summaryrefslogtreecommitdiff
path: root/code/ecp/crypto/test
diff options
context:
space:
mode:
authorUros Majstorovic <majstor@majstor.org>2018-01-11 21:28:22 +0100
committerUros Majstorovic <majstor@majstor.org>2018-01-11 21:28:22 +0100
commit0d0e9facfcea3cf96da3b63285865182fdd5477e (patch)
treecca42e7aab184cad981c794073a4376aa2616193 /code/ecp/crypto/test
parent05e11f491b84a110b9ca08612df370b91e9bdcbc (diff)
refatoring dirs
Diffstat (limited to 'code/ecp/crypto/test')
-rw-r--r--code/ecp/crypto/test/Makefile37
-rw-r--r--code/ecp/crypto/test/aead.c55
-rw-r--r--code/ecp/crypto/test/aead_dec.c46
-rw-r--r--code/ecp/crypto/test/aead_enc.c55
-rw-r--r--code/ecp/crypto/test/ed25519.c37
-rw-r--r--code/ecp/crypto/test/ed25519_open.c40
-rw-r--r--code/ecp/crypto/test/ed25519_sign.c40
7 files changed, 310 insertions, 0 deletions
diff --git a/code/ecp/crypto/test/Makefile b/code/ecp/crypto/test/Makefile
new file mode 100644
index 0000000..2a5fa3e
--- /dev/null
+++ b/code/ecp/crypto/test/Makefile
@@ -0,0 +1,37 @@
+include ../../../Makefile.platform
+CFLAGS=$(CFLAGS_PL) -I.. -I../include
+LDFLAGS=$(LDFLAGS_PL)
+
+aead_dep=../compat/explicit_bzero.o ../compat/timingsafe_memcmp.o ../compat/timingsafe_bcmp.o \
+ ../chacha/chacha.o ../poly1305/poly1305.o ../curve25519/curve25519.o ../curve25519/curve25519-generic.o \
+ ../sha/sha512.o ../e_chacha20poly1305.o
+dsa_dep=../*/*.a
+
+
+%.o: %.c
+ $(CC) $(CFLAGS) -c $<
+
+all: aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open
+
+aead: aead.o
+ $(CC) $(LDFLAGS) -o $@ $< $(aead_dep)
+
+aead_enc: aead_enc.o
+ $(CC) $(LDFLAGS) -o $@ $< $(aead_dep)
+
+aead_dec: aead_dec.o
+ $(CC) $(LDFLAGS) -o $@ $< $(aead_dep)
+
+ed25519: ed25519.o
+ $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep)
+
+ed25519_sign: ed25519_sign.o
+ $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep)
+
+ed25519_open: ed25519_open.o
+ $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep)
+
+
+clean:
+ rm -f *.o
+ rm -f aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open
diff --git a/code/ecp/crypto/test/aead.c b/code/ecp/crypto/test/aead.c
new file mode 100644
index 0000000..a2e0da7
--- /dev/null
+++ b/code/ecp/crypto/test/aead.c
@@ -0,0 +1,55 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <crypto.h>
+#include <curve25519.h>
+
+#define NONCE_LEN 8
+#define TAG_LEN 16
+#define KEY_LEN 32
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char in_msg[1024];
+ unsigned char out_msg[1024];
+ size_t in_msg_len;
+ size_t out_msg_len;
+ int rv;
+ unsigned char public1[KEY_LEN];
+ unsigned char private1[KEY_LEN];
+ unsigned char public2[KEY_LEN];
+ unsigned char private2[KEY_LEN];
+ unsigned char key1[KEY_LEN];
+ unsigned char key2[KEY_LEN];
+ unsigned char nonce[NONCE_LEN];
+
+ strcpy((char *)in_msg, "PERA JE CAR!");
+ in_msg_len = strlen((char *)in_msg) + 1;
+
+ v_rng(nonce, NONCE_LEN);
+ X25519_keypair(public1, private1, v_rng);
+ X25519_keypair(public2, private2, v_rng);
+
+ X25519(key1, private1, public2);
+ rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key1, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0);
+ printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len);
+
+ memset(in_msg, 0, sizeof(in_msg));
+
+ X25519(key2, private2, public1);
+ rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key2, TAG_LEN, nonce, NONCE_LEN, out_msg, out_msg_len, NULL, 0);
+ printf("OPEN RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len);
+ printf("MSG: %s\n", in_msg);
+} \ No newline at end of file
diff --git a/code/ecp/crypto/test/aead_dec.c b/code/ecp/crypto/test/aead_dec.c
new file mode 100644
index 0000000..7deb587
--- /dev/null
+++ b/code/ecp/crypto/test/aead_dec.c
@@ -0,0 +1,46 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <crypto.h>
+#include <curve25519.h>
+
+#define NONCE_LEN 8
+#define TAG_LEN 16
+#define KEY_LEN 32
+#define MSG_LEN 29
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char in_msg[1024];
+ unsigned char out_msg[1024];
+ size_t in_msg_len;
+ int rv;
+ unsigned char public[KEY_LEN];
+ unsigned char private[KEY_LEN];
+ unsigned char key[KEY_LEN];
+ unsigned char nonce[NONCE_LEN];
+
+ int fd = open("msg.enc", O_RDONLY);
+ read(fd, private, KEY_LEN);
+ read(fd, public, KEY_LEN);
+ read(fd, nonce, NONCE_LEN);
+ read(fd, out_msg, MSG_LEN);
