Blame SOURCES/libsodium-1.0.18/test/default/metamorphic.c

ca16be
ca16be
#define TEST_NAME "metamorphic"
ca16be
#include "cmptest.h"
ca16be
ca16be
#define MAXLEN 512
ca16be
#define MAX_ITER 1000
ca16be
ca16be
static void
ca16be
mm_generichash(void)
ca16be
{
ca16be
    crypto_generichash_state st;
ca16be
    unsigned char *h, *h2;
ca16be
    unsigned char *k;
ca16be
    unsigned char *m;
ca16be
    size_t         hlen;
ca16be
    size_t         klen;
ca16be
    size_t         mlen;
ca16be
    size_t         l1, l2;
ca16be
    int            i;
ca16be
ca16be
    for (i = 0; i < MAX_ITER; i++) {
ca16be
        mlen = randombytes_uniform(MAXLEN);
ca16be
        m = (unsigned char *) sodium_malloc(mlen);
ca16be
        klen = randombytes_uniform(crypto_generichash_KEYBYTES_MAX -
ca16be
                                   crypto_generichash_KEYBYTES_MIN + 1U)
ca16be
            + crypto_generichash_KEYBYTES_MIN;
ca16be
        k = (unsigned char *) sodium_malloc(klen);
ca16be
        hlen = randombytes_uniform(crypto_generichash_BYTES_MAX -
ca16be
                                   crypto_generichash_BYTES_MIN + 1U)
ca16be
            + crypto_generichash_BYTES_MIN;
ca16be
        h = (unsigned char *) sodium_malloc(hlen);
ca16be
        h2 = (unsigned char *) sodium_malloc(hlen);
ca16be
ca16be
        randombytes_buf(k, klen);
ca16be
        randombytes_buf(m, mlen);
ca16be
ca16be
        crypto_generichash_init(&st, k, klen, hlen);
ca16be
        l1 = randombytes_uniform((uint32_t) mlen);
ca16be
        l2 = randombytes_uniform((uint32_t) (mlen - l1));
ca16be
        crypto_generichash_update(&st, m, l1);
ca16be
        crypto_generichash_update(&st, m + l1, l2);
ca16be
        crypto_generichash_update(&st, m + l1 + l2, mlen - l1 - l2);
ca16be
        crypto_generichash_final(&st, h, hlen);
ca16be
ca16be
        crypto_generichash(h2, hlen, m, mlen, k, klen);
ca16be
ca16be
        assert(memcmp(h, h2, hlen) == 0);
ca16be
ca16be
        sodium_free(h2);
ca16be
        sodium_free(h);
ca16be
        sodium_free(k);
ca16be
        sodium_free(m);
ca16be
    }
ca16be
}
ca16be
ca16be
static void
ca16be
mm_onetimeauth(void)
ca16be
{
ca16be
    crypto_onetimeauth_state st;
ca16be
    unsigned char *h, *h2;
ca16be
    unsigned char *k;
ca16be
    unsigned char *m;
ca16be
    size_t         mlen;
ca16be
    size_t         l1, l2;
ca16be
    int            i;
ca16be
ca16be
    for (i = 0; i < MAX_ITER; i++) {
ca16be
        mlen = randombytes_uniform(MAXLEN);
ca16be
        m = (unsigned char *) sodium_malloc(mlen);
ca16be
        k = (unsigned char *) sodium_malloc(crypto_onetimeauth_KEYBYTES);
ca16be
        h = (unsigned char *) sodium_malloc(crypto_onetimeauth_BYTES);
ca16be
        h2 = (unsigned char *) sodium_malloc(crypto_onetimeauth_BYTES);
ca16be
ca16be
        crypto_onetimeauth_keygen(k);
ca16be
        randombytes_buf(m, mlen);
ca16be
ca16be
        crypto_onetimeauth_init(&st, k);
ca16be
        l1 = randombytes_uniform((uint32_t) mlen);
ca16be
        l2 = randombytes_uniform((uint32_t) (mlen - l1));
ca16be
        crypto_onetimeauth_update(&st, m, l1);
ca16be
        crypto_onetimeauth_update(&st, m + l1, l2);
ca16be
        crypto_onetimeauth_update(&st, m + l1 + l2, mlen - l1 - l2);
ca16be
        crypto_onetimeauth_final(&st, h);
ca16be
ca16be
        crypto_onetimeauth(h2, m, mlen, k);
ca16be
ca16be
        assert(memcmp(h, h2, crypto_onetimeauth_BYTES) == 0);
ca16be
ca16be
        sodium_free(h2);
