123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149 |
- #define TEST_NAME "kx"
- #include "cmptest.h"
- static const unsigned char small_order_p[crypto_scalarmult_BYTES] = {
- 0xe0, 0xeb, 0x7a, 0x7c, 0x3b, 0x41, 0xb8, 0xae, 0x16, 0x56, 0xe3,
- 0xfa, 0xf1, 0x9f, 0xc4, 0x6a, 0xda, 0x09, 0x8d, 0xeb, 0x9c, 0x32,
- 0xb1, 0xfd, 0x86, 0x62, 0x05, 0x16, 0x5f, 0x49, 0xb8, 0x00
- };
- static void
- tv_kx(void)
- {
- unsigned char *seed;
- unsigned char *client_pk, *client_sk;
- unsigned char *client_rx, *client_tx;
- unsigned char *server_pk, *server_sk;
- unsigned char *server_rx, *server_tx;
- char hex[65];
- int i;
- seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES);
- for (i = 0; i < crypto_kx_SEEDBYTES; i++) {
- seed[i] = (unsigned char) i;
- }
- client_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES);
- client_sk = (unsigned char *) sodium_malloc(crypto_kx_SECRETKEYBYTES);
- crypto_kx_seed_keypair(client_pk, client_sk, seed);
- sodium_bin2hex(hex, sizeof hex, client_pk, crypto_kx_PUBLICKEYBYTES);
- printf("client_pk: [%s]\n", hex);
- sodium_bin2hex(hex, sizeof hex, client_sk, crypto_kx_SECRETKEYBYTES);
- printf("client_sk: [%s]\n", hex);
- server_pk = (unsigned char *) sodium_malloc(crypto_kx_PUBLICKEYBYTES);
- server_sk = (unsigned char *) sodium_malloc(crypto_kx_SECRETKEYBYTES);
- crypto_kx_keypair(server_pk, server_sk);
- client_rx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES);
- client_tx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES);
- assert(crypto_kx_client_session_keys(client_rx, client_tx,
- client_pk, client_sk,
- small_order_p) == -1);
- if (crypto_kx_client_session_keys(client_rx, client_tx,
- client_pk, client_sk, server_pk) != 0) {
- printf("crypto_kx_client_session_keys() failed\n");
- }
- server_rx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES);
- server_tx = (unsigned char *) sodium_malloc(crypto_kx_SESSIONKEYBYTES);
- assert(crypto_kx_server_session_keys(server_rx, server_tx,
- server_pk, server_sk,
- small_order_p) == -1);
- if (crypto_kx_server_session_keys(server_rx, server_tx,
- server_pk, server_sk, client_pk) != 0) {
- printf("crypto_kx_server_session_keys() failed\n");
- }
- if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) != 0 ||
- memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) != 0) {
- printf("client session keys != server session keys\n");
- }
- sodium_increment(client_pk, crypto_kx_PUBLICKEYBYTES);
- if (crypto_kx_server_session_keys(server_rx, server_tx,
- server_pk, server_sk, client_pk) != 0) {
- printf("crypto_kx_server_session_keys() failed\n");
- }
- if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) == 0 &&
- memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) == 0) {
- printf("peer's public key is ignored\n");
- }
- crypto_kx_keypair(client_pk, client_sk);
- if (crypto_kx_server_session_keys(server_rx, server_tx,
- server_pk, server_sk, client_pk) != 0) {
- printf("crypto_kx_server_session_keys() failed\n");
- }
- if (memcmp(server_rx, client_tx, crypto_kx_SESSIONKEYBYTES) == 0 ||
- memcmp(server_tx, client_rx, crypto_kx_SESSIONKEYBYTES) == 0) {
- printf("session keys are constant\n");
- }
- crypto_kx_seed_keypair(client_pk, client_sk, seed);
- sodium_increment(seed, crypto_kx_SEEDBYTES);
- crypto_kx_seed_keypair(server_pk, server_sk, seed);
- if (crypto_kx_server_session_keys(server_rx, server_tx,
- server_pk, server_sk, client_pk) != 0) {
- printf("crypto_kx_server_session_keys() failed\n");
- }
- sodium_bin2hex(hex, sizeof hex, server_rx, crypto_kx_SESSIONKEYBYTES);
- printf("server_rx: [%s]\n", hex);
- sodium_bin2hex(hex, sizeof hex, server_tx, crypto_kx_SESSIONKEYBYTES);
- printf("server_tx: [%s]\n", hex);
- if (crypto_kx_client_session_keys(client_rx, client_tx,
- client_pk, client_sk, server_pk) != 0) {
- printf("crypto_kx_client_session_keys() failed\n");
- }
- sodium_bin2hex(hex, sizeof hex, client_rx, crypto_kx_SESSIONKEYBYTES);
- printf("client_rx: [%s]\n", hex);
- sodium_bin2hex(hex, sizeof hex, client_tx, crypto_kx_SESSIONKEYBYTES);
- printf("client_tx: [%s]\n", hex);
- randombytes_buf(client_rx, crypto_kx_SESSIONKEYBYTES);
- randombytes_buf(client_tx, crypto_kx_SESSIONKEYBYTES);
- randombytes_buf(server_rx, crypto_kx_SESSIONKEYBYTES);
- randombytes_buf(server_tx, crypto_kx_SESSIONKEYBYTES);
- if (crypto_kx_client_session_keys(client_rx, NULL,
- client_pk, client_sk, server_pk) != 0 ||
- crypto_kx_client_session_keys(NULL, client_tx,
- client_pk, client_sk, server_pk) != 0 ||
- crypto_kx_server_session_keys(server_rx, NULL,
- server_pk, server_sk, client_pk) != 0 ||
- crypto_kx_server_session_keys(NULL, server_tx,
- server_pk, server_sk, client_pk) != 0) {
- printf("failure when one of the pointers happens to be NULL");
- }
- assert(memcmp(client_rx, client_tx, crypto_kx_SESSIONKEYBYTES) == 0);
- assert(memcmp(client_tx, server_rx, crypto_kx_SESSIONKEYBYTES) == 0);
- assert(memcmp(server_rx, server_tx, crypto_kx_SESSIONKEYBYTES) == 0);
- sodium_free(client_rx);
- sodium_free(client_tx);
- sodium_free(server_rx);
- sodium_free(server_tx);
- sodium_free(server_sk);
- sodium_free(server_pk);
- sodium_free(client_sk);
- sodium_free(client_pk);
- sodium_free(seed);
- assert(strcmp(crypto_kx_primitive(), crypto_kx_PRIMITIVE) == 0);
- assert(crypto_kx_publickeybytes() == crypto_kx_PUBLICKEYBYTES);
- assert(crypto_kx_secretkeybytes() == crypto_kx_SECRETKEYBYTES);
- assert(crypto_kx_seedbytes() == crypto_kx_SEEDBYTES);
- assert(crypto_kx_sessionkeybytes() == crypto_kx_SESSIONKEYBYTES);
- printf("tv_kx: ok\n");
- }
- int
- main(void)
- {
- tv_kx();
- return 0;
- }
|