#define TEST_NAME "kx" #include "cmptest.h" static void tv_kx(void) { unsigned char *seed; unsigned char *client_pk, *client_sk; unsigned char *client_rx, *client_tx; unsigned char *server_pk, *server_sk; unsigned char *server_rx, *server_tx; char hex[65]; int i; seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES); for (i = 0; i < crypto_kx_SEEDBYTES; i++) { seed[i] = (unsigned char) i; } client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); client_sk = (unsigned char *) sodium_malloc(crypto_kx_SECRETKEYBYTES); crypto_kx_seed_keypair(client_pk, client_sk, seed); sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES); printf("client_pk: [%s]\n", hex); sodium_bin2hex(hex, sizeof hex, client_sk, crypto_kx_SECRETKEYBYTES); printf("client_sk: [%s]\n", hex); server_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES); server_sk = (unsigned char *) sodium_malloc(crypto_kx_SECRETKEYBYTES); crypto_kx_keypair(server_pk, server_sk); client_rx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES); client_tx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES); if (crypto_kx_client_session_keys(client_rx, client_tx, client_pk, client_sk, server_pk) != 0) { printf("crypto_kx_client_session_keys() failed\n"); } server_rx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES); server_tx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES); if (crypto_kx_server_session_keys(server_rx, server_tx, server_pk, server_sk, client_pk) != 0) { printf("crypto_kx_server_session_keys() failed\n"); } if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) != 0 || memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) != 0) { printf("client session keys != server session keys\n"); } sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES); if (crypto_kx_server_session_keys(server_rx, server_tx, server_pk, server_sk, client_pk) != 0) { printf("crypto_kx_server_session_keys() failed\n"); } if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) == 0 && memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) == 0) { printf("peer's public key is ignored\n"); } crypto_kx_keypair(client_pk, client_sk); if (crypto_kx_server_session_keys(server_rx, server_tx, server_pk, server_sk, client_pk) != 0) { printf("crypto_kx_server_session_keys() failed\n"); } if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) == 0 || memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) == 0) { printf("session keys are constant\n"); } crypto_kx_seed_keypair(client_pk, client_sk, seed); sodium_increment(seed, crypto_kx_SEEDBYTES); crypto_kx_seed_keypair(server_pk, server_sk, seed); if (crypto_kx_server_session_keys(server_rx, server_tx, server_pk, server_sk, client_pk) != 0) { printf("crypto_kx_server_session_keys() failed\n"); } sodium_bin2hex(hex, sizeof hex, server_rx, crypto_kx_SESSIONKEYBYTES); printf("server_rx: [%s]\n", hex); sodium_bin2hex(hex, sizeof hex, server_tx, crypto_kx_SESSIONKEYBYTES); printf("server_tx: [%s]\n", hex); if (crypto_kx_client_session_keys(client_rx, client_tx, client_pk, client_sk, server_pk) != 0) { printf("crypto_kx_client_session_keys() failed\n"); } sodium_bin2hex(hex, sizeof hex, client_rx, crypto_kx_SESSIONKEYBYTES); printf("client_rx: [%s]\n", hex); sodium_bin2hex(hex, sizeof hex, client_tx, crypto_kx_SESSIONKEYBYTES); printf("client_tx: [%s]\n", hex); sodium_free(client_rx); sodium_free(client_tx); sodium_free(server_rx); sodium_free(server_tx); sodium_free(server_sk); sodium_free(server_pk); sodium_free(client_sk); sodium_free(client_pk); sodium_free(seed); assert(strcmp(crypto_kx_primitive(), crypto_kx_PRIMITIVE) == 0); assert(crypto_kx_publickeybytes() == crypto_kx_PUBLICKEYBYTES); assert(crypto_kx_secretkeybytes() == crypto_kx_SECRETKEYBYTES); assert(crypto_kx_seedbytes() == crypto_kx_SEEDBYTES); assert(crypto_kx_sessionkeybytes() == crypto_kx_SESSIONKEYBYTES); printf("tv_kx: ok\n"); } int main(void) { tv_kx(); return 0; }