summaryrefslogtreecommitdiff
path: root/src/util/test_crypto_ecdsa.c
diff options
context:
space:
mode:
authorng0 <ng0@n0.is>2019-09-08 12:33:09 +0000
committerng0 <ng0@n0.is>2019-09-08 12:33:09 +0000
commitd41ed82a4ea0cc8e1674b6d5d2c49fd6462610bb (patch)
tree9efd18ea7d425652085ed0bd5e8e45604bc5f6b9 /src/util/test_crypto_ecdsa.c
parenta0fce305c565c0937d917a92712f15e9c5736260 (diff)
uncrustify as demanded.
Diffstat (limited to 'src/util/test_crypto_ecdsa.c')
-rw-r--r--src/util/test_crypto_ecdsa.c266
1 files changed, 133 insertions, 133 deletions
diff --git a/src/util/test_crypto_ecdsa.c b/src/util/test_crypto_ecdsa.c
index 00cc72af4..797d61285 100644
--- a/src/util/test_crypto_ecdsa.c
+++ b/src/util/test_crypto_ecdsa.c
@@ -11,13 +11,13 @@
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Affero General Public License for more details.
-
+
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
SPDX-License-Identifier: AGPL3.0-or-later
-*/
+ */
/**
* @file util/test_crypto_ecdsa.c
* @brief testcase for ECC ECDSA public key crypto
@@ -37,7 +37,7 @@ static struct GNUNET_CRYPTO_EcdsaPrivateKey *key;
static int
-testSignVerify ()
+testSignVerify()
{
struct GNUNET_CRYPTO_EcdsaSignature sig;
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
@@ -46,48 +46,48 @@ testSignVerify ()
struct GNUNET_TIME_Absolute start;
int ok = GNUNET_OK;
- fprintf (stderr, "%s", "W");
- GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
- start = GNUNET_TIME_absolute_get ();
- purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
+ fprintf(stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
+ start = GNUNET_TIME_absolute_get();
+ purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
for (i = 0; i < ITER; i++)
- {
- fprintf (stderr, "%s", "."); fflush (stderr);
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
- {
- fprintf (stderr,
- "%s",
- "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- ok = GNUNET_SYSERR;
- continue;
- }
- if (GNUNET_SYSERR ==
- GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
- &pkey))
- {
- printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
- ok = GNUNET_SYSERR;
- continue;
- }
- if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
- &purp, &sig, &pkey))
{
- printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- ok = GNUNET_SYSERR;
- continue;
+ fprintf(stderr, "%s", "."); fflush(stderr);
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig))
+ {
+ fprintf(stderr,
+ "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ if (GNUNET_SYSERR ==
+ GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
+ &pkey))
+ {
+ printf("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
+ if (GNUNET_SYSERR !=
+ GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &pkey))
+ {
+ printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
}
- }
- printf ("%d ECDSA sign/verify operations %s\n", ITER,
- GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
+ printf("%d ECDSA sign/verify operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES));
return ok;
}
static int
-testDeriveSignVerify ()
+testDeriveSignVerify()
{
struct GNUNET_CRYPTO_EcdsaSignature sig;
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
@@ -95,52 +95,52 @@ testDeriveSignVerify ()
struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
struct GNUNET_CRYPTO_EcdsaPublicKey dpub;
- dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive (key, "test-derive", "test-CTX");
- GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
- GNUNET_CRYPTO_ecdsa_public_key_derive (&pkey, "test-derive", "test-CTX", &dpub);
- purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
-
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (dpriv, &purp, &sig))
- {
- fprintf (stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- GNUNET_free (dpriv);
- return GNUNET_SYSERR;
- }
+ dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive(key, "test-derive", "test-CTX");
+ GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
+ GNUNET_CRYPTO_ecdsa_public_key_derive(&pkey, "test-derive", "test-CTX", &dpub);
+ purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
+
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(dpriv, &purp, &sig))
+ {
+ fprintf(stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ GNUNET_free(dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR ==
- GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
- &purp, &sig,
- &dpub))
- {
- printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n");
- GNUNET_free (dpriv);
- return GNUNET_SYSERR;
- }
+ GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &dpub))
+ {
+ printf("GNUNET_CRYPTO_ecdsa_verify failed!\n");
+ GNUNET_free(dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
- &purp, &sig,
- &pkey))
- {
- printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- GNUNET_free (dpriv);
- return GNUNET_SYSERR;
- }
+ GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST,
+ &purp, &sig,
+ &pkey))
+ {
+ printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free(dpriv);
+ return GNUNET_SYSERR;
+ }
if (GNUNET_SYSERR !=
- GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
- &purp, &sig, &dpub))
- {
- printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
- GNUNET_free (dpriv);
- return GNUNET_SYSERR;
- }
- GNUNET_free (dpriv);
+ GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
+ &purp, &sig, &dpub))
+ {
+ printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n");
+ GNUNET_free(dpriv);
+ return GNUNET_SYSERR;
+ }
+ GNUNET_free(dpriv);
return GNUNET_OK;
}
#if PERF
static int
-testSignPerformance ()
+testSignPerformance()
{
struct GNUNET_CRYPTO_EccSignaturePurpose purp;
struct GNUNET_CRYPTO_EcdsaSignature sig;
@@ -149,93 +149,93 @@ testSignPerformance ()
struct GNUNET_TIME_Absolute start;
int ok = GNUNET_OK;
- purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose));
- purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
- fprintf (stderr, "%s", "W");
- GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey);
- start = GNUNET_TIME_absolute_get ();
+ purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose));
+ purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST);
+ fprintf(stderr, "%s", "W");
+ GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey);
+ start = GNUNET_TIME_absolute_get();
for (i = 0; i < ITER; i++)
- {
- fprintf (stderr, "%s", "."); fflush (stderr);
- if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig))
{
- fprintf (stderr, "%s",
- "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
- ok = GNUNET_SYSERR;
- continue;
+ fprintf(stderr, "%s", "."); fflush(stderr);
+ if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig))
+ {
+ fprintf(stderr, "%s",
+ "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n");
+ ok = GNUNET_SYSERR;
+ continue;
+ }
}
- }
- printf ("%d ECC sign operations %s\n", ITER,
- GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start),
- GNUNET_YES));
+ printf("%d ECC sign operations %s\n", ITER,
+ GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start),
+ GNUNET_YES));
return ok;
}
#endif
static void
-perf_keygen ()
+perf_keygen()
{
struct GNUNET_TIME_Absolute start;
struct GNUNET_CRYPTO_EcdsaPrivateKey *pk;
int i;
- fprintf (stderr, "%s", "W");
- start = GNUNET_TIME_absolute_get ();
- for (i=0;i<10;i++)
- {
- fprintf (stderr, "."); fflush (stderr);
- pk = GNUNET_CRYPTO_ecdsa_key_create ();
- GNUNET_free (pk);
- }
- for (;i<25;i++)
- fprintf (stderr, ".");
- fflush (stderr);
- printf ("10 ECDSA keys created in %s\n",
- GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES));
+ fprintf(stderr, "%s", "W");
+ start = GNUNET_TIME_absolute_get();
+ for (i = 0; i < 10; i++)
+ {
+ fprintf(stderr, "."); fflush(stderr);
+ pk = GNUNET_CRYPTO_ecdsa_key_create();
+ GNUNET_free(pk);
+ }
+ for (; i < 25; i++)
+ fprintf(stderr, ".");
+ fflush(stderr);
+ printf("10 ECDSA keys created in %s\n",
+ GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES));
}
int
-main (int argc, char *argv[])
+main(int argc, char *argv[])
{
int failure_count = 0;
- if (! gcry_check_version ("1.6.0"))
- {
- fprintf (stderr,
- _
- ("libgcrypt has not the expected version (version %s is required).\n"),
- "1.6.0");
- return 0;
- }
- if (getenv ("GNUNET_GCRYPT_DEBUG"))
- gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u , 0);
- GNUNET_log_setup ("test-crypto-ecc", "WARNING", NULL);
- key = GNUNET_CRYPTO_ecdsa_key_create ();
- if (GNUNET_OK != testDeriveSignVerify ())
- {
- failure_count++;
- fprintf (stderr,
- "\n\n%d TESTS FAILED!\n\n", failure_count);
- return -1;
- }
+ if (!gcry_check_version("1.6.0"))
+ {
+ fprintf(stderr,
+ _
+ ("libgcrypt has not the expected version (version %s is required).\n"),
+ "1.6.0");
+ return 0;
+ }
+ if (getenv("GNUNET_GCRYPT_DEBUG"))
+ gcry_control(GCRYCTL_SET_DEBUG_FLAGS, 1u, 0);
+ GNUNET_log_setup("test-crypto-ecc", "WARNING", NULL);
+ key = GNUNET_CRYPTO_ecdsa_key_create();
+ if (GNUNET_OK != testDeriveSignVerify())
+ {
+ failure_count++;
+ fprintf(stderr,
+ "\n\n%d TESTS FAILED!\n\n", failure_count);
+ return -1;
+ }
#if PERF
- if (GNUNET_OK != testSignPerformance ())
+ if (GNUNET_OK != testSignPerformance())
failure_count++;
#endif
- if (GNUNET_OK != testSignVerify ())
+ if (GNUNET_OK != testSignVerify())
failure_count++;
- GNUNET_free (key);
- perf_keygen ();
+ GNUNET_free(key);
+ perf_keygen();
if (0 != failure_count)
- {
- fprintf (stderr,
- "\n\n%d TESTS FAILED!\n\n",
- failure_count);
- return -1;
- }
+ {
+ fprintf(stderr,
+ "\n\n%d TESTS FAILED!\n\n",
+ failure_count);
+ return -1;
+ }
return 0;
}