]> www.average.org Git - pam_pcsc_cr.git/blobdiff - test_auth.c
support gcrypt library
[pam_pcsc_cr.git] / test_auth.c
index 55911c7a8cf97458c21aea6e117df9860f5897b0..0251b47f29e33962892c45556f7c1074e162ac5c 100644 (file)
@@ -1,27 +1,26 @@
 #include <stdio.h>
 #include <string.h>
 #include "authobj.h"
+#include "crypto.h"
 
 int main(int argc, char *argv[])
 {
        const char *id = "testuser";
        const char *pass = "testpassword";
        const char *nonce = "1";
-       const unsigned char secret[] = {0x52, 0xf3, 0xbe, 0x1f, 0x3e,
-                                       0x22, 0xa8, 0xee, 0xdf, 0x10,
-                                       0x86, 0xf2, 0x17, 0xd7, 0x21,
-                                       0x9d, 0x08, 0x14, 0x48, 0x38};
+       const unsigned char secret[] = {0xb4, 0x62, 0xf2, 0x60, 0x87,
+                                       0x78, 0x16, 0x87, 0xde, 0xce,
+                                       0x80, 0x09, 0x24, 0x0b, 0x93,
+                                       0xfc, 0xa0, 0xfc, 0x56, 0x56};
        const unsigned char *payload = (unsigned char *)
                                        "To authorize or not to authorize?";
-       unsigned char authobj[512];
+       unsigned char authobj[128];
        int authsize = sizeof(authobj);
        unsigned char challenge[128];
        int challengesize = sizeof(challenge);
        int rc;
-       const unsigned char key[] =    {0xcc, 0x21, 0xaa, 0xb7, 0xf5,
-                                       0x76, 0xd6, 0xe7, 0xed, 0x90,
-                                       0x69, 0x51, 0x3d, 0x9b, 0x3a,
-                                       0x9d, 0xa8, 0xcf, 0xf9, 0x2f};
+       unsigned char key[20];
+       int keysize = sizeof(key);
        unsigned char newsecret[20];
        int newsecsize = sizeof(newsecret);
        unsigned char newload[128];
@@ -36,6 +35,11 @@ int main(int argc, char *argv[])
        rc = make_challenge(id, pass, nonce, challenge, &challengesize);
        printf("make_challenge() rc=%d size=%d\n", rc, challengesize);
        if (rc) return rc;
+       rc = hmac(secret, sizeof(secret), challenge, challengesize,
+               &key, &keysize);
+       printf("hmac(secret, challenge) rc=%d new_key_size=%d\n",
+               rc, keysize);
+       if (rc) return rc;
 
        rc = parse_authobj(key, sizeof(key), authobj, authsize,
                        newsecret, &newsecsize, newload, &newloadsize);