aboutsummaryrefslogtreecommitdiff
path: root/sys/contrib/libsodium/test/default/secretbox_easy2.c
diff options
context:
space:
mode:
Diffstat (limited to 'sys/contrib/libsodium/test/default/secretbox_easy2.c')
-rw-r--r--sys/contrib/libsodium/test/default/secretbox_easy2.c72
1 files changed, 72 insertions, 0 deletions
diff --git a/sys/contrib/libsodium/test/default/secretbox_easy2.c b/sys/contrib/libsodium/test/default/secretbox_easy2.c
new file mode 100644
index 000000000000..7cacbd7aba15
--- /dev/null
+++ b/sys/contrib/libsodium/test/default/secretbox_easy2.c
@@ -0,0 +1,72 @@
+
+#define TEST_NAME "secretbox_easy2"
+#include "cmptest.h"
+
+int
+main(void)
+{
+ unsigned char *m;
+ unsigned char *m2;
+ unsigned char *c;
+ unsigned char *nonce;
+ unsigned char *k;
+ unsigned char *mac;
+ size_t mlen;
+ size_t i;
+
+ mlen = (size_t) randombytes_uniform((uint32_t) 10000) + 1U;
+ m = (unsigned char *) sodium_malloc(mlen);
+ m2 = (unsigned char *) sodium_malloc(mlen);
+ c = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES + mlen);
+ nonce = (unsigned char *) sodium_malloc(crypto_secretbox_NONCEBYTES);
+ k = (unsigned char *) sodium_malloc(crypto_secretbox_KEYBYTES);
+ mac = (unsigned char *) sodium_malloc(crypto_secretbox_MACBYTES);
+ crypto_secretbox_keygen(k);
+ randombytes_buf(m, mlen);
+ randombytes_buf(nonce, crypto_secretbox_NONCEBYTES);
+ crypto_secretbox_easy(c, m, (unsigned long long) mlen, nonce, k);
+ if (crypto_secretbox_open_easy(
+ m2, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce,
+ k) != 0) {
+ printf("crypto_secretbox_open_easy() failed\n");
+ }
+ printf("%d\n", memcmp(m, m2, mlen));
+
+ for (i = 0; i < mlen + crypto_secretbox_MACBYTES - 1; i++) {
+ if (crypto_secretbox_open_easy(m2, c, (unsigned long long) i, nonce,
+ k) == 0) {
+ printf("short open() should have failed\n");
+ return 1;
+ }
+ }
+ crypto_secretbox_detached(c, mac, m, (unsigned long long) mlen, nonce, k);
+ if (crypto_secretbox_open_detached(NULL, c, mac, (unsigned long long) mlen,
+ nonce, k) != 0) {
+ printf("crypto_secretbox_open_detached() with a NULL message pointer failed\n");
+ }
+ if (crypto_secretbox_open_detached(m2, c, mac, (unsigned long long) mlen,
+ nonce, k) != 0) {
+ printf("crypto_secretbox_open_detached() failed\n");
+ }
+ printf("%d\n", memcmp(m, m2, mlen));
+
+ memcpy(c, m, mlen);
+ crypto_secretbox_easy(c, c, (unsigned long long) mlen, nonce, k);
+ printf("%d\n", memcmp(m, c, mlen) == 0);
+ printf("%d\n", memcmp(m, c + crypto_secretbox_MACBYTES, mlen) == 0);
+ if (crypto_secretbox_open_easy(
+ c, c, (unsigned long long) mlen + crypto_secretbox_MACBYTES, nonce,
+ k) != 0) {
+ printf("crypto_secretbox_open_easy() failed\n");
+ }
+ printf("%d\n", memcmp(m, c, mlen));
+
+ sodium_free(m);
+ sodium_free(m2);
+ sodium_free(c);
+ sodium_free(nonce);
+ sodium_free(k);
+ sodium_free(mac);
+
+ return 0;
+}