diff options
author | Christian Grothoff <christian@grothoff.org> | 2011-10-11 09:43:04 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2011-10-11 09:43:04 +0000 |
commit | d9d94d0e53d26af75ec8241383d166544ebd79f3 (patch) | |
tree | 9080b73624389403a198257fe0547bb4634e64d2 /src/util/test_crypto_rsa.c | |
parent | 2d792ee2e9cc0c993b8907e2c8edb0c2b8465343 (diff) | |
download | gnunet-d9d94d0e53d26af75ec8241383d166544ebd79f3.tar.gz gnunet-d9d94d0e53d26af75ec8241383d166544ebd79f3.zip |
converting to GNUNET_LOG_from*
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r-- | src/util/test_crypto_rsa.c | 210 |
1 files changed, 106 insertions, 104 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c index f26a76a38..6a2c1b355 100644 --- a/src/util/test_crypto_rsa.c +++ b/src/util/test_crypto_rsa.c | |||
@@ -54,36 +54,36 @@ testEncryptDecrypt () | |||
54 | ok = 0; | 54 | ok = 0; |
55 | start = GNUNET_TIME_absolute_get (); | 55 | start = GNUNET_TIME_absolute_get (); |
56 | for (i = 0; i < ITER; i++) | 56 | for (i = 0; i < ITER; i++) |
57 | { | ||
58 | fprintf (stderr, "."); | ||
59 | if (GNUNET_SYSERR == | ||
60 | GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey, | ||
61 | &target)) | ||
62 | { | 57 | { |
63 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | 58 | fprintf (stderr, "."); |
64 | ok++; | 59 | if (GNUNET_SYSERR == |
65 | continue; | 60 | GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, |
66 | } | 61 | &pkey, &target)) |
67 | if (-1 == | 62 | { |
68 | GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result, | 63 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); |
69 | strlen (TESTSTRING) + 1)) | 64 | ok++; |
70 | { | 65 | continue; |
71 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | 66 | } |
72 | ok++; | 67 | if (-1 == |
73 | continue; | 68 | GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result, |
69 | strlen (TESTSTRING) + 1)) | ||
70 | { | ||
71 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
72 | ok++; | ||
73 | continue; | ||
74 | 74 | ||
75 | } | ||
76 | if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0) | ||
77 | { | ||
78 | printf ("%s != %.*s - testEncryptDecrypt failed!\n", TESTSTRING, | ||
79 | (int) MAX_TESTVAL, result); | ||
80 | ok++; | ||
81 | continue; | ||
82 | } | ||
75 | } | 83 | } |
76 | if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0) | ||
77 | { | ||
78 | printf ("%s != %.*s - testEncryptDecrypt failed!\n", TESTSTRING, | ||
79 | (int) MAX_TESTVAL, result); | ||
80 | ok++; | ||
81 | continue; | ||
82 | } | ||
83 | } | ||
84 | printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER, | 84 | printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER, |
85 | (unsigned long long) | 85 | (unsigned long long) |
86 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); | 86 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); |
87 | GNUNET_CRYPTO_rsa_key_free (hostkey); | 87 | GNUNET_CRYPTO_rsa_key_free (hostkey); |
88 | if (ok == 0) | 88 | if (ok == 0) |
89 | return GNUNET_OK; | 89 | return GNUNET_OK; |
@@ -109,20 +109,20 @@ testEncryptPerformance () | |||
109 | ok = 0; | 109 | ok = 0; |
110 | start = GNUNET_TIME_absolute_get (); | 110 | start = GNUNET_TIME_absolute_get (); |
111 | for (i = 0; i < ITER; i++) | 111 | for (i = 0; i < ITER; i++) |
112 | { | ||
113 | fprintf (stderr, "."); | ||
114 | if (GNUNET_SYSERR == | ||
115 | GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey, | ||
116 | &target)) | ||
117 | { | 112 | { |
118 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | 113 | fprintf (stderr, "."); |
