X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=test_auth.c;h=5a826e812186e7a7873f2ecc4856f09ac4ee6992;hp=af9e885259cbce53b95fca1bc2cb33360db0f712;hb=HEAD;hpb=fb64e7a4da4999c17484a85359fbfe4b8035541d diff --git a/test_auth.c b/test_auth.c index af9e885..cf287fc 100644 --- a/test_auth.c +++ b/test_auth.c @@ -1,3 +1,26 @@ +/* +Copyright (c) 2013 Eugene Crosser + +This software is provided 'as-is', without any express or implied +warranty. In no event will the authors be held liable for any damages +arising from the use of this software. + +Permission is granted to anyone to use this software for any purpose, +including commercial applications, and to alter it and redistribute it +freely, subject to the following restrictions: + + 1. The origin of this software must not be misrepresented; you must + not claim that you wrote the original software. If you use this + software in a product, an acknowledgment in the product documentation + would be appreciated but is not required. + + 2. Altered source versions must be plainly marked as such, and must + not be misrepresented as being the original software. + + 3. This notice may not be removed or altered from any source + distribution. +*/ + #include #include #include @@ -11,11 +34,11 @@ unsigned char secret[] = { }; static struct _auth_chunk -conjure_key(const unsigned char *challenge, const int challengesize) +conjure_key(const unsigned char *challenge, const size_t challengesize) { struct _auth_chunk ho = {0}; long rc; - int keysize = sizeof(ho.data); + size_t keysize = sizeof(ho.data); if ((rc = hmac(secret, sizeof(secret), challenge, challengesize, &ho.data, &keysize))) { @@ -27,11 +50,11 @@ conjure_key(const unsigned char *challenge, const int challengesize) } static struct _auth_chunk -token_key(const unsigned char *challenge, const int challengesize) +token_key(const unsigned char *challenge, const size_t challengesize) { struct _auth_chunk ho = {0}; long rc; - int keysize = sizeof(ho.data); + size_t keysize = sizeof(ho.data); if ((rc = pcsc_cr(challenge, challengesize, ho.data, &keysize))) { ho.err = pcsc_errstr(rc); @@ -46,11 +69,11 @@ int main(int argc, char *argv[]) const char *nonce = "1"; const unsigned char *payload = (unsigned char *) "To authorize or not to authorize?"; - int i; + size_t i; struct _auth_obj ao; struct _auth_obj nao; struct _auth_chunk (*fetch_key)(const unsigned char *challenge, - const int challengesize); + const size_t challengesize); if (argc == 2 && strlen(argv[1]) == 40 && strspn(argv[1], "0123456789abcdefABCDEF") == 40) { @@ -65,9 +88,9 @@ int main(int argc, char *argv[]) payload, strlen((char *)payload), NULL, 0, NULL); printf("new_authobj err=%s\n", ao.err?ao.err:""); - printf("data(%d):", ao.datasize); + printf("data(%d):", (int)ao.datasize); for (i = 0; i < ao.datasize; i++) printf(" %02x", ao.data[i]); - printf("\npayload(%d): \"%.*s\"\n", ao.paylsize, ao.paylsize, + printf("\npayload(%d): \"%.*s\"\n", (int)ao.paylsize, (int)ao.paylsize, ao.payload?(char*)ao.payload:""); if (ao.err) { if (ao.buffer) free(ao.buffer); @@ -77,9 +100,9 @@ int main(int argc, char *argv[]) nao = authobj(id, pass, nonce, nonce, NULL, 0, NULL, 0, ao.data, ao.datasize, fetch_key); printf("verify_authobj err=%s\n", nao.err?nao.err:""); - printf("data(%d):", nao.datasize); + printf("data(%d):", (int)nao.datasize); for (i = 0; i < nao.datasize; i++) printf(" %02x", nao.data[i]); - printf("\npayload(%d): \"%.*s\"\n", nao.paylsize, nao.paylsize, + printf("\npayload(%d): \"%.*s\"\n", (int)nao.paylsize, (int)nao.paylsize, nao.payload?(char*)nao.payload:""); if (nao.err) { if (nao.buffer) free(nao.buffer);