blob: 5749adf40756996fc7d7197a2274f16bf13390ad [file] [log] [blame]
/*
Licensed to the Apache Software Foundation (ASF) under one
or more contributor license agreements. See the NOTICE file
distributed with this work for additional information
regarding copyright ownership. The ASF licenses this file
to you under the Apache License, Version 2.0 (the
"License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing,
software distributed under the License is distributed on an
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the
specific language governing permissions and limitations
under the License.
*/
/* Test WCC with two TAs and time permits for random values */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include "config.h"
#include "wcc.h"
#define DEBUG
void rand_str(char *dest, size_t length,csprng *RNG) {
BIG r;
char charset[] = "0123456789@.*"
"abcdefghijklmnopqrstuvwxyz"
"ABCDEFGHIJKLMNOPQRSTUVWXYZ";
while (length-- > 0) {
BIG_random(r,RNG);
size_t index = r[0] % (sizeof charset);
*dest++ = charset[index];
}
*dest = '\0';
}
int main()
{
int i,rtn,iter;
/* Master secret shares */
char ms1[PGS], ms2[PGS];
octet MS1={sizeof(ms1),sizeof(ms1),ms1};
octet MS2={sizeof(ms2),sizeof(ms2),ms2};
// Sender keys
char a1keyG1[2*PFS+1], a2keyG1[2*PFS+1];
octet A1KeyG1={0,sizeof(a1keyG1), a1keyG1};
octet A2KeyG1={0,sizeof(a2keyG1), a2keyG1};
char akeyG1[2*PFS+1];
octet AKeyG1={0,sizeof(akeyG1), akeyG1};
// Sender time permits
char a1TPG1[2*PFS+1], a2TPG1[2*PFS+1];
octet A1TPG1={sizeof(a1TPG1),sizeof(a1TPG1), a1TPG1};
octet A2TPG1={sizeof(a2TPG1),sizeof(a2TPG1), a2TPG1};
char aTPG1[2*PFS+1];
octet ATPG1={0,sizeof(aTPG1), aTPG1};
// Receiver keys
char b1keyG2[4*PFS], b2keyG2[4*PFS];
octet B1KeyG2={0,sizeof(b1keyG2), b1keyG2};
octet B2KeyG2={0,sizeof(b2keyG2), b2keyG2};
char bkeyG2[4*PFS];
octet BKeyG2={0,sizeof(bkeyG2), bkeyG2};
// Receiver time permits
char b1TPG2[4*PFS], b2TPG2[4*PFS];
octet B1TPG2={sizeof(b1TPG2),sizeof(b1TPG2), b1TPG2};
octet B2TPG2={sizeof(b2TPG2),sizeof(b2TPG2), b2TPG2};
char bTPG2[4*PFS];
octet BTPG2={0,sizeof(bTPG2), bTPG2};
char ahv[HASH_BYTES],alice_id[256],bhv[HASH_BYTES],bob_id[256];
octet AHV={0,sizeof(ahv),ahv};
octet BHV={0,sizeof(bhv),bhv};
octet IdA={0,sizeof(alice_id),alice_id};
octet IdB={0,sizeof(bob_id),bob_id};
char x[PGS];
octet X={sizeof(x),sizeof(x),x};
char y[PGS];
octet Y={sizeof(y),sizeof(y),y};
char w[PGS];
octet W={sizeof(w),sizeof(w),w};
char pia[PGS];
octet PIA={sizeof(pia),sizeof(pia),pia};
char pib[PGS];
octet PIB={sizeof(pib),sizeof(pib),pib};
char pgg1[2*PFS+1];
octet PgG1={0,sizeof(pgg1), pgg1};
char pag1[2*PFS+1];
octet PaG1={0,sizeof(pag1), pag1};
char pbg2[4*PFS];
