2013-12-31 08:24:28 -05:00
|
|
|
|
|
|
|
#define TEST_NAME "box_easy2"
|
|
|
|
#include "cmptest.h"
|
|
|
|
|
|
|
|
int main(void)
|
|
|
|
{
|
2014-12-17 18:00:19 -05:00
|
|
|
unsigned char *alicepk;
|
|
|
|
unsigned char *alicesk;
|
|
|
|
unsigned char *bobpk;
|
|
|
|
unsigned char *bobsk;
|
|
|
|
unsigned char *mac;
|
|
|
|
unsigned char *nonce;
|
2015-01-06 15:18:36 -05:00
|
|
|
unsigned char *k1;
|
|
|
|
unsigned char *k2;
|
2015-11-27 06:13:40 -05:00
|
|
|
unsigned char *m;
|
|
|
|
unsigned char *m2;
|
|
|
|
unsigned char *c;
|
2014-12-17 18:00:19 -05:00
|
|
|
size_t mlen;
|
|
|
|
size_t i;
|
2015-11-27 06:13:40 -05:00
|
|
|
size_t m_size;
|
|
|
|
size_t m2_size;
|
|
|
|
size_t c_size;
|
2015-11-16 18:43:12 -05:00
|
|
|
int ret;
|
2013-12-31 08:24:28 -05:00
|
|
|
|
2015-12-07 02:58:35 -05:00
|
|
|
m2_size = m_size = 1U + randombytes_uniform(1000);
|
2015-11-27 06:13:40 -05:00
|
|
|
c_size = crypto_box_MACBYTES + m_size;
|
|
|
|
m = (unsigned char *) sodium_malloc(m_size);
|
|
|
|
m2 = (unsigned char *) sodium_malloc(m2_size);
|
|
|
|
c = (unsigned char *) sodium_malloc(c_size);
|
2014-12-17 18:12:50 -05:00
|
|
|
alicepk = (unsigned char *) sodium_malloc(crypto_box_PUBLICKEYBYTES);
|
|
|
|
alicesk = (unsigned char *) sodium_malloc(crypto_box_SECRETKEYBYTES);
|
|
|
|
bobpk = (unsigned char *) sodium_malloc(crypto_box_PUBLICKEYBYTES);
|
|
|
|
bobsk = (unsigned char *) sodium_malloc(crypto_box_SECRETKEYBYTES);
|
|
|
|
mac = (unsigned char *) sodium_malloc(crypto_box_MACBYTES);
|
|
|
|
nonce = (unsigned char *) sodium_malloc(crypto_box_NONCEBYTES);
|
2015-01-06 15:18:36 -05:00
|
|
|
k1 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES);
|
|
|
|
k2 = (unsigned char *) sodium_malloc(crypto_box_BEFORENMBYTES);
|
2013-12-31 08:24:28 -05:00
|
|
|
crypto_box_keypair(alicepk, alicesk);
|
|
|
|
crypto_box_keypair(bobpk, bobsk);
|
2015-11-27 06:13:40 -05:00
|
|
|
mlen = (size_t) randombytes_uniform((uint32_t) m_size) + 1U;
|
2013-12-31 08:24:28 -05:00
|
|
|
randombytes_buf(m, mlen);
|
2015-02-17 12:42:57 -05:00
|
|
|
randombytes_buf(nonce, crypto_box_NONCEBYTES);
|
2015-11-16 18:43:12 -05:00
|
|
|
ret = crypto_box_easy(c, m, mlen, nonce, bobpk, alicesk);
|
|
|
|
assert(ret == 0);
|
2014-11-20 16:12:08 -05:00
|
|
|
if (crypto_box_open_easy(m2, c,
|
|
|
|
(unsigned long long) mlen + crypto_box_MACBYTES,
|
|
|
|
nonce, alicepk, bobsk) != 0) {
|
2014-07-11 15:23:52 -04:00
|
|
|
printf("open() failed");
|
|
|
|
return 1;
|
|
|
|
}
|
2013-12-31 08:24:28 -05:00
|
|
|
printf("%d\n", memcmp(m, m2, mlen));
|
|
|
|
|
2014-07-11 15:23:52 -04:00
|
|
|
for (i = 0; i < mlen + crypto_box_MACBYTES - 1; i++) {
|
2014-11-20 16:12:08 -05:00
|
|
|
if (crypto_box_open_easy(m2, c, (unsigned long long) i,
|
|
|
|
nonce, alicepk, bobsk) == 0) {
|
2014-07-11 15:23:52 -04:00
|
|
|
printf("short open() should have failed");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
2014-10-05 02:53:19 -04:00
|
|
|
memcpy(c, m, mlen);
|
2015-11-16 18:43:12 -05:00
|
|
|
ret = crypto_box_easy(c, c, (unsigned long long) mlen, nonce, bobpk, alicesk);
|
|
|
