aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_rsa.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2011-08-15 21:54:06 +0000
committerChristian Grothoff <christian@grothoff.org>2011-08-15 21:54:06 +0000
commit5746309cb4be2073d550ad7a6885e918631dbc38 (patch)
tree89455bc4aadf977816b38df13f990372cd81d71a /src/util/test_crypto_rsa.c
parent6fd3e715cae09fa6e657c96f1c6f9711ee51f42f (diff)
downloadgnunet-5746309cb4be2073d550ad7a6885e918631dbc38.tar.gz
gnunet-5746309cb4be2073d550ad7a6885e918631dbc38.zip
indentation
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r--src/util/test_crypto_rsa.c77
1 files changed, 36 insertions, 41 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c
index d7c23731e..bf058d285 100644
--- a/src/util/test_crypto_rsa.c
+++ b/src/util/test_crypto_rsa.c
@@ -56,17 +56,17 @@ testEncryptDecrypt ()
56 for (i = 0; i < ITER; i++) 56 for (i = 0; i < ITER; i++)
57 { 57 {
58 fprintf (stderr, "."); 58 fprintf (stderr, ".");
59 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, 59 if (GNUNET_SYSERR ==
60 strlen (TESTSTRING) + 1, 60 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey,
61 &pkey, &target)) 61 &target))
62 { 62 {
63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
64 ok++; 64 ok++;
65 continue; 65 continue;
66 } 66 }
67 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, 67 if (-1 ==
68 &target, result, 68 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result,
69 strlen (TESTSTRING) + 1)) 69 strlen (TESTSTRING) + 1))
70 { 70 {
71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); 71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
72 ok++; 72 ok++;
@@ -75,16 +75,15 @@ testEncryptDecrypt ()
75 } 75 }
76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0) 76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
77 { 77 {
78 printf ("%s != %.*s - testEncryptDecrypt failed!\n", 78 printf ("%s != %.*s - testEncryptDecrypt failed!\n", TESTSTRING,
79 TESTSTRING, (int) MAX_TESTVAL, result); 79 (int) MAX_TESTVAL, result);
80 ok++; 80 ok++;
81 continue; 81 continue;
82 } 82 }
83 } 83 }
84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", 84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER,
85 ITER, 85 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
86 (unsigned long long) 86 rel_value, ok);
87 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
88 GNUNET_CRYPTO_rsa_key_free (hostkey); 87 GNUNET_CRYPTO_rsa_key_free (hostkey);
89 if (ok == 0) 88 if (ok == 0)
90 return GNUNET_OK; 89 return GNUNET_OK;
@@ -112,19 +111,18 @@ testEncryptPerformance ()
112 for (i = 0; i < ITER; i++) 111 for (i = 0; i < ITER; i++)
113 { 112 {
114 fprintf (stderr, "."); 113 fprintf (stderr, ".");
115 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, 114 if (GNUNET_SYSERR ==
116 strlen (TESTSTRING) + 1, 115 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey,
117 &pkey, &target)) 116 &target))
118 { 117 {
119 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 118 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
120 ok++; 119 ok++;
121 continue; 120 continue;
122 } 121 }
123 } 122 }
124 printf ("%d RSA encrypt operations %llu ms (%d failures)\n", 123 printf ("%d RSA encrypt operations %llu ms (%d failures)\n", ITER,
125 ITER, 124 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
126 (unsigned long long) 125 rel_value, ok);
127 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
128 GNUNET_CRYPTO_rsa_key_free (hostkey); 126 GNUNET_CRYPTO_rsa_key_free (hostkey);
129 if (ok != 0) 127 if (ok != 0)
130 return GNUNET_SYSERR; 128 return GNUNET_SYSERR;
@@ -154,19 +152,18 @@ testEncryptDecryptSK ()
154 { 152 {
155 fprintf (stderr, "."); 153 fprintf (stderr, ".");
156 GNUNET_CRYPTO_aes_create_session_key (&insk); 154 GNUNET_CRYPTO_aes_create_session_key (&insk);
157 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (&insk, 155 if (GNUNET_SYSERR ==
158 sizeof (struct 156 GNUNET_CRYPTO_rsa_encrypt (&insk,
159 GNUNET_CRYPTO_AesSessionKey), 157 sizeof (struct GNUNET_CRYPTO_AesSessionKey),
160 &pkey, &target)) 158 &pkey, &target))
161 { 159 {
162 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 160 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
163 ok++; 161 ok++;
164 continue; 162 continue;
165 } 163 }
166 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, 164 if (-1 ==
167 &target, &outsk, 165 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, &outsk,
168 sizeof (struct 166 sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
169 GNUNET_CRYPTO_AesSessionKey)))
170 { 167 {
171 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); 168 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
172 ok++; 169 ok++;
@@ -180,10 +177,9 @@ testEncryptDecryptSK ()
180 continue; 177 continue;
181 } 178 }
182 } 179 }
183 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", 180 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", ITER,
184 ITER, 181 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
185 (unsigned long long) 182 rel_value, ok);
186 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
187 GNUNET_CRYPTO_rsa_key_free (hostkey); 183 GNUNET_CRYPTO_rsa_key_free (hostkey);
188 if (ok != 0) 184 if (ok != 0)
189 return GNUNET_SYSERR; 185 return GNUNET_SYSERR;
@@ -219,26 +215,25 @@ testSignVerify ()
219 continue; 215 continue;
220 } 216 }
221 if (GNUNET_SYSERR == 217 if (GNUNET_SYSERR ==
222 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, 218 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
223 &purp, &sig, &pkey)) 219 &pkey))
224 { 220 {
225 printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); 221 printf ("GNUNET_CRYPTO_rsa_verify failed!\n");
226 ok = GNUNET_SYSERR; 222 ok = GNUNET_SYSERR;
227 continue; 223 continue;
228 } 224 }
229 if (GNUNET_SYSERR != 225 if (GNUNET_SYSERR !=
230 GNUNET_CRYPTO_rsa_verify 226 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
231 (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey)) 227 &purp, &sig, &pkey))
232 { 228 {
233 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n"); 229 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
234 ok = GNUNET_SYSERR; 230 ok = GNUNET_SYSERR;
235 continue; 231 continue;
236 } 232 }
237 } 233 }
238 printf ("%d RSA sign/verify operations %llums\n", 234 printf ("%d RSA sign/verify operations %llums\n", ITER,
239 ITER, 235 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
240 (unsigned long long) 236 rel_value);
241 GNUNET_TIME_absolute_get_duration (start).rel_value);
242 GNUNET_CRYPTO_rsa_key_free (hostkey); 237 GNUNET_CRYPTO_rsa_key_free (hostkey);
243 return ok; 238 return ok;
244} 239}
@@ -273,8 +268,8 @@ testSignPerformance ()
273 } 268 }
274 } 269 }
275 printf ("%d RSA sign operations %llu ms\n", ITER, 270 printf ("%d RSA sign operations %llu ms\n", ITER,
276 (unsigned long long) 271 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
277 GNUNET_TIME_absolute_get_duration (start).rel_value); 272 rel_value);
278 GNUNET_CRYPTO_rsa_key_free (hostkey); 273 GNUNET_CRYPTO_rsa_key_free (hostkey);
279 return ok; 274 return ok;
280} 275}