octet PbG2={0,sizeof(pbg2), pbg2};
char message1[256];
char message2[256];
octet MESSAGE1 = {0, sizeof(message1), message1};
octet MESSAGE2 = {0, sizeof(message2), message2};
char t1[16]; // Tag
char t2[16]; // Tag
char k1[16]; // AES Key
char k2[16]; // AES Key
char iv[12]; // IV - Initialisation vector
char c[100]; // Ciphertext
char p[100]; // Recovered Plaintext
octet T1={sizeof(t1),sizeof(t1),t1};
octet T2={sizeof(t2),sizeof(t2),t2};
octet K1={0,sizeof(k1),k1};
octet K2={0,sizeof(k2),k2};
octet IV={0,sizeof(iv),iv};
octet C={0,sizeof(c),c};
octet P={0,sizeof(p),p};
int date;
date = WCC_today();
printf("Date %d \n", date);
int hashDoneOn = 1;
int hashDoneOff = 0;
OCT_jstring(&MESSAGE1,"Hello Bob");
OCT_jstring(&MESSAGE2,"Hello Alice");
unsigned long ran;
int byte_count = 32;
FILE *fp;
char seed[32] = {0};
octet SEED = {sizeof(seed),sizeof(seed),seed};
csprng RNG;
#ifdef __linux__
size_t readSize;
fp = fopen("/dev/urandom", "r");
readSize = fread(&seed, 1, byte_count, fp);
fclose(fp);
#else
/* non random seed value! */
time((time_t *)&ran);
SEED.val[0]=ran;
SEED.val[1]=ran>>8;
SEED.val[2]=ran>>16;
SEED.val[3]=ran>>24;
for (i=4;i<byte_count;i++) SEED.val[i]=i+1;
#endif
printf("SEED 0x");
OCT_output(&SEED);
/* initialise random number generator */
WCC_CREATE_CSPRNG(&RNG,&SEED);
for(iter=1; iter<nRandomTests+1; iter++) {
/* Generate Client master secret for MIRACL and Customer */
rtn = WCC_RANDOM_GENERATE(&RNG,&MS1);
if (rtn != 0) {
printf("TA WCC_RANDOM_GENERATE(&RNG,&MS1) Error %d\n", rtn);
return 1;
}
rtn = WCC_RANDOM_GENERATE(&RNG,&MS2);
if (rtn != 0) {
printf("TA WCC_RANDOM_GENERATE(&RNG,&MS2) Error %d\n", rtn);
return 1;
}
printf("TA MASTER SECRET MIRACL: ");
OCT_output(&MS1);
printf("TA MASTER SECRET CUSTOMER: ");
OCT_output(&MS2);
// Alice's ID
rand_str(alice_id,256,&RNG);
OCT_jstring(&IdA,alice_id);
printf("ALICE ID: %s\n", alice_id);
// TA: Generate Alice's sender key
WCC_HASH_ID(&IdA,&AHV);
rtn = WCC_GET_G1_MULTIPLE(hashDoneOn,&MS1,&AHV,&A1KeyG1);
if (rtn != 0) {
printf("TA WCC_GET_G1_MULTIPLE(hashDoneOn,&MS1,&AHV,&A1KeyG1) Error %d\n", rtn);
return 1;
}
rtn = WCC_GET_G1_MULTIPLE(hashDoneOn,&MS2,&AHV,&A2KeyG1);
if (rtn != 0) {
printf("TA WCC_GET_G1_MULTIPLE(hashDoneOn,&MS2,&AHV,&A2KeyG1) Error %d\n", rtn);
return 1;
}
printf("TA A1KeyG1: ");
OCT_output(&A1KeyG1);
printf("TA A2KeyG1: ");
OCT_output(&A2KeyG1);
rtn = WCC_RECOMBINE_G1(&A1KeyG1, &A2KeyG1, &AKeyG1);
if (rtn != 0) {
printf("TA WCC_RECOMBINE_G1(&A1KeyG1, &A2KeyG1, &AKeyG1) Error %d\n", rtn);
return 1;
}
printf("TA Alice's sender key: ");
OCT_output(&AKeyG1);
// TA: Generate Alice's G1 time permit
rtn = WCC_GET_G1_PERMIT(date,&MS1,&AHV,&A1TPG1);
if (rtn != 0) {
