1*62c56f98SSadaf Ebrahimi/* BEGIN_HEADER */ 2*62c56f98SSadaf Ebrahimi#include "lmots.h" 3*62c56f98SSadaf Ebrahimi#include "mbedtls/lms.h" 4*62c56f98SSadaf Ebrahimi 5*62c56f98SSadaf Ebrahimi#if defined(MBEDTLS_TEST_HOOKS) 6*62c56f98SSadaf Ebrahimiint check_lmots_private_key_for_leak(unsigned char *sig) 7*62c56f98SSadaf Ebrahimi{ 8*62c56f98SSadaf Ebrahimi size_t idx; 9*62c56f98SSadaf Ebrahimi 10*62c56f98SSadaf Ebrahimi for (idx = MBEDTLS_LMOTS_SIG_SIGNATURE_OFFSET(MBEDTLS_LMOTS_SHA256_N32_W8); 11*62c56f98SSadaf Ebrahimi idx < MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8); 12*62c56f98SSadaf Ebrahimi idx++) { 13*62c56f98SSadaf Ebrahimi TEST_EQUAL(sig[idx], 0x7E); 14*62c56f98SSadaf Ebrahimi } 15*62c56f98SSadaf Ebrahimi 16*62c56f98SSadaf Ebrahimi return 0; 17*62c56f98SSadaf Ebrahimi 18*62c56f98SSadaf Ebrahimiexit: 19*62c56f98SSadaf Ebrahimi return -1; 20*62c56f98SSadaf Ebrahimi} 21*62c56f98SSadaf Ebrahimi#endif /* defined(MBEDTLS_TEST_HOOKS) */ 22*62c56f98SSadaf Ebrahimi 23*62c56f98SSadaf Ebrahimi/* END_HEADER */ 24*62c56f98SSadaf Ebrahimi 25*62c56f98SSadaf Ebrahimi/* BEGIN_DEPENDENCIES 26*62c56f98SSadaf Ebrahimi * depends_on:MBEDTLS_LMS_C 27*62c56f98SSadaf Ebrahimi * END_DEPENDENCIES 28*62c56f98SSadaf Ebrahimi */ 29*62c56f98SSadaf Ebrahimi 30*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_LMS_PRIVATE */ 31*62c56f98SSadaf Ebrahimivoid lmots_sign_verify_test(data_t *msg, data_t *key_id, int leaf_id, 32*62c56f98SSadaf Ebrahimi data_t *seed) 33*62c56f98SSadaf Ebrahimi{ 34*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_t pub_ctx; 35*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_t priv_ctx; 36*62c56f98SSadaf Ebrahimi unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)]; 37*62c56f98SSadaf Ebrahimi 38*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_init(&pub_ctx); 39*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_init(&priv_ctx); 40*62c56f98SSadaf Ebrahimi 41*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_generate_private_key(&priv_ctx, MBEDTLS_LMOTS_SHA256_N32_W8, 42*62c56f98SSadaf Ebrahimi key_id->x, leaf_id, seed->x, seed->len), 0); 43*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_calculate_public_key(&pub_ctx, &priv_ctx), 0); 44*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_sign(&priv_ctx, &mbedtls_test_rnd_std_rand, NULL, 45*62c56f98SSadaf Ebrahimi msg->x, msg->len, sig, sizeof(sig), NULL), 0); 46*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0); 47*62c56f98SSadaf Ebrahimi 48*62c56f98SSadaf Ebrahimiexit: 49*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_free(&pub_ctx); 50*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_free(&priv_ctx); 51*62c56f98SSadaf Ebrahimi} 52*62c56f98SSadaf Ebrahimi/* END_CASE */ 53*62c56f98SSadaf Ebrahimi 54*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_LMS_PRIVATE */ 55*62c56f98SSadaf Ebrahimivoid lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed) 56*62c56f98SSadaf Ebrahimi{ 57*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_t pub_ctx; 58*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_t priv_ctx; 59*62c56f98SSadaf Ebrahimi unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)]; 60*62c56f98SSadaf Ebrahimi 61*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_init(&pub_ctx); 62*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_init(&priv_ctx); 63*62c56f98SSadaf Ebrahimi 64*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_generate_private_key(&priv_ctx, MBEDTLS_LMOTS_SHA256_N32_W8, 65*62c56f98SSadaf Ebrahimi