119 | ok++; | 114 | if (GNUNET_SYSERR == |
120 | continue; | 115 | GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, |
116 | &pkey, &target)) | ||
117 | { | ||
118 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
119 | ok++; | ||
120 | continue; | ||
121 | } | ||
121 | } | 122 | } |
122 | } | ||
123 | printf ("%d RSA encrypt operations %llu ms (%d failures)\n", ITER, | 123 | printf ("%d RSA encrypt operations %llu ms (%d failures)\n", ITER, |
124 | (unsigned long long) | 124 | (unsigned long long) |
125 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); | 125 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); |
126 | GNUNET_CRYPTO_rsa_key_free (hostkey); | 126 | GNUNET_CRYPTO_rsa_key_free (hostkey); |
127 | if (ok != 0) | 127 | if (ok != 0) |
128 | return GNUNET_SYSERR; | 128 | return GNUNET_SYSERR; |
@@ -149,37 +149,39 @@ testEncryptDecryptSK () | |||
149 | ok = 0; | 149 | ok = 0; |
150 | start = GNUNET_TIME_absolute_get (); | 150 | start = GNUNET_TIME_absolute_get (); |
151 | for (i = 0; i < ITER; i++) | 151 | for (i = 0; i < ITER; i++) |
152 | { | ||
153 | fprintf (stderr, "."); | ||
154 | GNUNET_CRYPTO_aes_create_session_key (&insk); | ||
155 | if (GNUNET_SYSERR == | ||
156 | GNUNET_CRYPTO_rsa_encrypt (&insk, | ||
157 | sizeof (struct GNUNET_CRYPTO_AesSessionKey), | ||
158 | &pkey, &target)) | ||
159 | { | ||
160 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
161 | ok++; | ||
162 | continue; | ||
163 | } | ||
164 | if (-1 == | ||
165 | GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, &outsk, | ||
166 | sizeof (struct GNUNET_CRYPTO_AesSessionKey))) | ||
167 | { | ||
168 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
169 | ok++; | ||
170 | continue; | ||
171 | } | ||
172 | if (0 != | ||
173 | memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey))) | ||
174 | { | 152 | { |
175 | printf ("testEncryptDecryptSK failed!\n"); | 153 | fprintf (stderr, "."); |
176 | ok++; | 154 | GNUNET_CRYPTO_aes_create_session_key (&insk); |
177 | continue; | 155 | if (GNUNET_SYSERR == |
156 | GNUNET_CRYPTO_rsa_encrypt (&insk, | ||
157 | sizeof (struct | ||
158 | GNUNET_CRYPTO_AesSessionKey), | ||
159 | &pkey, &target)) | ||
160 | { | ||
161 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
162 | ok++; | ||
163 | continue; | ||
164 | } | ||
165 | if (-1 == | ||
166 | GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, &outsk, | ||
167 | sizeof (struct | ||
168 | GNUNET_CRYPTO_AesSessionKey))) | ||
169 | { | ||
170 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
171 | ok++; | ||
172 | continue; | ||
173 | } | ||
174 | if (0 != | ||
175 | memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey))) | ||
176 | { | ||
177 | printf ("testEncryptDecryptSK failed!\n"); | ||
178 | ok++; | ||
179 | continue; | ||
180 | } | ||
178 | } | 181 | } |
179 | } | ||
180 | printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", ITER, | 182 | printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", ITER, |
181 | (unsigned long long) | 183 | (unsigned long long) |
182 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); | 184 | GNUNET_TIME_absolute_get_duration (start).rel_value, ok); |
183 | GNUNET_CRYPTO_rsa_key_free (hostkey); | 185 | GNUNET_CRYPTO_rsa_key_free (hostkey); |
184 | if (ok != 0) | 186 | if (ok != 0) |
185 | return GNUNET_SYSERR; | 187 | return GNUNET_SYSERR; |
@@ -206,34 +208,34 @@ testSignVerify () | |||
206 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); | 208 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); |
