blob: e3c861772832c79ab73fd1ab981af378054bb8a8 [file] [log] [blame]
Paul Bakker5c60de22009-07-08 19:47:36 +00001BEGIN_HEADER
2#include <polarssl/dhm.h>
Paul Bakker5c60de22009-07-08 19:47:36 +00003END_HEADER
4
Paul Bakker5690efc2011-05-26 13:16:06 +00005BEGIN_DEPENDENCIES
6depends_on:POLARSSL_DHM_C:POLARSSL_BIGNUM_C
7END_DEPENDENCIES
8
Paul Bakker5c60de22009-07-08 19:47:36 +00009BEGIN_CASE
Paul Bakkerdbd443d2013-08-16 13:38:47 +020010dhm_do_dhm:#NOTUSED:#radix_P:input_P:#radix_G:input_G
Paul Bakker5c60de22009-07-08 19:47:36 +000011{
12 dhm_context ctx_srv;
13 dhm_context ctx_cli;
14 unsigned char ske[1000];
15 unsigned char *p = ske;
16 unsigned char pub_cli[1000];
17 unsigned char sec_srv[1000];
18 unsigned char sec_cli[1000];
Paul Bakkerf4a3f302011-04-24 15:53:29 +000019 size_t ske_len = 0;
20 size_t pub_cli_len = 0;
21 size_t sec_srv_len = 1000;
22 size_t sec_cli_len = 1000;
Paul Bakker69998dd2009-07-11 19:15:20 +000023 int x_size;
Paul Bakker997bbd12011-03-13 15:45:42 +000024 rnd_pseudo_info rnd_info;
Paul Bakker5c60de22009-07-08 19:47:36 +000025
Paul Bakkerdbd443d2013-08-16 13:38:47 +020026 ((void)NOTUSED);
27
Paul Bakker5c60de22009-07-08 19:47:36 +000028 memset( &ctx_srv, 0x00, sizeof( dhm_context ) );
29 memset( &ctx_cli, 0x00, sizeof( dhm_context ) );
30 memset( ske, 0x00, 1000 );
31 memset( pub_cli, 0x00, 1000 );
32 memset( sec_srv, 0x00, 1000 );
33 memset( sec_cli, 0x00, 1000 );
Paul Bakker997bbd12011-03-13 15:45:42 +000034 memset( &rnd_info, 0x00, sizeof( rnd_pseudo_info ) );
Paul Bakker5c60de22009-07-08 19:47:36 +000035
36 TEST_ASSERT( mpi_read_string( &ctx_srv.P, {radix_P}, {input_P} ) == 0 );
37 TEST_ASSERT( mpi_read_string( &ctx_srv.G, {radix_G}, {input_G} ) == 0 );
Paul Bakker69998dd2009-07-11 19:15:20 +000038 x_size = mpi_size( &ctx_srv.P );
Paul Bakker5c60de22009-07-08 19:47:36 +000039
Paul Bakker997bbd12011-03-13 15:45:42 +000040 TEST_ASSERT( dhm_make_params( &ctx_srv, x_size, ske, &ske_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
Paul Bakker5c60de22009-07-08 19:47:36 +000041 ske[ske_len++] = 0;
42 ske[ske_len++] = 0;
43 TEST_ASSERT( dhm_read_params( &ctx_cli, &p, ske + ske_len ) == 0 );
44
45 pub_cli_len = x_size;
Paul Bakker997bbd12011-03-13 15:45:42 +000046 TEST_ASSERT( dhm_make_public( &ctx_cli, x_size, pub_cli, pub_cli_len, &rnd_pseudo_rand, &rnd_info ) == 0 );
Paul Bakker5c60de22009-07-08 19:47:36 +000047
48 TEST_ASSERT( dhm_read_public( &ctx_srv, pub_cli, pub_cli_len ) == 0 );
49
50 TEST_ASSERT( dhm_calc_secret( &ctx_srv, sec_srv, &sec_srv_len ) == 0 );
51 TEST_ASSERT( dhm_calc_secret( &ctx_cli, sec_cli, &sec_cli_len ) == 0 );
52
53 TEST_ASSERT( sec_srv_len == sec_cli_len );
54 TEST_ASSERT( sec_srv_len != 0 );
55 TEST_ASSERT( memcmp( sec_srv, sec_cli, sec_srv_len ) == 0 );
Paul Bakkerc43481a2011-02-20 16:34:26 +000056
57 dhm_free( &ctx_srv );
58 dhm_free( &ctx_cli );
Paul Bakker5c60de22009-07-08 19:47:36 +000059}
60END_CASE