blob: d5c15c77dcd0e0a6e7e80f9e6f526b23751d0084 [file] [log] [blame]
Paul Bakker5c60de22009-07-08 19:47:36 +00001BEGIN_HEADER
2#include <polarssl/dhm.h>
3
4static int myrand( void *r )
5{
6 if ( r != NULL )
7 r = NULL;
8
9 return( rand() );
10}
11
12END_HEADER
13
14BEGIN_CASE
15dhm_do_dhm:x_size:radix_P:input_P:radix_G:input_G
16{
17 dhm_context ctx_srv;
18 dhm_context ctx_cli;
19 unsigned char ske[1000];
20 unsigned char *p = ske;
21 unsigned char pub_cli[1000];
22 unsigned char sec_srv[1000];
23 unsigned char sec_cli[1000];
24 int ske_len = 0;
25 int pub_cli_len = 0;
26 int sec_srv_len = 1000;
27 int sec_cli_len = 1000;
28
29 memset( &ctx_srv, 0x00, sizeof( dhm_context ) );
30 memset( &ctx_cli, 0x00, sizeof( dhm_context ) );
31 memset( ske, 0x00, 1000 );
32 memset( pub_cli, 0x00, 1000 );
33 memset( sec_srv, 0x00, 1000 );
34 memset( sec_cli, 0x00, 1000 );
35
36 TEST_ASSERT( mpi_read_string( &ctx_srv.P, {radix_P}, {input_P} ) == 0 );
37 TEST_ASSERT( mpi_read_string( &ctx_srv.G, {radix_G}, {input_G} ) == 0 );
38 int x_size = mpi_size( &ctx_srv.P );
39
40 TEST_ASSERT( dhm_make_params( &ctx_srv, x_size, ske, &ske_len, &myrand, NULL ) == 0 );
41 ske[ske_len++] = 0;
42 ske[ske_len++] = 0;
43 TEST_ASSERT( dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
44
45 pub_cli_len = x_size;
46 TEST_ASSERT( dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len, &myrand, NULL ) == 0 );
47
48 TEST_ASSERT( dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
49
50 TEST_ASSERT( dhm_calc_secret( &ctx_srv, sec_srv, &sec_srv_len ) == 0 );
51 TEST_ASSERT( dhm_calc_secret( &ctx_cli, sec_cli, &sec_cli_len ) == 0 );
52
53 TEST_ASSERT( sec_srv_len == sec_cli_len );
54 TEST_ASSERT( sec_srv_len != 0 );
55 TEST_ASSERT( memcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
56}
57END_CASE