summaryrefslogtreecommitdiff
path: root/src/util/test_crypto_ecdsa.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2019-10-05 15:09:28 +0200
committerChristian Grothoff <christian@grothoff.org>2019-10-05 15:09:28 +0200
commitc4e9ba925ffd758aaa3feee2ccfc0b76f26fe207 (patch)
treecac3ce030d77b4cbe7c7dc62ed58cfe6d24f73e1 /src/util/test_crypto_ecdsa.c
parentfbb71d527c7d6babf269a8fefce1db291b9f7068 (diff)
global reindent, now with uncrustify hook enabled
Diffstat (limited to 'src/util/test_crypto_ecdsa.c')
-rw-r--r--src/util/test_crypto_ecdsa.c264
1 files changed, 135 insertions, 129 deletions
diff --git a/src/util/test_crypto_ecdsa.c b/src/util/test_crypto_ecdsa.c
index 797d61285..d6f406b47 100644
--- a/src/util/test_crypto_ecdsa.c
+++ b/src/util/test_crypto_ecdsa.c
@@ -37,7 +37,7 @@ static struct GNUNET_CRYPTO_EcdsaPrivateKey *key;
static int
-testSignVerify()
+testSignVerify ()
{
struct GNUNET_CRYPTO_EcdsaSignature sig;
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
@@ -46,48 +46,49 @@ testSignVerify()
struct GNUNET_TIME_Absolute start;
int ok = GNUNET_OK;
- fprintf(stderr, "%s", "W");
- GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
- start = GNUNET_TIME_absolute_get();
- purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
+ fprintf (stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ start = GNUNET_TIME_absolute_get ();
+ purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
for (i = 0; i < ITER; i++)
+ {
+ fprintf (stderr, "%s", "."); fflush (stderr);
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
{
- fprintf(stderr, "%s", "."); fflush(stderr);
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig))
- {
- fprintf(stderr,
- "%s",
- "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- ok = GNUNET_SYSERR;
- continue;
- }
- if (GNUNET_SYSERR ==
- GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
- &pkey))
- {
- printf("GNUNET_CRYPTO_ecdsa_verify failed!\n");
- ok = GNUNET_SYSERR;
- continue;
- }
- if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
- &purp, &sig, &pkey))
- {
- printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- ok = GNUNET_SYSERR;
- continue;
- }
+ fprintf (stderr,
+ "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
}
- printf("%d ECDSA sign/verify operations %s\n", ITER,
- GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES));
+ if (GNUNET_SYSERR ==
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
+ &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ if (GNUNET_SYSERR !=
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ }
+ printf ("%d ECDSA sign/verify operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string (
+ GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
return ok;
}
static int
-testDeriveSignVerify()
+testDeriveSignVerify ()
{
struct GNUNET_CRYPTO_EcdsaSignature sig;
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
@@ -95,52 +96,54 @@ testDeriveSignVerify()
struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
struct GNUNET_CRYPTO_EcdsaPublicKey dpub;
- dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive(key, "test-derive", "test-CTX");
- GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
- GNUNET_CRYPTO_ecdsa_public_key_derive(&pkey, "test-derive", "test-CTX", &dpub);
- purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
-
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(dpriv, &purp, &sig))
- {
- fprintf(stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- GNUNET_free(dpriv);
- return GNUNET_SYSERR;
- }
+ dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive (key, "test-derive",
+ "test-CTX");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ GNUNET_CRYPTO_ecdsa_public_key_derive (&pkey, "test-derive", "test-CTX",
+ &dpub);
+ purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (dpriv, &purp, &sig))
+ {
+ fprintf (stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR ==
- GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST,
- &purp, &sig,
- &dpub))
- {
- printf("GNUNET_CRYPTO_ecdsa_verify failed!\n");
- GNUNET_free(dpriv);
- return GNUNET_SYSERR;
- }
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &dpub))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST,
- &purp, &sig,
- &pkey))
- {
- printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- GNUNET_free(dpriv);
