comparison libtomcrypt/testprof/dh_tests.c @ 302:973fccb59ea4 ucc-axis-hack

propagate from branch 'au.asn.ucc.matt.dropbear' (head 11034278bd1917bebcbdc69cf53b1891ce9db121) to branch 'au.asn.ucc.matt.dropbear.ucc-axis-hack' (head 10a1f614fec73d0820c3f61160d9db409b9beb46)
author Matt Johnston <matt@ucc.asn.au>
date Sat, 25 Mar 2006 12:59:58 +0000
parents 1b9e69c058d2
children
comparison
equal deleted inserted replaced
299:740e782679be 302:973fccb59ea4
1 #include <tomcrypt_test.h>
2
3 #ifdef MDH
4
5 int dh_tests (void)
6 {
7 unsigned char buf[3][4096];
8 unsigned long x, y, z;
9 int stat, stat2;
10 dh_key usera, userb;
11
12 DO(dh_test());
13
14 /* make up two keys */
15 DO(dh_make_key (&yarrow_prng, find_prng ("yarrow"), 512, &usera));
16 DO(dh_make_key (&yarrow_prng, find_prng ("yarrow"), 512, &userb));
17
18 /* make the shared secret */
19 x = 4096;
20 DO(dh_shared_secret (&usera, &userb, buf[0], &x));
21
22 y = 4096;
23 DO(dh_shared_secret (&userb, &usera, buf[1], &y));
24 if (y != x) {
25 fprintf(stderr, "DH Shared keys are not same size.\n");
26 return 1;
27 }
28 if (memcmp (buf[0], buf[1], x)) {
29 fprintf(stderr, "DH Shared keys not same contents.\n");
30 return 1;
31 }
32
33 /* now export userb */
34 y = 4096;
35 DO(dh_export (buf[1], &y, PK_PUBLIC, &userb));
36 dh_free (&userb);
37
38 /* import and make the shared secret again */
39 DO(dh_import (buf[1], y, &userb));
40 z = 4096;
41 DO(dh_shared_secret (&usera, &userb, buf[2], &z));
42
43 if (z != x) {
44 fprintf(stderr, "failed. Size don't match?\n");
45 return 1;
46 }
47 if (memcmp (buf[0], buf[2], x)) {
48 fprintf(stderr, "Failed. Content didn't match.\n");
49 return 1;
50 }
51 dh_free (&usera);
52 dh_free (&userb);
53
54 /* test encrypt_key */
55 dh_make_key (&yarrow_prng, find_prng ("yarrow"), 512, &usera);
56 for (x = 0; x < 16; x++) {
57 buf[0][x] = x;
58 }
59 y = sizeof (buf[1]);
60 DO(dh_encrypt_key (buf[0], 16, buf[1], &y, &yarrow_prng, find_prng ("yarrow"), find_hash ("md5"), &usera));
61 zeromem (buf[0], sizeof (buf[0]));
62 x = sizeof (buf[0]);
63 DO(dh_decrypt_key (buf[1], y, buf[0], &x, &usera));
64 if (x != 16) {
65 fprintf(stderr, "Failed (length)\n");
66 return 1;
67 }
68 for (x = 0; x < 16; x++)
69 if (buf[0][x] != x) {
70 fprintf(stderr, "Failed (contents)\n");
71 return 1;
72 }
73
74 /* test sign_hash */
75 for (x = 0; x < 16; x++) {
76 buf[0][x] = x;
77 }
78 x = sizeof (buf[1]);
79 DO(dh_sign_hash (buf[0], 16, buf[1], &x, &yarrow_prng , find_prng ("yarrow"), &usera));
80 DO(dh_verify_hash (buf[1], x, buf[0], 16, &stat, &usera));
81 buf[0][0] ^= 1;
82 DO(dh_verify_hash (buf[1], x, buf[0], 16, &stat2, &usera));
83 if (!(stat == 1 && stat2 == 0)) {
84 fprintf(stderr, "dh_sign/verify_hash %d %d", stat, stat2);
85 return 1;
86 }
87 dh_free (&usera);
88 return 0;
89 }
90
91 #else
92
93 int dh_tests(void)
94 {
95 fprintf(stderr, "NOP");
96 return 0;
97 }
98
99 #endif
100
101 /* $Source: /cvs/libtom/libtomcrypt/testprof/dh_tests.c,v $ */
102 /* $Revision: 1.5 $ */
103 /* $Date: 2005/05/21 12:51:25 $ */