+ close(fd);
+
+ X25519(key, private, public);
+ rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, out_msg, MSG_LEN, NULL, 0);
+ printf("OPEN RV:%d ILEN:%lu OLEN:%d\n", rv, in_msg_len, MSG_LEN);
+ printf("MSG: %s\n", in_msg);
+} \ No newline at end of file
diff --git a/code/ecp/crypto/test/aead_enc.c b/code/ecp/crypto/test/aead_enc.c
new file mode 100644
index 0000000..a103490
--- /dev/null
+++ b/code/ecp/crypto/test/aead_enc.c
@@ -0,0 +1,55 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <crypto.h>
+#include <curve25519.h>
+
+#define NONCE_LEN 8
+#define TAG_LEN 16
+#define KEY_LEN 32
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char in_msg[1024];
+ unsigned char out_msg[1024];
+ size_t in_msg_len;
+ size_t out_msg_len;
+ int rv;
+ unsigned char public1[KEY_LEN];
+ unsigned char private1[KEY_LEN];
+ unsigned char public2[KEY_LEN];
+ unsigned char private2[KEY_LEN];
+ unsigned char key[KEY_LEN];
+ unsigned char nonce[NONCE_LEN];
+
+ strcpy((char *)in_msg, "PERA JE CAR!");
+ in_msg_len = strlen((char *)in_msg) + 1;
+
+ v_rng(nonce, NONCE_LEN);
+ X25519_keypair(public1, private1, v_rng);
+ X25519_keypair(public2, private2, v_rng);
+
+ X25519(key, private1, public2);
+ rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0);
+ printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len);
+
+ unlink("msg.enc");
+ int fd = open("msg.enc", O_WRONLY | O_CREAT);
+ write(fd, private2, KEY_LEN);
+ write(fd, public1, KEY_LEN);
+ write(fd, nonce, NONCE_LEN);
+ write(fd, out_msg, out_msg_len);
+ close(fd);
+} \ No newline at end of file
diff --git a/code/ecp/crypto/test/ed25519.c b/code/ecp/crypto/test/ed25519.c
new file mode 100644
index 0000000..21334cb
--- /dev/null
+++ b/code/ecp/crypto/test/ed25519.c
@@ -0,0 +1,37 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <curve25519.h>
+
+#define KEY_LEN 32
+#define SIG_LEN 64
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char msg[1024];
+ size_t msg_len;
+ int rv;
+ unsigned char public[KEY_LEN];
+ unsigned char private[KEY_LEN * 2];
+ unsigned char signature[SIG_LEN];
+
+ strcpy((char *)msg, "PERA JE CAR!");
+ msg_len = strlen((char *)msg) + 1;
+
+ ED25519_keypair(public, private, v_rng);
+ ED25519_sign(signature, msg, msg_len, private);
+ rv = ED25519_verify(msg, msg_len, signature, public);
+ printf("OPEN rv:%d\n", rv);
+} \ No newline at end of file
diff --git a/code/ecp/crypto/test/ed25519_open.c b/code/ecp/crypto/test/ed25519_open.c
new file mode 100644
index 0000000..66f32f5
--- /dev/null
+++ b/code/ecp/crypto/test/ed25519_open.c
@@ -0,0 +1,40 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <curve25519.h>
+
+#define KEY_LEN 32
+#define SIG_LEN 64
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char msg[1024];
+ size_t msg_len;
+ int rv;
+ unsigned char public[KEY_LEN];
+ unsigned char private[KEY_LEN * 2];
+ unsigned char signature[SIG_LEN];
+
+ strcpy((char *)msg, "PERA JE CAR!");
+ msg_len = strlen((char *)msg) + 1;
+
+ int fd = open("msg.sig", O_RDONLY);
+ read(fd, public, KEY_LEN);
+ read(fd, signature, SIG_LEN);
+ close(fd);
+
+ rv = ED25519_verify(msg, msg_len, signature, public);
+ printf("OPEN rv:%d\n", rv);
+} \ No newline at end of file
diff --git a/code/ecp/crypto/test/ed25519_sign.c b/code/ecp/crypto/test/ed25519_sign.c
new file mode 100644
index 0000000..da098bd
--- /dev/null
+++ b/code/ecp/crypto/test/ed25519_sign.c
@@ -0,0 +1,40 @@
+#include <string.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <unistd.h>
+
+#include <curve25519.h>
+
+#define KEY_LEN 32
+#define SIG_LEN 64
+
+static int v_rng(void *buf, size_t bufsize) {
+ int fd;
+
+ if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
+ size_t nb = read(fd, buf, bufsize);
+ close(fd);
+ if (nb != bufsize) return -1;
+ return 0;
+}
+
+int main(int argc, char *argv[]) {
+ unsigned char msg[1024];
+ size_t msg_len;
+ unsigned char public[KEY_LEN];
+ unsigned char private[KEY_LEN * 2];
+ unsigned char signature[SIG_LEN];
+
+ strcpy((char *)msg, "PERA JE CAR!");
+ msg_len = strlen((char *)msg) + 1;
+
+ ED25519_keypair(public, private, v_rng);
+ ED25519_sign(signature, msg, msg_len, private);
+
+ unlink("msg.sig");
+ int fd = open("msg.sig", O_WRONLY | O_CREAT);
+ write(fd, public, KEY_LEN);
+ write(fd, signature, SIG_LEN);
+ close(fd);
+} \ No newline at end of file