Add libsodium to the tree and build what's needed from source.
git-svn-id: https://www.unprompted.com/svn/projects/tildefriends/trunk@3859 ed5197a5-7fde-0310-b194-c3ffbd925b24
This commit is contained in:
72
deps/libsodium/test/default/secretbox_easy2.c
vendored
Normal file
72
deps/libsodium/test/default/secretbox_easy2.c
vendored
Normal file
@ -0,0 +1,72 @@
|
||||
|
||||
#define TEST_NAME "secretbox_easy2"
|
||||
#include "cmptest.h"
|
||||
|
||||
int
|
||||
main(void)
|
||||
{
|
||||
unsigned char *m;
|
||||
unsigned char *m2;
|
||||
unsigned char *c;
|
||||
unsigned char *nonce;
|
||||
unsigned char *k;
|
||||
unsigned char *mac;
|
||||
size_t mlen;
|
||||
size_t i;
|
||||
|
||||
mlen = (size_t) randombytes_uniform((uint32_t) 10000) + 1U;
|
||||
m = (unsigned char *) sodium_malloc(mlen);
|
||||
m2 = (unsigned char *) sodium_malloc(mlen);
|
||||
c = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES + mlen);
|
||||
nonce = (unsigned char *) sodium_malloc(crypto_secretbox_NONCEBYTES);
|
||||
k = (unsigned char *) sodium_malloc(crypto_secretbox_KEYBYTES);
|
||||
mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES);
|
||||
crypto_secretbox_keygen(k);
|
||||
randombytes_buf(m, mlen);
|
||||
randombytes_buf(nonce, crypto_secretbox_NONCEBYTES);
|
||||
crypto_secretbox_easy(c, m, (unsigned long long) mlen, nonce, k);
|
||||
if (crypto_secretbox_open_easy(
|
||||
m2, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce,
|
||||
k) != 0) {
|
||||
printf("crypto_secretbox_open_easy() failed\n");
|
||||
}
|
||||
printf("%d\n", memcmp(m, m2, mlen));
|
||||
|
||||
for (i = 0; i < mlen + crypto_secretbox_MACBYTES - 1; i++) {
|
||||
if (crypto_secretbox_open_easy(m2, c, (unsigned long long) i, nonce,
|
||||
k) == 0) {
|
||||
printf("short open() should have failed\n");
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
crypto_secretbox_detached(c, mac, m, (unsigned long long) mlen, nonce, k);
|
||||
if (crypto_secretbox_open_detached(NULL, c, mac, (unsigned long long) mlen,
|
||||
nonce, k) != 0) {
|
||||
printf("crypto_secretbox_open_detached() with a NULL message pointer failed\n");
|
||||
}
|
||||
if (crypto_secretbox_open_detached(m2, c, mac, (unsigned long long) mlen,
|
||||
nonce, k) != 0) {
|
||||
printf("crypto_secretbox_open_detached() failed\n");
|
||||
}
|
||||
printf("%d\n", memcmp(m, m2, mlen));
|
||||
|
||||
memcpy(c, m, mlen);
|
||||
crypto_secretbox_easy(c, c, (unsigned long long) mlen, nonce, k);
|
||||
printf("%d\n", memcmp(m, c, mlen) == 0);
|
||||
printf("%d\n", memcmp(m, c + crypto_secretbox_MACBYTES, mlen) == 0);
|
||||
if (crypto_secretbox_open_easy(
|
||||
c, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce,
|
||||
k) != 0) {
|
||||
printf("crypto_secretbox_open_easy() failed\n");
|
||||
}
|
||||
printf("%d\n", memcmp(m, c, mlen));
|
||||
|
||||
sodium_free(m);
|
||||
sodium_free(m2);
|
||||
sodium_free(c);
|
||||
sodium_free(nonce);
|
||||
sodium_free(k);
|
||||
sodium_free(mac);
|
||||
|
||||
return 0;
|
||||
}
|
Reference in New Issue
Block a user