|
assert(ret == 0);
|
2014-10-05 02:53:19 -04:00
|
|
|
printf("%d\n", memcmp(m, c, mlen) == 0);
|
|
|
|
printf("%d\n", memcmp(m, c + crypto_box_MACBYTES, mlen) == 0);
|
2014-11-20 16:12:08 -05:00
|
|
|
if (crypto_box_open_easy(c, c,
|
|
|
|
(unsigned long long) mlen + crypto_box_MACBYTES,
|
|
|
|
nonce, alicepk, bobsk) != 0) {
|
2014-10-05 02:53:19 -04:00
|
|
|
printf("crypto_box_open_easy() failed\n");
|
|
|
|
}
|
|
|
|
|
2015-11-16 18:43:12 -05:00
|
|
|
ret = crypto_box_beforenm(k1, alicepk, bobsk);
|
|
|
|
assert(ret == 0);
|
|
|
|
ret = crypto_box_beforenm(k2, bobpk, alicesk);
|
|
|
|
assert(ret == 0);
|
2015-01-06 15:18:36 -05:00
|
|
|
|
2015-11-27 06:13:40 -05:00
|
|
|
memset(m2, 0, m2_size);
|
2015-01-15 08:37:26 -05:00
|
|
|
|
|
|
|
if (crypto_box_easy_afternm(c, m, SIZE_MAX - 1U, nonce, k1) == 0) {
|
|
|
|
printf("crypto_box_easy_afternm() with a short ciphertext should have failed\n");
|
|
|
|
}
|
2015-01-06 15:18:36 -05:00
|
|
|
crypto_box_easy_afternm(c, m, (unsigned long long) mlen, nonce, k1);
|
2015-11-01 07:57:51 -05:00
|
|
|
if (crypto_box_open_easy_afternm(m2, c,
|
|
|
|
(unsigned long long) mlen + crypto_box_MACBYTES,
|
|
|
|
nonce, k2) != 0) {
|
|
|
|
printf("crypto_box_open_easy_afternm() failed\n");
|
|
|
|
}
|
2015-01-06 15:18:36 -05:00
|
|
|
printf("%d\n", memcmp(m, m2, mlen));
|
2015-01-15 08:37:26 -05:00
|
|
|
if (crypto_box_open_easy_afternm(m2, c, crypto_box_MACBYTES - 1U,
|
|
|
|
nonce, k2) == 0) {
|
|
|
|
printf("crypto_box_open_easy_afternm() with a huge ciphertext should have failed\n");
|
|
|
|
}
|
2015-11-27 06:13:40 -05:00
|
|
|
memset(m2, 0, m2_size);
|
2015-11-16 18:43:12 -05:00
|
|
|
ret = crypto_box_detached(c, mac, m, (unsigned long long) mlen,
|
|
|
|
nonce, alicepk, bobsk);
|
|
|
|
assert(ret == 0);
|
2015-11-01 07:57:51 -05:00
|
|
|
if (crypto_box_open_detached(m2, c, mac, (unsigned long long) mlen,
|
|
|
|
nonce, bobpk, alicesk) != 0) {
|
|
|
|
printf("crypto_box_open_detached() failed\n");
|
|
|
|
}
|
2014-12-17 18:12:50 -05:00
|
|
|
printf("%d\n", memcmp(m, m2, mlen));
|
2015-01-06 15:18:36 -05:00
|
|
|
|
2015-11-27 06:13:40 -05:00
|
|
|
memset(m2, 0, m2_size);
|
2015-01-06 15:18:36 -05:00
|
|
|
crypto_box_detached_afternm(c, mac, m, (unsigned long long) mlen,
|
|
|
|
nonce, k1);
|
2015-11-01 07:57:51 -05:00
|
|
|
if (crypto_box_open_detached_afternm(m2, c, mac, (unsigned long long) mlen,
|
|
|
|
nonce, k2) != 0) {
|
|
|
|
printf("crypto_box_open_detached_afternm() failed\n");
|
|
|
|
}
|
2015-01-06 15:18:36 -05:00
|
|
|
printf("%d\n", memcmp(m, m2, mlen));
|
|
|
|
|
2014-12-17 18:00:19 -05:00
|
|
|
sodium_free(alicepk);
|
|
|
|
sodium_free(alicesk);
|
|
|
|
sodium_free(bobpk);
|
|
|
|
sodium_free(bobsk);
|
|
|
|
sodium_free(mac);
|
|
|
|
sodium_free(nonce);
|
2015-01-06 15:18:36 -05:00
|
|
|
sodium_free(k1);
|
|
|
|
sodium_free(k2);
|
2015-11-27 06:13:40 -05:00
|
|
|
sodium_free(m);
|
|
|
|
sodium_free(m2);
|
|
|
|
sodium_free(c);
|
2014-12-17 18:00:19 -05:00
|
|
|
printf("OK\n");
|
2014-07-11 15:28:52 -04:00
|
|
|
|
2013-12-31 08:24:28 -05:00
|
|
|
return 0;
|
|
|
|
}
|