3333 } \
3434 } while (0)
3535
36+ #define TEST_MSG \
37+ "This is a test message for ML-DSA digital signature algorithm!"
38+ #define TEST_MSG_LEN (sizeof(TEST_MSG) - 1)
39+
3640int main (void )
3741{
38- const char * test_msg =
39- "This is a test message for ML-DSA digital signature algorithm!" ;
42+ const char test_msg [] = TEST_MSG ;
4043 const char * test_ctx = "test_context_123" ;
41- size_t msglen = strlen (test_msg );
4244 size_t ctxlen = strlen (test_ctx );
4345
4446 uint8_t pk [CRYPTO_PUBLICKEYBYTES ];
4547 uint8_t sk [CRYPTO_SECRETKEYBYTES ];
4648 uint8_t sig [CRYPTO_BYTES ];
47- uint8_t sm [msglen + CRYPTO_BYTES ]; /* signed message buffer */
48- uint8_t m2 [msglen ]; /* recovered message buffer */
49+ uint8_t sm [TEST_MSG_LEN + CRYPTO_BYTES ]; /* signed message buffer */
50+ uint8_t m2 [TEST_MSG_LEN + CRYPTO_BYTES ]; /* recovered message buffer */
4951 size_t siglen ;
5052 size_t smlen ;
5153 size_t mlen ;
@@ -69,21 +71,22 @@ int main(void)
6971 printf ("Signing message... " );
7072
7173 /* Alice signs the message */
72- CHECK (crypto_sign_signature (sig , & siglen , (const uint8_t * )test_msg , msglen ,
73- (const uint8_t * )test_ctx , ctxlen , sk ) == 0 );
74+ CHECK (crypto_sign_signature (sig , & siglen , (const uint8_t * )test_msg ,
75+ TEST_MSG_LEN , (const uint8_t * )test_ctx , ctxlen ,
76+ sk ) == 0 );
7477
7578 printf ("DONE\n" );
7679 printf ("Verifying signature... " );
7780
7881 /* Bob verifies Alice's signature */
79- CHECK (crypto_sign_verify (sig , siglen , (const uint8_t * )test_msg , msglen ,
82+ CHECK (crypto_sign_verify (sig , siglen , (const uint8_t * )test_msg , TEST_MSG_LEN ,
8083 (const uint8_t * )test_ctx , ctxlen , pk ) == 0 );
8184
8285 printf ("DONE\n" );
8386 printf ("Creating signed message... " );
8487
8588 /* Alternative API: Create a signed message (signature + message combined) */
86- CHECK (crypto_sign (sm , & smlen , (const uint8_t * )test_msg , msglen ,
89+ CHECK (crypto_sign (sm , & smlen , (const uint8_t * )test_msg , TEST_MSG_LEN ,
8790 (const uint8_t * )test_ctx , ctxlen , sk ) == 0 );
8891
8992 printf ("DONE\n" );
@@ -97,8 +100,8 @@ int main(void)
97100 printf ("Compare messages... " );
98101
99102 /* Verify the recovered message matches the original */
100- CHECK (mlen == msglen );
101- CHECK (memcmp (test_msg , m2 , msglen ) == 0 );
103+ CHECK (mlen == TEST_MSG_LEN );
104+ CHECK (memcmp (test_msg , m2 , TEST_MSG_LEN ) == 0 );
102105
103106 printf ("DONE\n\n" );
104107
@@ -107,9 +110,9 @@ int main(void)
107110 printf ("Public key size: %d bytes\n" , CRYPTO_PUBLICKEYBYTES );
108111 printf ("Secret key size: %d bytes\n" , CRYPTO_SECRETKEYBYTES );
109112 printf ("Signature size: %d bytes\n" , CRYPTO_BYTES );
110- printf ("Message length: %zu bytes\n" , msglen );
111- printf ("Signature length: %zu bytes\n" , siglen );
112- printf ("Signed msg length: %zu bytes\n" , smlen );
113+ printf ("Message length: %lu bytes\n" , TEST_MSG_LEN );
114+ printf ("Signature length: %lu bytes\n" , ( unsigned long ) siglen );
115+ printf ("Signed msg length: %lu bytes\n" , ( unsigned long ) smlen );
113116
114117#if !defined(MLD_CONFIG_KEYGEN_PCT )
115118 /* Check against expected signature to make sure that
0 commit comments