From 25de5e761daab8b897a4f09ff8503e6f43c299f9 Mon Sep 17 00:00:00 2001 From: Uros Majstorovic Date: Wed, 3 May 2017 21:10:08 +0200 Subject: initial commit --- code/crypto/test/Makefile | 33 +++++++++++++++++++++++++ code/crypto/test/aead.c | 55 +++++++++++++++++++++++++++++++++++++++++ code/crypto/test/aead_dec.c | 46 ++++++++++++++++++++++++++++++++++ code/crypto/test/aead_enc.c | 55 +++++++++++++++++++++++++++++++++++++++++ code/crypto/test/ed25519.c | 37 +++++++++++++++++++++++++++ code/crypto/test/ed25519_open.c | 40 ++++++++++++++++++++++++++++++ code/crypto/test/ed25519_sign.c | 40 ++++++++++++++++++++++++++++++ 7 files changed, 306 insertions(+) create mode 100644 code/crypto/test/Makefile create mode 100644 code/crypto/test/aead.c create mode 100644 code/crypto/test/aead_dec.c create mode 100644 code/crypto/test/aead_enc.c create mode 100644 code/crypto/test/ed25519.c create mode 100644 code/crypto/test/ed25519_open.c create mode 100644 code/crypto/test/ed25519_sign.c (limited to 'code/crypto/test') diff --git a/code/crypto/test/Makefile b/code/crypto/test/Makefile new file mode 100644 index 0000000..b6a92f2 --- /dev/null +++ b/code/crypto/test/Makefile @@ -0,0 +1,33 @@ +CFLAGS=-I.. -I../include -O3 +aead_dep=../compat/explicit_bzero.o ../compat/timingsafe_memcmp.o ../compat/timingsafe_bcmp.o \ + ../chacha/chacha.o ../poly1305/poly1305.o ../curve25519/curve25519.o ../curve25519/curve25519-generic.o \ + ../sha/sha512.o ../e_chacha20poly1305.o +dsa_dep=../*/*.a + +%.o: %.c + $(CC) $(CFLAGS) -c $< + +all: aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open + +aead: aead.o + $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) + +aead_enc: aead_enc.o + $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) + +aead_dec: aead_dec.o + $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) + +ed25519: ed25519.o + $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) + +ed25519_sign: ed25519_sign.o + $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) + +ed25519_open: ed25519_open.o + $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) + + +clean: + rm -f *.o + rm -f aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open diff --git a/code/crypto/test/aead.c b/code/crypto/test/aead.c new file mode 100644 index 0000000..a2e0da7 --- /dev/null +++ b/code/crypto/test/aead.c @@ -0,0 +1,55 @@ +#include +#include +#include +#include +#include + +#include +#include + +#define NONCE_LEN 8 +#define TAG_LEN 16 +#define KEY_LEN 32 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char in_msg[1024]; + unsigned char out_msg[1024]; + size_t in_msg_len; + size_t out_msg_len; + int rv; + unsigned char public1[KEY_LEN]; + unsigned char private1[KEY_LEN]; + unsigned char public2[KEY_LEN]; + unsigned char private2[KEY_LEN]; + unsigned char key1[KEY_LEN]; + unsigned char key2[KEY_LEN]; + unsigned char nonce[NONCE_LEN]; + + strcpy((char *)in_msg, "PERA JE CAR!"); + in_msg_len = strlen((char *)in_msg) + 1; + + v_rng(nonce, NONCE_LEN); + X25519_keypair(public1, private1, v_rng); + X25519_keypair(public2, private2, v_rng); + + X25519(key1, private1, public2); + rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key1, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0); + printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); + + memset(in_msg, 0, sizeof(in_msg)); + + X25519(key2, private2, public1); + rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key2, TAG_LEN, nonce, NONCE_LEN, out_msg, out_msg_len, NULL, 0); + printf("OPEN RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); + printf("MSG: %s\n", in_msg); +} \ No newline at end of file diff --git a/code/crypto/test/aead_dec.c b/code/crypto/test/aead_dec.c new file mode 100644 index 0000000..7deb587 --- /dev/null +++ b/code/crypto/test/aead_dec.c @@ -0,0 +1,46 @@ +#include +#include +#include +#include +#include + +#include +#include + +#define NONCE_LEN 8 +#define TAG_LEN 16 +#define KEY_LEN 32 +#define MSG_LEN 29 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char in_msg[1024]; + unsigned char out_msg[1024]; + size_t in_msg_len; + int rv; + unsigned char public[KEY_LEN]; + unsigned char private[KEY_LEN]; + unsigned char key[KEY_LEN]; + unsigned char nonce[NONCE_LEN]; + + int fd = open("msg.enc", O_RDONLY); + read(fd, private, KEY_LEN); + read(fd, public, KEY_LEN); + read(fd, nonce, NONCE_LEN); + read(fd, out_msg, MSG_LEN); + close(fd); + + X25519(key, private, public); + rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, out_msg, MSG_LEN, NULL, 0); + printf("OPEN RV:%d ILEN:%lu OLEN:%d\n", rv, in_msg_len, MSG_LEN); + printf("MSG: %s\n", in_msg); +} \ No newline at end of file diff --git a/code/crypto/test/aead_enc.c b/code/crypto/test/aead_enc.c new file mode 100644 index 0000000..a103490 --- /dev/null +++ b/code/crypto/test/aead_enc.c @@ -0,0 +1,55 @@ +#include +#include +#include +#include +#include + +#include +#include + +#define NONCE_LEN 8 +#define TAG_LEN 16 +#define KEY_LEN 32 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char in_msg[1024]; + unsigned char out_msg[1024]; + size_t in_msg_len; + size_t out_msg_len; + int rv; + unsigned char public1[KEY_LEN]; + unsigned char private1[KEY_LEN]; + unsigned char public2[KEY_LEN]; + unsigned char private2[KEY_LEN]; + unsigned char key[KEY_LEN]; + unsigned char nonce[NONCE_LEN]; + + strcpy((char *)in_msg, "PERA JE CAR!"); + in_msg_len = strlen((char *)in_msg) + 1; + + v_rng(nonce, NONCE_LEN); + X25519_keypair(public1, private1, v_rng); + X25519_keypair(public2, private2, v_rng); + + X25519(key, private1, public2); + rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0); + printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); + + unlink("msg.enc"); + int fd = open("msg.enc", O_WRONLY | O_CREAT); + write(fd, private2, KEY_LEN); + write(fd, public1, KEY_LEN); + write(fd, nonce, NONCE_LEN); + write(fd, out_msg, out_msg_len); + close(fd); +} \ No newline at end of file diff --git a/code/crypto/test/ed25519.c b/code/crypto/test/ed25519.c new file mode 100644 index 0000000..21334cb --- /dev/null +++ b/code/crypto/test/ed25519.c @@ -0,0 +1,37 @@ +#include +#include +#include +#include +#include + +#include + +#define KEY_LEN 32 +#define SIG_LEN 64 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char msg[1024]; + size_t msg_len; + int rv; + unsigned char public[KEY_LEN]; + unsigned char private[KEY_LEN * 2]; + unsigned char signature[SIG_LEN]; + + strcpy((char *)msg, "PERA JE CAR!"); + msg_len = strlen((char *)msg) + 1; + + ED25519_keypair(public, private, v_rng); + ED25519_sign(signature, msg, msg_len, private); + rv = ED25519_verify(msg, msg_len, signature, public); + printf("OPEN rv:%d\n", rv); +} \ No newline at end of file diff --git a/code/crypto/test/ed25519_open.c b/code/crypto/test/ed25519_open.c new file mode 100644 index 0000000..66f32f5 --- /dev/null +++ b/code/crypto/test/ed25519_open.c @@ -0,0 +1,40 @@ +#include +#include +#include +#include +#include + +#include + +#define KEY_LEN 32 +#define SIG_LEN 64 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char msg[1024]; + size_t msg_len; + int rv; + unsigned char public[KEY_LEN]; + unsigned char private[KEY_LEN * 2]; + unsigned char signature[SIG_LEN]; + + strcpy((char *)msg, "PERA JE CAR!"); + msg_len = strlen((char *)msg) + 1; + + int fd = open("msg.sig", O_RDONLY); + read(fd, public, KEY_LEN); + read(fd, signature, SIG_LEN); + close(fd); + + rv = ED25519_verify(msg, msg_len, signature, public); + printf("OPEN rv:%d\n", rv); +} \ No newline at end of file diff --git a/code/crypto/test/ed25519_sign.c b/code/crypto/test/ed25519_sign.c new file mode 100644 index 0000000..da098bd --- /dev/null +++ b/code/crypto/test/ed25519_sign.c @@ -0,0 +1,40 @@ +#include +#include +#include +#include +#include + +#include + +#define KEY_LEN 32 +#define SIG_LEN 64 + +static int v_rng(void *buf, size_t bufsize) { + int fd; + + if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; + size_t nb = read(fd, buf, bufsize); + close(fd); + if (nb != bufsize) return -1; + return 0; +} + +int main(int argc, char *argv[]) { + unsigned char msg[1024]; + size_t msg_len; + unsigned char public[KEY_LEN]; + unsigned char private[KEY_LEN * 2]; + unsigned char signature[SIG_LEN]; + + strcpy((char *)msg, "PERA JE CAR!"); + msg_len = strlen((char *)msg) + 1; + + ED25519_keypair(public, private, v_rng); + ED25519_sign(signature, msg, msg_len, private); + + unlink("msg.sig"); + int fd = open("msg.sig", O_WRONLY | O_CREAT); + write(fd, public, KEY_LEN); + write(fd, signature, SIG_LEN); + close(fd); +} \ No newline at end of file -- cgit v1.2.3