mirror of
https://github.com/MariaDB/server.git
synced 2025-01-16 12:02:42 +01:00
e0a03ca30a
various ed25519/ref10 api simplifications for our specific use case
55 lines
2 KiB
C
55 lines
2 KiB
C
/*
|
|
Copyright (c) 2017, MariaDB
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
|
|
|
|
#include <tap.h>
|
|
#include <m_string.h>
|
|
#include "common.h"
|
|
|
|
int main()
|
|
{
|
|
uchar pk[CRYPTO_PUBLICKEYBYTES];
|
|
uchar foobar_pk[CRYPTO_PUBLICKEYBYTES]= {170, 253, 166, 27, 161, 214, 10,
|
|
236, 183, 217, 41, 91, 231, 24, 85, 225, 49, 210, 181, 236, 13, 207, 101,
|
|
72, 53, 83, 219, 130, 79, 151, 0, 159};
|
|
uchar foobar_sign[CRYPTO_BYTES]= {232, 61, 201, 63, 67, 63, 51, 53, 86, 73,
|
|
238, 35, 170, 117, 146, 214, 26, 17, 35, 9, 8, 132, 245, 141, 48, 99, 66,
|
|
58, 36, 228, 48, 84, 115, 254, 187, 168, 88, 162, 249, 57, 35, 85, 79, 238,
|
|
167, 106, 68, 117, 56, 135, 171, 47, 20, 14, 133, 79, 15, 229, 124, 160,
|
|
176, 100, 138, 14};
|
|
|
|
uchar nonce[NONCE_BYTES];
|
|
uchar reply[NONCE_BYTES+CRYPTO_BYTES];
|
|
int r;
|
|
|
|
plan(4);
|
|
|
|
crypto_sign_keypair(pk, USTRING_WITH_LEN("foobar"));
|
|
ok(!memcmp(pk, foobar_pk, CRYPTO_PUBLICKEYBYTES), "foobar pk");
|
|
|
|
memset(nonce, 'A', sizeof(nonce));
|
|
crypto_sign(reply, nonce, sizeof(nonce), USTRING_WITH_LEN("foobar"));
|
|
ok(!memcmp(reply, foobar_sign, CRYPTO_BYTES), "foobar sign");
|
|
|
|
r= crypto_sign_open(reply, sizeof(reply), pk);
|
|
ok(!r, "good nonce");
|
|
|
|
crypto_sign(reply, nonce, sizeof(nonce), USTRING_WITH_LEN("foobar"));
|
|
reply[CRYPTO_BYTES + 10]='B';
|
|
r= crypto_sign_open(reply, sizeof(reply), pk);
|
|
ok(r, "bad nonce");
|
|
|
|
return exit_status();
|
|
}
|