Revision 3b48fa5aff6f5921df5b3444450281daca6d21d1 authored by Matthias J. Kannwischer on 08 November 2022, 05:16:28 UTC, committed by Matthias J. Kannwischer on 08 November 2022, 05:16:28 UTC
1 parent e831d9c
stack.c
#include "api.h"
#include "randombytes.h"
#include "hal.h"
#include "sendfn.h"
#include <stdio.h>
#include <string.h>
#ifndef MAX_STACK_SIZE
#define MAX_STACK_SIZE hal_get_stack_size()
#endif
#ifndef STACK_SIZE_INCR
#define STACK_SIZE_INCR 0x1000
#endif
#define MLEN 32
// https://stackoverflow.com/a/1489985/1711232
#define PASTER(x, y) x##y
#define EVALUATOR(x, y) PASTER(x, y)
#define NAMESPACE(fun) EVALUATOR(MUPQ_NAMESPACE, fun)
// use different names so we can have empty namespaces
#define MUPQ_CRYPTO_PUBLICKEYBYTES NAMESPACE(CRYPTO_PUBLICKEYBYTES)
#define MUPQ_CRYPTO_SECRETKEYBYTES NAMESPACE(CRYPTO_SECRETKEYBYTES)
#define MUPQ_CRYPTO_BYTES NAMESPACE(CRYPTO_BYTES)
#define MUPQ_CRYPTO_ALGNAME NAMESPACE(CRYPTO_ALGNAME)
#define MUPQ_crypto_sign_keypair NAMESPACE(crypto_sign_keypair)
#define MUPQ_crypto_sign NAMESPACE(crypto_sign)
#define MUPQ_crypto_sign_open NAMESPACE(crypto_sign_open)
#define MUPQ_crypto_sign_signature NAMESPACE(crypto_sign_signature)
#define MUPQ_crypto_sign_verify NAMESPACE(crypto_sign_verify)
#define send_stack_usage(S, U) send_unsigned((S), (U))
unsigned int canary_size;
volatile unsigned char *p;
unsigned int c;
uint8_t canary = 0x42;
unsigned char pk[MUPQ_CRYPTO_PUBLICKEYBYTES];
unsigned char sk[MUPQ_CRYPTO_SECRETKEYBYTES];
unsigned char sm[MLEN + MUPQ_CRYPTO_BYTES];
unsigned char m[MLEN];
size_t mlen;
size_t smlen;
unsigned int rc;
unsigned int stack_key_gen, stack_sign, stack_verify;
#define FILL_STACK() \
p = &a; \
while (p > &a - canary_size) \
*(p--) = canary;
#define CHECK_STACK() \
c = canary_size; \
p = &a - canary_size + 1; \
while (*p == canary && p < &a) { \
p++; \
c--; \
} \
static int test_sign(void) {
volatile unsigned char a;
// Alice generates a public key
FILL_STACK()
MUPQ_crypto_sign_keypair(pk, sk);
CHECK_STACK()
if(c >= canary_size) return -1;
stack_key_gen = c;
// Bob derives a secret key and creates a response
randombytes(m, MLEN);
FILL_STACK()
MUPQ_crypto_sign(sm, &smlen, m, MLEN, sk);
CHECK_STACK()
if(c >= canary_size) return -1;
stack_sign = c;
// Alice uses Bobs response to get her secret key
FILL_STACK()
rc = MUPQ_crypto_sign_open(sm, &mlen, sm, smlen, pk);
CHECK_STACK()
if(c >= canary_size) return -1;
stack_verify = c;
if (rc) {
return -1;
} else {
send_stack_usage("keypair stack usage:", stack_key_gen);
send_stack_usage("sign stack usage:", stack_sign);
send_stack_usage("verify stack usage:", stack_verify);
hal_send_str("Signature valid!\n");
return 0;
}
}
int main(void) {
hal_setup(CLOCK_FAST);
// marker for automated benchmarks
hal_send_str("==========================");
canary_size = STACK_SIZE_INCR;
while(test_sign()){
if(canary_size == MAX_STACK_SIZE) {
hal_send_str("failed to measure stack usage.\n");
break;
}
canary_size += STACK_SIZE_INCR;
if(canary_size >= MAX_STACK_SIZE) {
canary_size = MAX_STACK_SIZE;
}
}
// marker for automated benchmarks
hal_send_str("#");
return 0;
}
Computing file changes ...