Server IP : 23.254.227.96 / Your IP : 216.73.216.7 Web Server : Apache/2.4.62 (Unix) OpenSSL/1.1.1k System : Linux hwsrv-1277026.hostwindsdns.com 4.18.0-477.13.1.el8_8.x86_64 #1 SMP Tue May 30 14:53:41 EDT 2023 x86_64 User : viralblo ( 1001) PHP Version : 8.1.31 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /proc/self/root/usr/share/doc/libsodium-devel/ |
Upload File : |
#define TEST_NAME "auth7" #include "cmptest.h" static unsigned char key[32]; static unsigned char c[600]; static unsigned char a[64]; int main(void) { size_t clen; for (clen = 0; clen < sizeof c; ++clen) { crypto_auth_keygen(key); randombytes_buf(c, clen); crypto_auth_hmacsha512(a, c, clen, key); if (crypto_auth_hmacsha512_verify(a, c, clen, key) != 0) { printf("fail %u\n", (unsigned int) clen); return 100; } if (clen > 0) { c[(size_t) rand() % clen] += 1 + (rand() % 255); if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) { printf("forgery %u\n", (unsigned int) clen); return 100; } a[rand() % sizeof a] += 1 + (rand() % 255); if (crypto_auth_hmacsha512_verify(a, c, clen, key) == 0) { printf("forgery %u\n", (unsigned int) clen); return 100; } } } crypto_auth_keygen(key); crypto_auth_hmacsha512(a, guard_page, 0U, key); assert(crypto_auth_hmacsha512_verify(a, guard_page, 0U, key) == 0); return 0; }