2014-09-13 17:11:12 -04:00
|
|
|
|
2013-01-20 18:55:10 -05:00
|
|
|
#define TEST_NAME "box8"
|
|
|
|
#include "cmptest.h"
|
|
|
|
|
2013-01-20 18:41:17 -05:00
|
|
|
unsigned char alicesk[crypto_box_SECRETKEYBYTES];
|
|
|
|
unsigned char alicepk[crypto_box_PUBLICKEYBYTES];
|
|
|
|
unsigned char bobsk[crypto_box_SECRETKEYBYTES];
|
|
|
|
unsigned char bobpk[crypto_box_PUBLICKEYBYTES];
|
|
|
|
unsigned char n[crypto_box_NONCEBYTES];
|
|
|
|
unsigned char m[10000];
|
|
|
|
unsigned char c[10000];
|
|
|
|
unsigned char m2[10000];
|
|
|
|
|
2013-01-20 18:48:08 -05:00
|
|
|
int main(void)
|
2013-01-20 18:41:17 -05:00
|
|
|
{
|
2014-09-14 13:34:16 -04:00
|
|
|
size_t mlen;
|
|
|
|
size_t i;
|
2015-11-16 18:43:12 -05:00
|
|
|
int caught;
|
|
|
|
int ret;
|
2013-01-20 18:41:17 -05:00
|
|
|
|
2014-09-14 14:32:55 -04:00
|
|
|
for (mlen = 0; mlen < 1000 && mlen + crypto_box_ZEROBYTES < sizeof m;
|
|
|
|
++mlen) {
|
|
|
|
crypto_box_keypair(alicepk, alicesk);
|
|
|
|
crypto_box_keypair(bobpk, bobsk);
|
|
|
|
randombytes_buf(n, crypto_box_NONCEBYTES);
|
|
|
|
randombytes_buf(m + crypto_box_ZEROBYTES, mlen);
|
2015-11-16 18:43:12 -05:00
|
|
|
ret = crypto_box(c, m, mlen + crypto_box_ZEROBYTES, n, bobpk, alicesk);
|
|
|
|
assert(ret == 0);
|
2014-09-14 13:34:16 -04:00
|
|
|
caught = 0;
|
|
|
|
while (caught < 10) {
|
|
|
|
c[rand() % (mlen + crypto_box_ZEROBYTES)] = rand();
|
2014-09-14 14:32:55 -04:00
|
|
|
if (crypto_box_open(m2, c, mlen + crypto_box_ZEROBYTES, n, alicepk,
|
|
|
|
bobsk) == 0) {
|
|
|
|
for (i = 0; i < mlen + crypto_box_ZEROBYTES; ++i) {
|
2014-09-14 13:34:16 -04:00
|
|
|
if (m2[i] != m[i]) {
|
|
|
|
printf("forgery\n");
|
|
|
|
return 100;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
++caught;
|
|
|
|
}
|
|
|
|
}
|
2013-01-20 18:41:17 -05:00
|
|
|
}
|
2014-09-14 13:34:16 -04:00
|
|
|
return 0;
|
2013-01-20 18:41:17 -05:00
|
|
|
}
|