ca16be
        sodium_free(h);
ca16be
        sodium_free(k);
ca16be
        sodium_free(m);
ca16be
    }
ca16be
}
ca16be
ca16be
static void
ca16be
mm_hmacsha256(void)
ca16be
{
ca16be
    crypto_auth_hmacsha256_state st;
ca16be
    unsigned char *h, *h2;
ca16be
    unsigned char *k;
ca16be
    unsigned char *m;
ca16be
    size_t         mlen;
ca16be
    size_t         l1, l2;
ca16be
    int            i;
ca16be
ca16be
    for (i = 0; i < MAX_ITER; i++) {
ca16be
        mlen = randombytes_uniform(MAXLEN);
ca16be
        m = (unsigned char *) sodium_malloc(mlen);
ca16be
        k = (unsigned char *) sodium_malloc(crypto_auth_hmacsha256_KEYBYTES);
ca16be
        h = (unsigned char *) sodium_malloc(crypto_auth_hmacsha256_BYTES);
ca16be
        h2 = (unsigned char *) sodium_malloc(crypto_auth_hmacsha256_BYTES);
ca16be
ca16be
        crypto_auth_hmacsha256_keygen(k);
ca16be
        randombytes_buf(m, mlen);
ca16be
ca16be
        crypto_auth_hmacsha256_init(&st, k, crypto_auth_hmacsha256_KEYBYTES);
ca16be
        l1 = randombytes_uniform((uint32_t) mlen);
ca16be
        l2 = randombytes_uniform((uint32_t) (mlen - l1));
ca16be
        crypto_auth_hmacsha256_update(&st, m, l1);
ca16be
        crypto_auth_hmacsha256_update(&st, m + l1, l2);
ca16be
        crypto_auth_hmacsha256_update(&st, m + l1 + l2, mlen - l1 - l2);
ca16be
        crypto_auth_hmacsha256_final(&st, h);
ca16be
ca16be
        crypto_auth_hmacsha256(h2, m, mlen, k);
ca16be
ca16be
        assert(memcmp(h, h2, crypto_auth_hmacsha256_BYTES) == 0);
ca16be
ca16be
        sodium_free(h2);
ca16be
        sodium_free(h);
ca16be
        sodium_free(k);
ca16be
        sodium_free(m);
ca16be
    }
ca16be
}
ca16be
ca16be
static void
ca16be
mm_hmacsha512(void)
ca16be
{
ca16be
    crypto_auth_hmacsha512_state st;
ca16be
    unsigned char *h, *h2;
ca16be
    unsigned char *k;
ca16be
    unsigned char *m;
ca16be
    size_t         mlen;
ca16be
    size_t         l1, l2;
ca16be
    int            i;
ca16be
ca16be
    for (i = 0; i < MAX_ITER; i++) {
ca16be
        mlen = randombytes_uniform(MAXLEN);
ca16be
        m = (unsigned char *) sodium_malloc(mlen);
ca16be
        k = (unsigned char *) sodium_malloc(crypto_auth_hmacsha512_KEYBYTES);
ca16be
        h = (unsigned char *) sodium_malloc(crypto_auth_hmacsha512_BYTES);
ca16be
        h2 = (unsigned char *) sodium_malloc(crypto_auth_hmacsha512_BYTES);
ca16be
ca16be
        crypto_auth_hmacsha512_keygen(k);
ca16be
        randombytes_buf(m, mlen);
ca16be
ca16be
        crypto_auth_hmacsha512_init(&st, k, crypto_auth_hmacsha512_KEYBYTES);
ca16be
        l1 = randombytes_uniform((uint32_t) mlen);
ca16be
        l2 = randombytes_uniform((uint32_t) (mlen - l1));
ca16be
        crypto_auth_hmacsha512_update(&st, m, l1);
ca16be
        crypto_auth_hmacsha512_update(&st, m + l1, l2);
ca16be
        crypto_auth_hmacsha512_update(&st, m + l1 + l2, mlen - l1 - l2);
ca16be
        crypto_auth_hmacsha512_final(&st, h);
ca16be
ca16be
        crypto_auth_hmacsha512(h2, m, mlen, k);
ca16be
ca16be
        assert(memcmp(h, h2, crypto_auth_hmacsha512_BYTES) == 0);
ca16be
ca16be
        sodium_free(h2);
ca16be
        sodium_free(h);
ca16be
        sodium_free(k);
ca16be
        sodium_free(m);
ca16be
    }
ca16be
}
ca16be
ca16be
int
ca16be
main(void)
ca16be
{
ca16be
    mm_generichash();
ca16be
    mm_onetimeauth();
ca16be
    mm_hmacsha256();
ca16be
    mm_hmacsha512();
ca16be
ca16be
    printf("OK\n");
ca16be
ca16be
    return 0;
ca16be
}