]> git.xonotic.org Git - xonotic/d0_blind_id.git/blobdiff - main.c
embed a diffie hellmann key exchange
[xonotic/d0_blind_id.git] / main.c
diff --git a/main.c b/main.c
index eaaa9e3134948db8cbd4eb1b83af82829381c355..249e60471c51b0bebe2297be1a2496985a677c62 100644 (file)
--- a/main.c
+++ b/main.c
@@ -46,20 +46,31 @@ void mysignal(int signo)
 int main(int argc, char **argv)
 {
        char buf[65536]; size_t bufsize;
-       char buf2[65536]; size_t buf2size; ssize_t buf2ssize;
+       char buf2[65536]; size_t buf2size;
        d0_blind_id_t *ctx_self, *ctx_other;
 
        d0_blind_id_INITIALIZE();
        ctx_self = d0_blind_id_new();
        ctx_other = d0_blind_id_new();
 
-       if(!d0_blind_id_generate_private_keys(ctx_self, 1024))
+       printf("keygen RSA...\n");
+       if(!d0_blind_id_generate_private_key(ctx_self, 1024))
                errx(1, "keygen fail");
-       bufsize = sizeof(buf); if(!d0_blind_id_write_public_keys(ctx_self, buf, &bufsize))
+       bufsize = sizeof(buf); if(!d0_blind_id_write_public_key(ctx_self, buf, &bufsize))
                errx(2, "writepub fail");
-       if(!d0_blind_id_read_public_keys(ctx_other, buf, bufsize))
+       if(!d0_blind_id_read_public_key(ctx_other, buf, bufsize))
                errx(3, "readpub fail");
 
+       printf("keygen modulus...\n");
+       if(!d0_blind_id_generate_private_id_modulus(ctx_other))
+               errx(1, "keygen fail");
+       /*
+       bufsize = sizeof(buf); if(!d0_blind_id_write_private_id_modulus(ctx_other, buf, &bufsize))
+               errx(2, "writepub fail");
+       if(!d0_blind_id_read_private_id_modulus(ctx_self, buf, bufsize))
+               errx(3, "readpub fail");
+       */
+
        signal(SIGINT, mysignal);
 
        int n = 0;
@@ -95,27 +106,38 @@ int main(int argc, char **argv)
                errx(8, "readpub2 fail");
 
        n = 0;
-       double bench_auth = 0, bench_chall = 0, bench_resp = 0, bench_verify = 0;
+       double bench_auth = 0, bench_chall = 0, bench_resp = 0, bench_verify = 0, bench_dhkey1 = 0, bench_dhkey2 = 0;
+       BOOL status;
        while(!quit)
        {
                bench(&bench_auth);
-               bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_start(ctx_other, 1, "hello world", 11, buf, &bufsize))
+               bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_start(ctx_other, 1, 1, "hello world", 11, buf, &bufsize))
                        errx(9, "start fail");
                bench(&bench_chall);
-               buf2size = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_challenge(ctx_self, 1, buf, bufsize, buf2, &buf2size))
+               buf2size = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_challenge(ctx_self, 1, 1, buf, bufsize, buf2, &buf2size, NULL))
                        errx(10, "challenge fail");
                bench(&bench_resp);
-               bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_response(ctx_other, buf2, buf2size, buf, &bufsize))
+               bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_response(ctx_other, 1, buf2, buf2size, buf, &bufsize))
                        errx(11, "response fail");
                bench(&bench_verify);
-               buf2ssize = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_verify(ctx_self, buf, bufsize, buf2, &buf2ssize))
+               buf2size = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_verify(ctx_self, buf, bufsize, buf2, &buf2size, &status))
                        errx(12, "verify fail");
-               if(buf2ssize != 11 || memcmp(buf2, "hello world", 11))
+               if(buf2size != 11 || memcmp(buf2, "hello world", 11))
                        errx(13, "hello fail");
+               if(!status)
+                       errx(14, "signature fail");
+               bench(&bench_dhkey1);
+               bufsize = sizeof(buf); if(!d0_blind_id_sessionkey_public_id(ctx_self, buf, &bufsize))
+                       errx(15, "dhkey1 fail");
+               bench(&bench_dhkey2);
+               buf2size = sizeof(buf2); if(!d0_blind_id_sessionkey_public_id(ctx_other, buf2, &buf2size))
+                       errx(16, "dhkey2 fail");
                bench(&bench_stop);
+               if(bufsize != buf2size || memcmp(buf, buf2, bufsize))
+                       errx(17, "dhkey match fail");
                ++n;
                if(n % 1024 == 0)
-                       printf("auth=%f chall=%f resp=%f verify=%f\n", n/bench_auth, n/bench_chall, n/bench_resp, n/bench_verify);
+                       printf("auth=%f chall=%f resp=%f verify=%f dh1=%f dh2=%f\n", n/bench_auth, n/bench_chall, n/bench_resp, n/bench_verify, n/bench_dhkey1, n/bench_dhkey2);
        }
 
        return 0;