diff --git a/src/signature/generalized_xmss.rs b/src/signature/generalized_xmss.rs index ff2e36f..e86c17b 100644 --- a/src/signature/generalized_xmss.rs +++ b/src/signature/generalized_xmss.rs @@ -587,7 +587,10 @@ mod tests { inc_encoding::target_sum::TargetSumEncoding, signature::test_templates::test_signature_scheme_correctness, symmetric::{ - message_hash::{MessageHash, poseidon::PoseidonMessageHashW1}, + message_hash::{ + MessageHash, + poseidon::{PoseidonMessageHash, PoseidonMessageHashW1}, + }, prf::shake_to_field::ShakePRFtoF, tweak_hash::poseidon::PoseidonTweakW1L5, }, @@ -666,14 +669,12 @@ mod tests { assert_eq!(rho1, rho2); } - /*#[test] - pub fn test_large_base_sha() { + #[test] + pub fn test_large_base_poseidon() { // Note: do not use these parameters, they are just for testing - type PRF = ShaPRF<24, 8>; - type TH = ShaTweak192192; - - // use chunk size 8 - type MH = ShaMessageHash<24, 8, 32, 8>; + type PRF = ShakePRFtoF<4, 8>; + type TH = PoseidonTweakHash<4, 4, 2, 8, 32>; + type MH = PoseidonMessageHash<4, 8, 8, 32, 256, 2, 9>; const TARGET_SUM: usize = 1 << 12; type IE = TargetSumEncoding; const LOG_LIFETIME: usize = 10; @@ -686,13 +687,11 @@ mod tests { } #[test] - pub fn test_large_dimension_sha() { + pub fn test_large_dimension_poseidon() { // Note: do not use these parameters, they are just for testing - type PRF = ShaPRF<24, 8>; - type TH = ShaTweak192192; - - // use 256 chunks - type MH = ShaMessageHash<24, 8, 256, 1>; + type PRF = ShakePRFtoF<8, 8>; + type TH = PoseidonTweakHash<4, 8, 2, 8, 256>; + type MH = PoseidonMessageHash<4, 8, 8, 256, 2, 2, 9>; const TARGET_SUM: usize = 128; type IE = TargetSumEncoding; const LOG_LIFETIME: usize = 10; @@ -702,7 +701,7 @@ mod tests { test_signature_scheme_correctness::(2, 0, Sig::LIFETIME as usize); test_signature_scheme_correctness::(19, 0, Sig::LIFETIME as usize); - }*/ + } #[test] pub fn test_expand_activation_time() {