File: test.c

package info (click to toggle)
pycryptopp 0.6.0.20120313-1
  • links: PTS, VCS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 7,148 kB
  • ctags: 9,015
  • sloc: cpp: 29,875; asm: 3,519; python: 1,779; ansic: 1,517; makefile: 65
file content (39 lines) | stat: -rw-r--r-- 1,115 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39

#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include "crypto_sign.h"

char *msg = "Hello World";

int main(int argc, char *argv[]) {
    unsigned char sk[SECRETKEYBYTES], vk[PUBLICKEYBYTES];
    unsigned char *sigmsg, *newmsg;
    unsigned long long sigmsglen, newmsglen;
    int ret;
    crypto_sign_keypair(vk, sk);
    printf("got keypair\n");
    sigmsg = malloc(strlen(msg)+1+BYTES);
    if (!sigmsg)
        return 1;
    crypto_sign(sigmsg, &sigmsglen, (unsigned char *)msg, strlen(msg)+1, sk);
    printf("got signature\n");
    if (sigmsglen != strlen(msg)+1+BYTES)
        return 2;
    newmsg = malloc(sigmsglen);
    if (!newmsg)
        return 3;
    ret = crypto_sign_open(newmsg, &newmsglen, sigmsg, sigmsglen, vk);
    printf("verified signature\n");
    if (ret == 0)
        printf("good!\n");
    else
        printf("bad\n");
    sigmsg[0] ^= 0x01;
    ret = crypto_sign_open(newmsg, &newmsglen, sigmsg, sigmsglen, vk);
    if (ret == 0) 
        printf("bad: failed to detect simple corruption\n");
    else
        printf("good: detected simple corruption\n");
    return 0;
}