summaryrefslogtreecommitdiff
path: root/ecp/src/ecp/crypto/test/aead.c
diff options
context:
space:
mode:
Diffstat (limited to 'ecp/src/ecp/crypto/test/aead.c')
-rw-r--r--ecp/src/ecp/crypto/test/aead.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/ecp/src/ecp/crypto/test/aead.c b/ecp/src/ecp/crypto/test/aead.c
index a2e0da7..6ba0267 100644
--- a/ecp/src/ecp/crypto/test/aead.c
+++ b/ecp/src/ecp/crypto/test/aead.c
@@ -5,15 +5,15 @@
#include <unistd.h>
#include <crypto.h>
-#include <curve25519.h>
+#include <openssl/curve25519.h>
-#define NONCE_LEN 8
+#define NONCE_LEN 12
#define TAG_LEN 16
#define KEY_LEN 32
static int v_rng(void *buf, size_t bufsize) {
int fd;
-
+
if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1;
size_t nb = read(fd, buf, bufsize);
close(fd);
@@ -39,17 +39,17 @@ int main(int argc, char *argv[]) {
in_msg_len = strlen((char *)in_msg) + 1;
v_rng(nonce, NONCE_LEN);
- X25519_keypair(public1, private1, v_rng);
- X25519_keypair(public2, private2, v_rng);
-
+ X25519_keypair(public1, private1);
+ X25519_keypair(public2, private2);
+
X25519(key1, private1, public2);
- rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key1, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0);
+ rv = aead_chacha20_poly1305_seal(key1, TAG_LEN, out_msg, &out_msg_len, 1024, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0);
printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len);
memset(in_msg, 0, sizeof(in_msg));
X25519(key2, private2, public1);
- rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key2, TAG_LEN, nonce, NONCE_LEN, out_msg, out_msg_len, NULL, 0);
- printf("OPEN RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len);
+ rv = aead_chacha20_poly1305_open(key2, TAG_LEN, in_msg, &in_msg_len, 1024, nonce, NONCE_LEN, out_msg, out_msg_len, NULL, 0);
+ printf("OPEN RV:%d ILEN:%lu OLEN:%lu\n", rv, out_msg_len, in_msg_len);
printf("MSG: %s\n", in_msg);
} \ No newline at end of file