key_id->x, leaf_id, seed->x, seed->len), 0); 66*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_calculate_public_key(&pub_ctx, &priv_ctx), 0); 67*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_sign(&priv_ctx, &mbedtls_test_rnd_std_rand, NULL, 68*62c56f98SSadaf Ebrahimi NULL, 0, sig, sizeof(sig), NULL), 0); 69*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, NULL, 0, sig, sizeof(sig)), 0); 70*62c56f98SSadaf Ebrahimi 71*62c56f98SSadaf Ebrahimiexit: 72*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_free(&pub_ctx); 73*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_free(&priv_ctx); 74*62c56f98SSadaf Ebrahimi} 75*62c56f98SSadaf Ebrahimi/* END_CASE */ 76*62c56f98SSadaf Ebrahimi 77*62c56f98SSadaf Ebrahimi/* BEGIN_CASE */ 78*62c56f98SSadaf Ebrahimivoid lmots_verify_test(data_t *msg, data_t *sig, data_t *pub_key, 79*62c56f98SSadaf Ebrahimi int expected_rc) 80*62c56f98SSadaf Ebrahimi{ 81*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_t ctx; 82*62c56f98SSadaf Ebrahimi unsigned int size; 83*62c56f98SSadaf Ebrahimi unsigned char *tmp_sig = NULL; 84*62c56f98SSadaf Ebrahimi 85*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_init(&ctx); 86*62c56f98SSadaf Ebrahimi 87*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_import_public_key(&ctx, pub_key->x, pub_key->len), 0); 88*62c56f98SSadaf Ebrahimi 89*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc); 90*62c56f98SSadaf Ebrahimi 91*62c56f98SSadaf Ebrahimi /* Test negative cases if the input data is valid */ 92*62c56f98SSadaf Ebrahimi if (expected_rc == 0) { 93*62c56f98SSadaf Ebrahimi if (msg->len >= 1) { 94*62c56f98SSadaf Ebrahimi /* Altering first message byte must cause verification failure */ 95*62c56f98SSadaf Ebrahimi msg->x[0] ^= 1; 96*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 97*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_VERIFY_FAILED); 98*62c56f98SSadaf Ebrahimi msg->x[0] ^= 1; 99*62c56f98SSadaf Ebrahimi 100*62c56f98SSadaf Ebrahimi /* Altering last message byte must cause verification failure */ 101*62c56f98SSadaf Ebrahimi msg->x[msg->len - 1] ^= 1; 102*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 103*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_VERIFY_FAILED); 104*62c56f98SSadaf Ebrahimi msg->x[msg->len - 1] ^= 1; 105*62c56f98SSadaf Ebrahimi } 106*62c56f98SSadaf Ebrahimi 107*62c56f98SSadaf Ebrahimi /* Altering first signature byte must cause verification failure */ 108*62c56f98SSadaf Ebrahimi sig->x[0] ^= 1; 109*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 110*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_VERIFY_FAILED); 111*62c56f98SSadaf Ebrahimi sig->x[0] ^= 1; 112*62c56f98SSadaf Ebrahimi 113*62c56f98SSadaf Ebrahimi /* Altering last signature byte must cause verification failure */ 114*62c56f98SSadaf Ebrahimi sig->x[sig->len - 1] ^= 1; 115*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 116*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_VERIFY_FAILED); 117*62c56f98SSadaf Ebrahimi sig->x[sig->len - 1] ^= 1; 118*62c56f98SSadaf Ebrahimi 119*62c56f98SSadaf Ebrahimi /* Signatures of all sizes must not verify, whether shorter or longer */ 120*62c56f98SSadaf Ebrahimi for (size = 0; size < sig->len; size++) { 121*62c56f98SSadaf Ebrahimi if (size == sig->len) { 122*62c56f98SSadaf Ebrahimi continue; 123*62c56f98SSadaf Ebrahimi } 124*62c56f98SSadaf Ebrahimi 125*62c56f98SSadaf Ebrahimi TEST_CALLOC(tmp_sig, size); 126*62c56f98SSadaf Ebrahimi if (tmp_sig != NULL) { 127*62c56f98SSadaf Ebrahimi memcpy(tmp_sig, sig->x, MIN(size, sig->len)); 