octet T1={sizeof(t1),sizeof(t1),t1}; |
| octet T2={sizeof(t2),sizeof(t2),t2}; |
| octet K1={0,sizeof(k1),k1}; |
| octet K2={0,sizeof(k2),k2}; |
| octet IV={0,sizeof(iv),iv}; |
| octet C={0,sizeof(c),c}; |
| octet P={0,sizeof(p),p}; |
| |
| int date; |
| |
| int hashDoneOn = 1; |
| int hashDoneOff = 0; |
| |
| date = 0; |
| |
| /* unrandom seed value! */ |
| SEED.len=32; |
| for (i=0;i<32;i++) SEED.val[i]=i+1; |
| |
| /* initialise random number generator */ |
| WCC_CREATE_CSPRNG(&RNG,&SEED); |
| |
| /* TA: Generate master secret */ |
| rtn = WCC_RANDOM_GENERATE(&RNG,&MS); |
| if (rtn != 0) { |
| printf("TA WCC_RANDOM_GENERATE(&RNG,&MS) Error %d\n", rtn); |
| return 1; |
| } |
| |
| // Alice's ID |
| OCT_jstring(&IdA,"alice@miracl.com"); |
| |
| // TA: Generate Alices's sender key |
| WCC_HASH_ID(&IdA,&HV); |
| rtn = WCC_GET_G1_MULTIPLE(hashDoneOn,&MS,&HV,&AKeyG1); |
| if (rtn != 0) { |
| printf("TA WCC_GET_G1_MULTIPLE() Error %d\n", rtn); |
| return 1; |
| } |
| |
| // Bob's ID |
| OCT_jstring(&IdB,"bob@miracl.com"); |
| |
| // TA: Generate Bob's receiver key |
| WCC_HASH_ID(&IdB,&HV); |
| rtn = WCC_GET_G2_MULTIPLE(hashDoneOn,&MS,&HV,&BKeyG2); |
| if (rtn != 0) { |
| printf("TA WCC_GET_G2_MULTIPLE() Error %d\n", rtn); |
| return 1; |
| } |
| |
| rtn = WCC_RANDOM_GENERATE(&RNG,&X); |
| if (rtn != 0) { |
| printf("Alice WCC_RANDOM_GENERATE(&RNG,&X) Error %d\n", rtn); |
| return 1; |
| } |
| |
| rtn = WCC_GET_G1_MULTIPLE(hashDoneOff,&X,&IdA,&PaG1); |
| if (rtn != 0) { |
| printf("Alice WCC_GET_G1_MULTIPLE() Error %d\n", rtn); |
| return 1; |
| } |
| |
| rtn = WCC_RANDOM_GENERATE(&RNG,&W); |
| if (rtn != 0) { |
| printf("Bob WCC_RANDOM_GENERATE(&RNG,&W) Error %d\n", rtn); |
| return 1; |
| } |
| rtn = WCC_GET_G1_MULTIPLE(hashDoneOff,&W,&IdA,&PgG1); |
| if (rtn != 0) { |
| printf("Bob WCC_GET_G1_MULTIPLE() Error %d\n", rtn); |
| return 1; |
| } |
| |
| rtn = WCC_RANDOM_GENERATE(&RNG,&Y); |
| if (rtn != 0) { |
| printf("Bob WCC_RANDOM_GENERATE(&RNG,&Y) Error %d\n", rtn); |
| return 1; |
| } |
| |
| rtn = WCC_GET_G2_MULTIPLE(hashDoneOff,&Y,&IdB,&PbG2); |
| if (rtn != 0) { |
| printf("Bob WCC_GET_G1_MULTIPLE() Error %d\n", rtn); |
| return 1; |
| } |
| |
| // pia = Hq(PaG1,PbG2,PgG1,IdB) |
| WCC_Hq(&PaG1,&PbG2,&PgG1,&IdB,&PIA); |
| |
| // pib = Hq(PbG2,PaG1,PgG1,IdA) |
| WCC_Hq(&PbG2,&PaG1,&PgG1,&IdA,&PIB); |
| |
| // Bob calculates AES Key |
| WCC_RECEIVER_KEY(date, &Y, &W, &PIA, &PIB, &PaG1, &PgG1, &BKeyG2, NULL, &IdA, &K2); |
| if (rtn != 0) { |
| printf("Bob WCC_RECEIVER_KEY() Error %d\n", rtn); |
| return 1; |
| } |
| |
| // pia = Hq(PaG1,PbG2,PgG1,IdB) |
| WCC_Hq(&PaG1,&PbG2,&PgG1,&IdB,&PIA); |
| |
| // pib = Hq(PbG2,PaG1,PgG1,IdA) |
| WCC_Hq(&PbG2,&PaG1,&PgG1,&IdA,&PIB); |
| |
| // Alice calculates AES Key |
| rtn = WCC_SENDER_KEY(date, &X, &PIA, &PIB, &PbG2, &PgG1, &AKeyG1, NULL, &IdB, &K1); |
| if (rtn != 0) { |
| printf("Alice WCC_SENDER_KEY() Error %d\n", rtn); |
| return 1; |
| } |
| |
| if (!OCT_comp(&K1,&K2)) |
| { |
| printf("FAILURE No Time Permit Test. OCT_comp(&K1,&K2)\n"); |
| return 1; |
| } |
| |
| WCC_KILL_CSPRNG(&RNG); |
| |
| printf("SUCCESS\n"); |
| return 0; |
| } |