From 3ef6719f47b734b12c0b11c725b7f12e3fb3c08a Mon Sep 17 00:00:00 2001 From: Uros Majstorovic Date: Tue, 23 May 2017 14:19:26 +0200 Subject: fs layout updated --- code/crypto/test/Makefile | 33 ------------------------- code/crypto/test/aead.c | 55 ----------------------------------------- code/crypto/test/aead_dec.c | 46 ---------------------------------- code/crypto/test/aead_enc.c | 55 ----------------------------------------- code/crypto/test/ed25519.c | 37 --------------------------- code/crypto/test/ed25519_open.c | 40 ------------------------------ code/crypto/test/ed25519_sign.c | 40 ------------------------------ 7 files changed, 306 deletions(-) delete mode 100644 code/crypto/test/Makefile delete mode 100644 code/crypto/test/aead.c delete mode 100644 code/crypto/test/aead_dec.c delete mode 100644 code/crypto/test/aead_enc.c delete mode 100644 code/crypto/test/ed25519.c delete mode 100644 code/crypto/test/ed25519_open.c delete mode 100644 code/crypto/test/ed25519_sign.c (limited to 'code/crypto/test') diff --git a/code/crypto/test/Makefile b/code/crypto/test/Makefile deleted file mode 100644 index b6a92f2..0000000 --- a/code/crypto/test/Makefile +++ /dev/null @@ -1,33 +0,0 @@ -CFLAGS=-I.. -I../include -O3 -aead_dep=../compat/explicit_bzero.o ../compat/timingsafe_memcmp.o ../compat/timingsafe_bcmp.o \ - ../chacha/chacha.o ../poly1305/poly1305.o ../curve25519/curve25519.o ../curve25519/curve25519-generic.o \ - ../sha/sha512.o ../e_chacha20poly1305.o -dsa_dep=../*/*.a - -%.o: %.c - $(CC) $(CFLAGS) -c $< - -all: aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open - -aead: aead.o - $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) - -aead_enc: aead_enc.o - $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) - -aead_dec: aead_dec.o - $(CC) $(LDFLAGS) -o $@ $< $(aead_dep) - -ed25519: ed25519.o - $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) - -ed25519_sign: ed25519_sign.o - $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) - -ed25519_open: ed25519_open.o - $(CC) $(LDFLAGS) -o $@ $< $(dsa_dep) - - -clean: - rm -f *.o - rm -f aead aead_enc aead_dec ed25519 ed25519_sign ed25519_open diff --git a/code/crypto/test/aead.c b/code/crypto/test/aead.c deleted file mode 100644 index a2e0da7..0000000 --- a/code/crypto/test/aead.c +++ /dev/null @@ -1,55 +0,0 @@ -#include -#include -#include -#include -#include - -#include -#include - -#define NONCE_LEN 8 -#define TAG_LEN 16 -#define KEY_LEN 32 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char in_msg[1024]; - unsigned char out_msg[1024]; - size_t in_msg_len; - size_t out_msg_len; - int rv; - unsigned char public1[KEY_LEN]; - unsigned char private1[KEY_LEN]; - unsigned char public2[KEY_LEN]; - unsigned char private2[KEY_LEN]; - unsigned char key1[KEY_LEN]; - unsigned char key2[KEY_LEN]; - unsigned char nonce[NONCE_LEN]; - - strcpy((char *)in_msg, "PERA JE CAR!"); - in_msg_len = strlen((char *)in_msg) + 1; - - v_rng(nonce, NONCE_LEN); - X25519_keypair(public1, private1, v_rng); - X25519_keypair(public2, private2, v_rng); - - X25519(key1, private1, public2); - rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key1, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0); - printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); - - memset(in_msg, 0, sizeof(in_msg)); - - X25519(key2, private2, public1); - rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key2, TAG_LEN, nonce, NONCE_LEN, out_msg, out_msg_len, NULL, 0); - printf("OPEN RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); - printf("MSG: %s\n", in_msg); -} \ No newline at end of file diff --git a/code/crypto/test/aead_dec.c b/code/crypto/test/aead_dec.c deleted file mode 100644 index 7deb587..0000000 --- a/code/crypto/test/aead_dec.c +++ /dev/null @@ -1,46 +0,0 @@ -#include -#include -#include -#include -#include - -#include -#include - -#define NONCE_LEN 8 -#define TAG_LEN 16 -#define KEY_LEN 32 -#define MSG_LEN 29 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char in_msg[1024]; - unsigned char out_msg[1024]; - size_t in_msg_len; - int rv; - unsigned char public[KEY_LEN]; - unsigned char private[KEY_LEN]; - unsigned char key[KEY_LEN]; - unsigned char nonce[NONCE_LEN]; - - int fd = open("msg.enc", O_RDONLY); - read(fd, private, KEY_LEN); - read(fd, public, KEY_LEN); - read(fd, nonce, NONCE_LEN); - read(fd, out_msg, MSG_LEN); - close(fd); - - X25519(key, private, public); - rv = aead_chacha20_poly1305_open(in_msg, &in_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, out_msg, MSG_LEN, NULL, 0); - printf("OPEN RV:%d ILEN:%lu OLEN:%d\n", rv, in_msg_len, MSG_LEN); - printf("MSG: %s\n", in_msg); -} \ No newline at end of file diff --git a/code/crypto/test/aead_enc.c b/code/crypto/test/aead_enc.c deleted file mode 100644 index a103490..0000000 --- a/code/crypto/test/aead_enc.c +++ /dev/null @@ -1,55 +0,0 @@ -#include -#include -#include -#include -#include - -#include -#include - -#define NONCE_LEN 8 -#define TAG_LEN 16 -#define KEY_LEN 32 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char in_msg[1024]; - unsigned char out_msg[1024]; - size_t in_msg_len; - size_t out_msg_len; - int rv; - unsigned char public1[KEY_LEN]; - unsigned char private1[KEY_LEN]; - unsigned char public2[KEY_LEN]; - unsigned char private2[KEY_LEN]; - unsigned char key[KEY_LEN]; - unsigned char nonce[NONCE_LEN]; - - strcpy((char *)in_msg, "PERA JE CAR!"); - in_msg_len = strlen((char *)in_msg) + 1; - - v_rng(nonce, NONCE_LEN); - X25519_keypair(public1, private1, v_rng); - X25519_keypair(public2, private2, v_rng); - - X25519(key, private1, public2); - rv = aead_chacha20_poly1305_seal(out_msg, &out_msg_len, 1024, key, TAG_LEN, nonce, NONCE_LEN, in_msg, in_msg_len, NULL, 0); - printf("SEAL RV:%d ILEN:%lu OLEN:%lu\n", rv, in_msg_len, out_msg_len); - - unlink("msg.enc"); - int fd = open("msg.enc", O_WRONLY | O_CREAT); - write(fd, private2, KEY_LEN); - write(fd, public1, KEY_LEN); - write(fd, nonce, NONCE_LEN); - write(fd, out_msg, out_msg_len); - close(fd); -} \ No newline at end of file diff --git a/code/crypto/test/ed25519.c b/code/crypto/test/ed25519.c deleted file mode 100644 index 21334cb..0000000 --- a/code/crypto/test/ed25519.c +++ /dev/null @@ -1,37 +0,0 @@ -#include -#include -#include -#include -#include - -#include - -#define KEY_LEN 32 -#define SIG_LEN 64 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char msg[1024]; - size_t msg_len; - int rv; - unsigned char public[KEY_LEN]; - unsigned char private[KEY_LEN * 2]; - unsigned char signature[SIG_LEN]; - - strcpy((char *)msg, "PERA JE CAR!"); - msg_len = strlen((char *)msg) + 1; - - ED25519_keypair(public, private, v_rng); - ED25519_sign(signature, msg, msg_len, private); - rv = ED25519_verify(msg, msg_len, signature, public); - printf("OPEN rv:%d\n", rv); -} \ No newline at end of file diff --git a/code/crypto/test/ed25519_open.c b/code/crypto/test/ed25519_open.c deleted file mode 100644 index 66f32f5..0000000 --- a/code/crypto/test/ed25519_open.c +++ /dev/null @@ -1,40 +0,0 @@ -#include -#include -#include -#include -#include - -#include - -#define KEY_LEN 32 -#define SIG_LEN 64 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char msg[1024]; - size_t msg_len; - int rv; - unsigned char public[KEY_LEN]; - unsigned char private[KEY_LEN * 2]; - unsigned char signature[SIG_LEN]; - - strcpy((char *)msg, "PERA JE CAR!"); - msg_len = strlen((char *)msg) + 1; - - int fd = open("msg.sig", O_RDONLY); - read(fd, public, KEY_LEN); - read(fd, signature, SIG_LEN); - close(fd); - - rv = ED25519_verify(msg, msg_len, signature, public); - printf("OPEN rv:%d\n", rv); -} \ No newline at end of file diff --git a/code/crypto/test/ed25519_sign.c b/code/crypto/test/ed25519_sign.c deleted file mode 100644 index da098bd..0000000 --- a/code/crypto/test/ed25519_sign.c +++ /dev/null @@ -1,40 +0,0 @@ -#include -#include -#include -#include -#include - -#include - -#define KEY_LEN 32 -#define SIG_LEN 64 - -static int v_rng(void *buf, size_t bufsize) { - int fd; - - if((fd = open("/dev/urandom", O_RDONLY)) < 0) return -1; - size_t nb = read(fd, buf, bufsize); - close(fd); - if (nb != bufsize) return -1; - return 0; -} - -int main(int argc, char *argv[]) { - unsigned char msg[1024]; - size_t msg_len; - unsigned char public[KEY_LEN]; - unsigned char private[KEY_LEN * 2]; - unsigned char signature[SIG_LEN]; - - strcpy((char *)msg, "PERA JE CAR!"); - msg_len = strlen((char *)msg) + 1; - - ED25519_keypair(public, private, v_rng); - ED25519_sign(signature, msg, msg_len, private); - - unlink("msg.sig"); - int fd = open("msg.sig", O_WRONLY | O_CREAT); - write(fd, public, KEY_LEN); - write(fd, signature, SIG_LEN); - close(fd); -} \ No newline at end of file -- cgit v1.2.3