1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
/*
* XMSS Signature Operation
* Signature generation operation for Extended Hash-Based Signatures (XMSS) as
* defined in:
*
* [1] XMSS: Extended Hash-Based Signatures,
* draft-itrf-cfrg-xmss-hash-based-signatures-06
* Release: July 2016.
* https://datatracker.ietf.org/doc/
* draft-irtf-cfrg-xmss-hash-based-signatures/?include_text=1
*
* (C) 2016,2017 Matthias Gierlings
*
* Botan is released under the Simplified BSD License (see license.txt)
**/
#include <botan/internal/xmss_signature_operation.h>
namespace Botan {
XMSS_Signature_Operation::XMSS_Signature_Operation(
const XMSS_PrivateKey& private_key)
: XMSS_Common_Ops(private_key.xmss_oid()),
m_priv_key(private_key),
m_randomness(0),
m_leaf_idx(0),
m_is_initialized(false)
{}
XMSS_WOTS_PublicKey::TreeSignature
XMSS_Signature_Operation::generate_tree_signature(const secure_vector<uint8_t>& msg,
XMSS_PrivateKey& xmss_priv_key,
XMSS_Address& adrs)
{
wots_keysig_t auth_path = build_auth_path(xmss_priv_key, adrs);
adrs.set_type(XMSS_Address::Type::OTS_Hash_Address);
adrs.set_ots_address(m_leaf_idx);
wots_keysig_t sig_ots = xmss_priv_key.wots_private_key().sign(msg, adrs);
return XMSS_WOTS_PublicKey::TreeSignature(sig_ots, auth_path);
}
XMSS_Signature
XMSS_Signature_Operation::sign(const secure_vector<uint8_t>& msg_hash,
XMSS_PrivateKey& xmss_priv_key)
{
XMSS_Address adrs;
XMSS_Signature sig(m_leaf_idx,
m_randomness,
generate_tree_signature(msg_hash, xmss_priv_key,adrs));
return sig;
}
wots_keysig_t
XMSS_Signature_Operation::build_auth_path(XMSS_PrivateKey& priv_key,
XMSS_Address& adrs)
{
wots_keysig_t auth_path(m_xmss_params.tree_height());
adrs.set_type(XMSS_Address::Type::Hash_Tree_Address);
for(size_t j = 0; j < m_xmss_params.tree_height(); j++)
{
size_t k = (m_leaf_idx / (1 << j)) ^ 0x01;
auth_path[j] = priv_key.tree_hash(k * (1 << j), j, adrs);
}
return auth_path;
}
void XMSS_Signature_Operation::update(const uint8_t msg[], size_t msg_len)
{
initialize();
m_hash.h_msg_update(msg, msg_len);
}
secure_vector<uint8_t>
XMSS_Signature_Operation::sign(RandomNumberGenerator&)
{
initialize();
secure_vector<uint8_t> signature(sign(m_hash.h_msg_final(),
m_priv_key).bytes());
m_is_initialized = false;
return signature;
}
void XMSS_Signature_Operation::initialize()
{
// return if we already initialized and reserved a leaf index for signing.
if(m_is_initialized)
{ return; }
secure_vector<uint8_t> index_bytes;
// reserve leaf index so it can not be reused in by another signature
// operation using the same private key.
m_leaf_idx = m_priv_key.reserve_unused_leaf_index();
// write prefix for message hashing into buffer.
XMSS_Tools::concat(index_bytes, m_leaf_idx, 32);
m_randomness = m_hash.prf(m_priv_key.prf(), index_bytes);
index_bytes.clear();
XMSS_Tools::concat(index_bytes, m_leaf_idx,
m_priv_key.xmss_parameters().element_size());
m_hash.h_msg_init(m_randomness,
m_priv_key.root(),
index_bytes);
m_is_initialized = true;
}
}
|