128*62c56f98SSadaf Ebrahimi } 129*62c56f98SSadaf Ebrahimi 130*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, tmp_sig, size), 131*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_VERIFY_FAILED); 132*62c56f98SSadaf Ebrahimi mbedtls_free(tmp_sig); 133*62c56f98SSadaf Ebrahimi tmp_sig = NULL; 134*62c56f98SSadaf Ebrahimi } 135*62c56f98SSadaf Ebrahimi } 136*62c56f98SSadaf Ebrahimi 137*62c56f98SSadaf Ebrahimiexit: 138*62c56f98SSadaf Ebrahimi mbedtls_free(tmp_sig); 139*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_free(&ctx); 140*62c56f98SSadaf Ebrahimi} 141*62c56f98SSadaf Ebrahimi/* END_CASE */ 142*62c56f98SSadaf Ebrahimi 143*62c56f98SSadaf Ebrahimi/* BEGIN_CASE */ 144*62c56f98SSadaf Ebrahimivoid lmots_import_export_test(data_t *pub_key, int expected_import_rc) 145*62c56f98SSadaf Ebrahimi{ 146*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_t ctx; 147*62c56f98SSadaf Ebrahimi unsigned char *exported_pub_key = NULL; 148*62c56f98SSadaf Ebrahimi size_t exported_pub_key_buf_size; 149*62c56f98SSadaf Ebrahimi size_t exported_pub_key_size; 150*62c56f98SSadaf Ebrahimi 151*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_init(&ctx); 152*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_import_public_key(&ctx, pub_key->x, pub_key->len), 153*62c56f98SSadaf Ebrahimi expected_import_rc); 154*62c56f98SSadaf Ebrahimi 155*62c56f98SSadaf Ebrahimi if (expected_import_rc == 0) { 156*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(MBEDTLS_LMOTS_SHA256_N32_W8); 157*62c56f98SSadaf Ebrahimi TEST_CALLOC(exported_pub_key, exported_pub_key_buf_size); 158*62c56f98SSadaf Ebrahimi 159*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_export_public_key(&ctx, exported_pub_key, 160*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size, 161*62c56f98SSadaf Ebrahimi &exported_pub_key_size), 0); 162*62c56f98SSadaf Ebrahimi 163*62c56f98SSadaf Ebrahimi TEST_EQUAL(exported_pub_key_size, 164*62c56f98SSadaf Ebrahimi MBEDTLS_LMOTS_PUBLIC_KEY_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)); 165*62c56f98SSadaf Ebrahimi TEST_MEMORY_COMPARE(pub_key->x, pub_key->len, 166*62c56f98SSadaf Ebrahimi exported_pub_key, exported_pub_key_size); 167*62c56f98SSadaf Ebrahimi mbedtls_free(exported_pub_key); 168*62c56f98SSadaf Ebrahimi exported_pub_key = NULL; 169*62c56f98SSadaf Ebrahimi 170*62c56f98SSadaf Ebrahimi /* Export into too-small buffer should fail */ 171*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(MBEDTLS_LMOTS_SHA256_N32_W8) - 1; 172*62c56f98SSadaf Ebrahimi TEST_CALLOC(exported_pub_key, exported_pub_key_buf_size); 173*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_export_public_key(&ctx, exported_pub_key, 174*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size, NULL), 175*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_BUFFER_TOO_SMALL); 176*62c56f98SSadaf Ebrahimi mbedtls_free(exported_pub_key); 177*62c56f98SSadaf Ebrahimi exported_pub_key = NULL; 178*62c56f98SSadaf Ebrahimi 179*62c56f98SSadaf Ebrahimi /* Export into too-large buffer should succeed */ 180*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size = MBEDTLS_LMOTS_PUBLIC_KEY_LEN(MBEDTLS_LMOTS_SHA256_N32_W8) + 1; 181*62c56f98SSadaf Ebrahimi TEST_CALLOC(exported_pub_key, exported_pub_key_buf_size); 182*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_export_public_key(&ctx, exported_pub_key, 183*62c56f98SSadaf Ebrahimi exported_pub_key_buf_size, 184*62c56f98SSadaf Ebrahimi &exported_pub_key_size), 185*62c56f98SSadaf Ebrahimi 0); 186*62c56f98SSadaf Ebrahimi