printf("TA WCC_GET_G1_PERMIT(date,&MS1,&AHV,&A1TPG1) Error %d\n", rtn);
return 1;
}
rtn = WCC_GET_G1_PERMIT(date,&MS2,&AHV,&A2TPG1);
if (rtn != 0) {
printf("TA WCC_GET_G1_PERMIT(date,&MS2,&AHV,&A2TPG1) Error %d\n", rtn);
return 1;
}
printf("TA A1TPG1: ");
OCT_output(&A1TPG1);
printf("TA A2TPG1: ");
OCT_output(&A2TPG1);
rtn = WCC_RECOMBINE_G1(&A1TPG1, &A2TPG1, &ATPG1);
if (rtn != 0) {
printf("Alice WCC_RECOMBINE_G1(&A1TPG1, &A2TPG1, &ATPG1) Error %d\n", rtn);
return 1;
}
printf("TA Alice's sender time permit: ");
OCT_output(&ATPG1);
// Bob's ID
rand_str(bob_id,256,&RNG);
OCT_jstring(&IdB,bob_id);
printf("BOB ID: %s\n", bob_id);
// TA: Generate Bob's receiver key
WCC_HASH_ID(&IdB,&BHV);
rtn = WCC_GET_G2_MULTIPLE(hashDoneOn,&MS1,&BHV,&B1KeyG2);
if (rtn != 0) {
printf("TA WCC_GET_G2_MULTIPLE(hashDoneOn,&MS1,&BHV,&B1KeyG2) Error %d\n", rtn);
return 1;
}
rtn = WCC_GET_G2_MULTIPLE(hashDoneOn,&MS2,&BHV,&B2KeyG2);
if (rtn != 0) {
printf("Bob WCC_GET_G2_MULTIPLE(hashDoneOn,&MS2,&BHV,&B2KeyG2) Error %d\n", rtn);
return 1;
}
printf("TA B1KeyG2: ");
OCT_output(&B1KeyG2);
printf("TA B2KeyG2: ");
OCT_output(&B2KeyG2);
rtn = WCC_RECOMBINE_G2(&B1KeyG2, &B2KeyG2, &BKeyG2);
if (rtn != 0) {
printf("Bob WCC_RECOMBINE_G2(&B1KeyG1, &B2KeyG1, &BKeyG2) Error %d\n", rtn);
return 1;
}
printf("TA Bob's receiver key: ");
OCT_output(&BKeyG2);
// TA: Generate Bob's receiver time permit
rtn = WCC_GET_G2_PERMIT(date,&MS1,&BHV,&B1TPG2);
if (rtn != 0) {
printf("TA WCC_GET_G2_PERMIT(date,&MS1,&BHV,&B1TPG2) Error %d\n", rtn);
return 1;
}
rtn = WCC_GET_G2_PERMIT(date,&MS2,&BHV,&B2TPG2);
if (rtn != 0) {
printf("TA WCC_GET_G2_PERMIT(date,&MS2,&BHV,&B2TPG2) Error %d\n", rtn);
return 1;
}
printf("TA B1TPG2: ");
OCT_output(&B1TPG2);
printf("TA B2TPG2: ");
OCT_output(&B2TPG2);
rtn = WCC_RECOMBINE_G2(&B1TPG2, &B2TPG2, &BTPG2);
if (rtn != 0) {
printf("Bob WCC_RECOMBINE_G2(&B1TPG2, &B2TPG2, &BTPG2) Error %d\n", rtn);
return 1;
}
printf("TA Bob's receiver time permit: ");
OCT_output(&BTPG2);
printf("\n");
printf("Alice\n");
rtn = WCC_RANDOM_GENERATE(&RNG,&X);
if (rtn != 0) {
printf("Alice WCC_RANDOM_GENERATE(&RNG,&X) Error %d\n", rtn);
return 1;
}
#ifdef DEBUG
printf("Alice X: ");
OCT_output(&X);
printf("\n");
#endif
rtn = WCC_GET_G1_TPMULT(date,&X,&IdA,&PaG1);
if (rtn != 0) {
printf("Alice WCC_GET_G1_TPMULT(date,&X,&IdA,&PaG1) Error %d\n", rtn);
return 1;
}
printf("Alice sends IdA and PaG1 to Bob\n\n");
printf("Alice IdA: ");
OCT_output_string(&IdA);
printf("\n");
printf("Alice PaG1: ");
OCT_output(&PaG1);
printf("\n");
printf("Bob\n");
rtn = WCC_RANDOM_GENERATE(&RNG,&W);
if (rtn != 0) {
printf("Bob WCC_RANDOM_GENERATE(&RNG,&W) Error %d\n", rtn);
return 1;
}
#ifdef DEBUG
printf("Bob W: ");
OCT_output(&W);