- return GNUNET_SYSERR;
- }
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &pkey))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
- &purp, &sig, &dpub))
- {
- printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- GNUNET_free(dpriv);
- return GNUNET_SYSERR;
- }
- GNUNET_free(dpriv);
+ GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &dpub))
+ {
+ printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free (dpriv);
+ return GNUNET_SYSERR;
+ }
+ GNUNET_free (dpriv);
return GNUNET_OK;
}
#if PERF
static int
-testSignPerformance()
+testSignPerformance ()
{
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
struct GNUNET_CRYPTO_EcdsaSignature sig;
@@ -149,93 +152,96 @@ testSignPerformance()
struct GNUNET_TIME_Absolute start;
int ok = GNUNET_OK;
- purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
- fprintf(stderr, "%s", "W");
- GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
- start = GNUNET_TIME_absolute_get();
+ purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+ fprintf (stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
+ start = GNUNET_TIME_absolute_get ();
for (i = 0; i < ITER; i++)
+ {
+ fprintf (stderr, "%s", "."); fflush (stderr);
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
{
- fprintf(stderr, "%s", "."); fflush(stderr);
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig))
- {
- fprintf(stderr, "%s",
- "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- ok = GNUNET_SYSERR;
- continue;
- }
+ fprintf (stderr, "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
}
- printf("%d ECC sign operations %s\n", ITER,
- GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start),
- GNUNET_YES));
+ }
+ printf ("%d ECC sign operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string (
+ GNUNET_TIME_absolute_get_duration (start),
+ GNUNET_YES));
return ok;
}
#endif
static void
-perf_keygen()
+perf_keygen ()
{
struct GNUNET_TIME_Absolute start;
struct GNUNET_CRYPTO_EcdsaPrivateKey *pk;
int i;
- fprintf(stderr, "%s", "W");
- start = GNUNET_TIME_absolute_get();
+ fprintf (stderr, "%s", "W");
+ start = GNUNET_TIME_absolute_get ();
for (i = 0; i < 10; i++)
- {
- fprintf(stderr, "."); fflush(stderr);
- pk = GNUNET_CRYPTO_ecdsa_key_create();
- GNUNET_free(pk);
- }
+ {
+ fprintf (stderr, "."); fflush (stderr);
+ pk = GNUNET_CRYPTO_ecdsa_key_create ();
+ GNUNET_free (pk);
+ }
for (; i < 25; i++)
- fprintf(stderr, ".");
- fflush(stderr);
- printf("10 ECDSA keys created in %s\n",
- GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES));
+ fprintf (stderr, ".");
+ fflush (stderr);
+ printf ("10 ECDSA keys created in %s\n",
+ GNUNET_STRINGS_relative_time_to_string (
+ GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
}
int
-main(int argc, char *argv[])
+main (int argc, char *argv[])
{
int failure_count = 0;
- if (!gcry_check_version("1.6.0"))
- {
- fprintf(stderr,
- _
- ("libgcrypt has not the expected version (version %s is required).\n"),
- "1.6.0");
- return 0;
- }
- if (getenv("GNUNET_GCRYPT_DEBUG"))
- gcry_control(GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
- GNUNET_log_setup("test-crypto-ecc", "WARNING", NULL);
- key = GNUNET_CRYPTO_ecdsa_key_create();
- if (GNUNET_OK != testDeriveSignVerify())
- {
- failure_count++;
- fprintf(stderr,
- "\n\n%d TESTS FAILED!\n\n", failure_count);
- return -1;
- }
+ if (! gcry_check_version ("1.6.0"))
+ {
+ fprintf (stderr,
+ _
+ (
+ "libgcrypt has not the expected version (version %s is required).\n"),
+ "1.6.0");
+ return 0;
+ }
+ if (getenv ("GNUNET_GCRYPT_DEBUG"))
+ gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
+ GNUNET_log_setup ("test-crypto-ecc", "WARNING", NULL);
+ key = GNUNET_CRYPTO_ecdsa_key_create ();
+ if (GNUNET_OK != testDeriveSignVerify ())
+ {
+ failure_count++;
+ fprintf (stderr,
+ "\n\n%d TESTS FAILED!\n\n", failure_count);
+ return -1;
+ }
#if PERF
- if (GNUNET_OK != testSignPerformance())
+ if (GNUNET_OK != testSignPerformance ())
failure_count++;
#endif
- if (GNUNET_OK != testSignVerify())
+ if (GNUNET_OK != testSignVerify ())
failure_count++;
- GNUNET_free(key);
- perf_keygen();
+ GNUNET_free (key);
+ perf_keygen ();
if (0 != failure_count)
- {
- fprintf(stderr,
- "\n\n%d TESTS FAILED!\n\n",
- failure_count);
- return -1;
- }
+ {
+ fprintf (stderr,
+ "\n\n%d TESTS FAILED!\n\n",
+ failure_count);
+ return -1;
+ }
return 0;
}