summaryrefslogtreecommitdiff
path: root/src/util/test_crypto_ecdsa.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2013-10-10 14:40:06 +0000
committerChristian Grothoff <christian@grothoff.org>2013-10-10 14:40:06 +0000
commit4add4c6a6302ff01539e246f68aaf13299414fd6 (patch)
tree2f5343a10726d165c35c98c48eb59247a5ab3a63 /src/util/test_crypto_ecdsa.c
parent9351b1e9bdf2b067b6db06562c26ba658cff42b8 (diff)
-updated tests
Diffstat (limited to 'src/util/test_crypto_ecdsa.c')
-rw-r--r--src/util/test_crypto_ecdsa.c237
1 files changed, 237 insertions, 0 deletions
diff --git a/src/util/test_crypto_ecdsa.c b/src/util/test_crypto_ecdsa.c
new file mode 100644
index 000000000..27c0fb137
--- /dev/null
+++ b/src/util/test_crypto_ecdsa.c
@@ -0,0 +1,237 @@
+/*
+ This file is part of GNUnet.
+ (C) 2002-2013 Christian Grothoff (and other contributing authors)
+
+ GNUnet is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published
+ by the Free Software Foundation; either version 3, or (at your
+ option) any later version.
+
+ GNUnet is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with GNUnet; see the file COPYING. If not, write to the
+ Free Software Foundation, Inc., 59 Temple Place - Suite 330,
+ Boston, MA 02111-1307, USA.
+
+*/
+/**
+ * @file util/test_crypto_ecdsa.c
+ * @brief testcase for ECC ECDSA public key crypto
+ * @author Christian Grothoff
+ */
+#include "platform.h"
+#include "gnunet_util_lib.h"
+#include "gnunet_signatures.h"
+#include <gcrypt.h>
+
+#define ITER 25
+
+#define PERF GNUNET_YES
+
+
+static struct GNUNET_CRYPTO_EcdsaPrivateKey *key;
+
+
+static int
+testSignVerify ()
+{
+ struct GNUNET_CRYPTO_EcdsaSignature sig;
+ struct GNUNET_CRYPTO_EccSignaturePurpose purp;
+ struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
+ int i;
+ struct GNUNET_TIME_Absolute start;
+ int ok = GNUNET_OK;
+
+ FPRINTF (stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ start = GNUNET_TIME_absolute_get ();
+ purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+
+ for (i = 0; i < ITER; i++)
+ {
+ FPRINTF (stderr, "%s", ".");
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
+ {
+ FPRINTF (stderr,
+ "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ if (GNUNET_SYSERR ==
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
+ &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ if (GNUNET_SYSERR !=
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ }
+ printf ("%d ECDSA sign/verify operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
+ return ok;
+}
+
+
+static int
+testDeriveSignVerify ()
+{
+ struct GNUNET_CRYPTO_EcdsaSignature sig;
+ struct GNUNET_CRYPTO_EccSignaturePurpose purp;
+ struct GNUNET_CRYPTO_EcdsaPrivateKey *dpriv;
+ struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
+ struct GNUNET_CRYPTO_EcdsaPublicKey dpub;
+
+ dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive (key, "test-derive", "test-CTX");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ GNUNET_CRYPTO_ecdsa_public_key_derive (&pkey, "test-derive", "test-CTX", &dpub);
+ purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (dpriv, &purp, &sig))
+ {
+ FPRINTF (stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
+ if (GNUNET_SYSERR ==
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &dpub))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
+ if (GNUNET_SYSERR !=
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
+ if (GNUNET_SYSERR !=
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &dpub))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
+ GNUNET_free (dpriv);
+ return GNUNET_OK;
+}
+
+
+#if PERF
+static int
+testSignPerformance ()
+{
+ struct GNUNET_CRYPTO_EccSignaturePurpose purp;
+ struct GNUNET_CRYPTO_EcdsaSignature sig;
+ struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
+ int i;
+ struct GNUNET_TIME_Absolute start;
+ int ok = GNUNET_OK;
+
+ purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+ FPRINTF (stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ start = GNUNET_TIME_absolute_get ();
+ for (i = 0; i < ITER; i++)
+ {
+ FPRINTF (stderr, "%s", ".");
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
+ {
+ FPRINTF (stderr, "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ }
+ printf ("%d ECC sign operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
+ GNUNET_YES));
+ return ok;
+}
+#endif
+
+
+static void
+perf_keygen ()
+{
+ struct GNUNET_TIME_Absolute start;
+ struct GNUNET_CRYPTO_EcdsaPrivateKey *pk;
+ int i;
+
+ start = GNUNET_TIME_absolute_get ();
+ for (i=0;i<10;i++)
+ {
+ fprintf (stderr, ".");
+ pk = GNUNET_CRYPTO_ecdsa_key_create ();
+ GNUNET_free (pk);
+ }
+ fprintf (stderr, "\n");
+ printf ("Creating 10 ECDSA keys took %s\n",
+ GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
+}
+
+
+int
+main (int argc, char *argv[])
+{
+ int failure_count = 0;
+
+ if (! gcry_check_version ("1.5.0"))
+ {
+ FPRINTF (stderr,
+ _
+ ("libgcrypt has not the expected version (version %s is required).\n"),
+ "1.5.0");
+ return 0;
+ }
+ GNUNET_log_setup ("test-crypto-ecc", "WARNING", NULL);
+ key = GNUNET_CRYPTO_ecdsa_key_create ();
+ if (GNUNET_OK != testDeriveSignVerify ())
+ {
+ failure_count++;
+ fprintf (stderr,
+ "\n\n%d TESTS FAILED!\n\n", failure_count);
+ return -1;
+ }
+#if PERF
+ if (GNUNET_OK != testSignPerformance ())
+ failure_count++;
+#endif
+ if (GNUNET_OK != testSignVerify ())
+ failure_count++;
+ GNUNET_free (key);
+ perf_keygen ();
+
+ if (0 != failure_count)
+ {
+ fprintf (stderr,
+ "\n\n%d TESTS FAILED!\n\n",
+ failure_count);
+ return -1;
+ }
+ return 0;
+}
+
+/* end of test_crypto_ecdsa.c */