TEST_MEMORY_COMPARE(pub_key->x, pub_key->len, 187*62c56f98SSadaf Ebrahimi exported_pub_key, exported_pub_key_size); 188*62c56f98SSadaf Ebrahimi mbedtls_free(exported_pub_key); 189*62c56f98SSadaf Ebrahimi exported_pub_key = NULL; 190*62c56f98SSadaf Ebrahimi } 191*62c56f98SSadaf Ebrahimi 192*62c56f98SSadaf Ebrahimiexit: 193*62c56f98SSadaf Ebrahimi mbedtls_lmots_public_free(&ctx); 194*62c56f98SSadaf Ebrahimi mbedtls_free(exported_pub_key); 195*62c56f98SSadaf Ebrahimi} 196*62c56f98SSadaf Ebrahimi/* END_CASE */ 197*62c56f98SSadaf Ebrahimi 198*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_LMS_PRIVATE */ 199*62c56f98SSadaf Ebrahimivoid lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed) 200*62c56f98SSadaf Ebrahimi{ 201*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_t ctx; 202*62c56f98SSadaf Ebrahimi unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)]; 203*62c56f98SSadaf Ebrahimi 204*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_init(&ctx); 205*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_generate_private_key(&ctx, MBEDTLS_LMOTS_SHA256_N32_W8, 206*62c56f98SSadaf Ebrahimi key_id->x, leaf_id, seed->x, 207*62c56f98SSadaf Ebrahimi seed->len), 0); 208*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_sign(&ctx, mbedtls_test_rnd_std_rand, NULL, 209*62c56f98SSadaf Ebrahimi msg->x, msg->len, sig, sizeof(sig), NULL), 0); 210*62c56f98SSadaf Ebrahimi 211*62c56f98SSadaf Ebrahimi /* Running another sign operation should fail, since the key should now have 212*62c56f98SSadaf Ebrahimi * been erased. 213*62c56f98SSadaf Ebrahimi */ 214*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_sign(&ctx, mbedtls_test_rnd_std_rand, NULL, 215*62c56f98SSadaf Ebrahimi msg->x, msg->len, sig, sizeof(sig), NULL), 216*62c56f98SSadaf Ebrahimi MBEDTLS_ERR_LMS_BAD_INPUT_DATA); 217*62c56f98SSadaf Ebrahimi 218*62c56f98SSadaf Ebrahimiexit: 219*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_free(&ctx); 220*62c56f98SSadaf Ebrahimi} 221*62c56f98SSadaf Ebrahimi/* END_CASE */ 222*62c56f98SSadaf Ebrahimi 223*62c56f98SSadaf Ebrahimi/* BEGIN_CASE depends_on:MBEDTLS_TEST_HOOKS:MBEDTLS_LMS_PRIVATE */ 224*62c56f98SSadaf Ebrahimivoid lmots_signature_leak_test(data_t *msg, data_t *key_id, int leaf_id, 225*62c56f98SSadaf Ebrahimi data_t *seed) 226*62c56f98SSadaf Ebrahimi{ 227*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_t ctx; 228*62c56f98SSadaf Ebrahimi unsigned char sig[MBEDTLS_LMOTS_SIG_LEN(MBEDTLS_LMOTS_SHA256_N32_W8)]; 229*62c56f98SSadaf Ebrahimi 230*62c56f98SSadaf Ebrahimi mbedtls_lmots_sign_private_key_invalidated_hook = &check_lmots_private_key_for_leak; 231*62c56f98SSadaf Ebrahimi 232*62c56f98SSadaf Ebrahimi /* Fill with recognisable pattern */ 233*62c56f98SSadaf Ebrahimi memset(sig, 0x7E, sizeof(sig)); 234*62c56f98SSadaf Ebrahimi 235*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_init(&ctx); 236*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_generate_private_key(&ctx, MBEDTLS_LMOTS_SHA256_N32_W8, 237*62c56f98SSadaf Ebrahimi key_id->x, leaf_id, seed->x, 238*62c56f98SSadaf Ebrahimi seed->len), 0); 239*62c56f98SSadaf Ebrahimi TEST_EQUAL(mbedtls_lmots_sign(&ctx, mbedtls_test_rnd_std_rand, NULL, 240*62c56f98SSadaf Ebrahimi msg->x, msg->len, sig, sizeof(sig), NULL), 0); 241*62c56f98SSadaf Ebrahimi 242*62c56f98SSadaf Ebrahimiexit: 243*62c56f98SSadaf Ebrahimi mbedtls_lmots_private_free(&ctx); 244*62c56f98SSadaf Ebrahimi mbedtls_lmots_sign_private_key_invalidated_hook = NULL; 245*62c56f98SSadaf Ebrahimi} 246*62c56f98SSadaf Ebrahimi/* END_CASE */ 247