forked from cory/tildefriends
42 lines
1.1 KiB
C
42 lines
1.1 KiB
C
|
|
||
|
#define TEST_NAME "auth7"
|
||
|
#include "cmptest.h"
|
||
|
|
||
|
static unsigned char key[32];
|
||
|
static unsigned char c[600];
|
||
|
static unsigned char a[64];
|
||
|
|
||
|
int
|
||
|
main(void)
|
||
|
{
|
||
|
size_t clen;
|
||
|
|
||
|
for (clen = 0; clen < sizeof c; ++clen) {
|
||
|
crypto_auth_keygen(key);
|
||
|
randombytes_buf(c, clen);
|
||
|
crypto_auth_hmacsha512(a, c, clen, key);
|
||
|
if (crypto_auth_hmacsha512_verify(a, c, clen, key) != 0) {
|
||
|
printf("fail %u\n", (unsigned int) clen);
|
||
|
return 100;
|
||
|
}
|
||
|
if (clen > 0) {
|
||
|
c[(size_t) rand() % clen] += 1 + (rand() % 255);
|
||
|
if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) {
|
||
|
printf("forgery %u\n", (unsigned int) clen);
|
||
|
return 100;
|
||
|
}
|
||
|
a[rand() % sizeof a] += 1 + (rand() % 255);
|
||
|
if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) {
|
||
|
printf("forgery %u\n", (unsigned int) clen);
|
||
|
return 100;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
crypto_auth_keygen(key);
|
||
|
crypto_auth_hmacsha512(a, guard_page, 0U, key);
|
||
|
assert(crypto_auth_hmacsha512_verify(a, guard_page, 0U, key) == 0);
|
||
|
|
||
|
return 0;
|
||
|
}
|