printf("\n");
#endif
rtn = WCC_GET_G1_TPMULT(date,&W,&IdA,&PgG1);
if (rtn != 0) {
printf("Bob WCC_GET_G1_TPMULT(date,&W,&IdA,&PgG1) Error %d\n", rtn);
return 1;
}
#ifdef DEBUG
printf("PgG1: ");
OCT_output(&PgG1);
printf("\n");
#endif
rtn = WCC_RANDOM_GENERATE(&RNG,&Y);
if (rtn != 0) {
printf("Bob WCC_RANDOM_GENERATE(&RNG,&Y) Error %d\n", rtn);
return 1;
}
#ifdef DEBUG
printf("Bob Y: ");
OCT_output(&Y);
printf("\n");
#endif
rtn = WCC_GET_G2_TPMULT(date,&Y,&IdB,&PbG2);
if (rtn != 0) {
printf("Bob WCC_GET_G1_TPMULT(date,&Y,&IdB,&PbG2) Error %d\n", rtn);
return 1;
}
#ifdef DEBUG
printf("Bob PbG2: ");
OCT_output(&PbG2);
printf("\n");
#endif
// pia = Hq(PaG1,PbG2,PgG1,IdB)
WCC_Hq(&PaG1,&PbG2,&PgG1,&IdB,&PIA);
// pib = Hq(PbG2,PaG1,PgG1,IdA)
WCC_Hq(&PbG2,&PaG1,&PgG1,&IdA,&PIB);
#ifdef DEBUG
printf("Bob PIA: ");
OCT_output(&PIA);
printf("\n");
printf("Bob PIB: ");
OCT_output(&PIB);
printf("\n");
#endif
// Bob calculates AES Key
WCC_RECEIVER_KEY(date, &Y, &W, &PIA, &PIB, &PaG1, &PgG1, &BKeyG2, &BTPG2, &IdA, &K2);
if (rtn != 0) {
printf("Bob WCC_RECEIVER_KEY() Error %d\n", rtn);
return 1;
}
printf("Bob AES Key: ");
OCT_output(&K2);
printf("Bob sends IdB, PbG2 and PgG1 to Alice\n\n");
printf("Bob IdB: ");
OCT_output_string(&IdB);
printf("\n");
printf("Bob PbG2: ");
OCT_output(&PbG2);
printf("\n");
printf("Bob PgG1: ");
OCT_output(&PgG1);
printf("\n");
printf("Alice\n");
// pia = Hq(PaG1,PbG2,PgG1,IdB)
WCC_Hq(&PaG1,&PbG2,&PgG1,&IdB,&PIA);
// pib = Hq(PbG2,PaG1,PgG1,IdA)
WCC_Hq(&PbG2,&PaG1,&PgG1,&IdA,&PIB);
#ifdef DEBUG
printf("Alice PIA: ");
OCT_output(&PIA);
printf("\n");
printf("Alice PIB: ");
OCT_output(&PIB);
printf("\n");
#endif
// Alice calculates AES Key
rtn = WCC_SENDER_KEY(date, &X, &PIA, &PIB, &PbG2, &PgG1, &AKeyG1, &ATPG1, &IdB, &K1);
if (rtn != 0) {
printf("Alice WCC_SENDER_KEY() Error %d\n", rtn);
return 1;
}
printf("Alice AES Key: ");
OCT_output(&K1);
// Send message
IV.len=12;
for (i=0;i<IV.len;i++)
IV.val[i]=i+1;
printf("Alice: IV ");
OCT_output(&IV);
printf("Alice: Message to encrypt for Bob: ");
OCT_output_string(&MESSAGE1);
printf("\n");
WCC_AES_GCM_ENCRYPT(&K1, &IV, &IdA, &MESSAGE1, &C, &T1);
printf("Alice: Ciphertext: ");
OCT_output(&C);
printf("Alice: Encryption Tag: ");
OCT_output(&T1);
printf("\n");
WCC_AES_GCM_DECRYPT(&K2, &IV, &IdA, &C, &P, &T2);
printf("Bob: Decrypted message received from Alice: ");
OCT_output_string(&P);
printf("\n");
printf("Bob: Decryption Tag: ");
OCT_output(&T2);
printf("\n");
if (!OCT_comp(&MESSAGE1,&P)) {
printf("FAILURE Decryption\n");
return 1;
}
if (!OCT_comp(&T1,&T2)) {
printf("FAILURE TAG mismatch\n");
return 1;
}
printf("Iteration %d SUCCESS \n\n", iter);
}
WCC_KILL_CSPRNG(&RNG);
return 0;
}