207 | 209 | ||
208 | for (i = 0; i < ITER; i++) | 210 | for (i = 0; i < ITER; i++) |
209 | { | ||
210 | fprintf (stderr, "."); | ||
211 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | ||
212 | { | ||
213 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | ||
214 | ok = GNUNET_SYSERR; | ||
215 | continue; | ||
216 | } | ||
217 | if (GNUNET_SYSERR == | ||
218 | GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig, | ||
219 | &pkey)) | ||
220 | { | 211 | { |
221 | printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); | 212 | fprintf (stderr, "."); |
222 | ok = GNUNET_SYSERR; | 213 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) |
223 | continue; | 214 | { |
215 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | ||
216 | ok = GNUNET_SYSERR; | ||
217 | continue; | ||
218 | } | ||
219 | if (GNUNET_SYSERR == | ||
220 | GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, | ||
221 | &sig, &pkey)) | ||
222 | { | ||
223 | printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); | ||
224 | ok = GNUNET_SYSERR; | ||
225 | continue; | ||
226 | } | ||
227 | if (GNUNET_SYSERR != | ||
228 | GNUNET_CRYPTO_rsa_verify | ||
229 | (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey)) | ||
230 | { | ||
231 | printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n"); | ||
232 | ok = GNUNET_SYSERR; | ||
233 | continue; | ||
234 | } | ||
224 | } | 235 | } |
225 | if (GNUNET_SYSERR != | ||
226 | GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, | ||
227 | &purp, &sig, &pkey)) | ||
228 | { | ||
229 | printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n"); | ||
230 | ok = GNUNET_SYSERR; | ||
231 | continue; | ||
232 | } | ||
233 | } | ||
234 | printf ("%d RSA sign/verify operations %llums\n", ITER, | 236 | printf ("%d RSA sign/verify operations %llums\n", ITER, |
235 | (unsigned long long) | 237 | (unsigned long long) |
236 | GNUNET_TIME_absolute_get_duration (start).rel_value); | 238 | GNUNET_TIME_absolute_get_duration (start).rel_value); |
237 | GNUNET_CRYPTO_rsa_key_free (hostkey); | 239 | GNUNET_CRYPTO_rsa_key_free (hostkey); |
238 | return ok; | 240 | return ok; |
239 | } | 241 | } |
@@ -258,18 +260,18 @@ testSignPerformance () | |||
258 | GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); | 260 | GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); |
259 | start = GNUNET_TIME_absolute_get (); | 261 | start = GNUNET_TIME_absolute_get (); |
260 | for (i = 0; i < ITER; i++) | 262 | for (i = 0; i < ITER; i++) |
261 | { | ||
262 | fprintf (stderr, "."); | ||
263 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | ||
264 | { | 263 | { |
265 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | 264 | fprintf (stderr, "."); |
266 | ok = GNUNET_SYSERR; | 265 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) |
267 | continue; | 266 | { |
267 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | ||
268 | ok = GNUNET_SYSERR; | ||
269 | continue; | ||
270 | } | ||
268 | } | 271 | } |
269 | } | ||
270 | printf ("%d RSA sign operations %llu ms\n", ITER, | 272 | printf ("%d RSA sign operations %llu ms\n", ITER, |
271 | (unsigned long long) | 273 | (unsigned long long) |
272 | GNUNET_TIME_absolute_get_duration (start).rel_value); | 274 | GNUNET_TIME_absolute_get_duration (start).rel_value); |
273 | GNUNET_CRYPTO_rsa_key_free (hostkey); | 275 | GNUNET_CRYPTO_rsa_key_free (hostkey); |
274 | return ok; | 276 | return ok; |
275 | } | 277 | } |
@@ -326,9 +328,9 @@ main (int argc, char *argv[]) | |||
326 | failureCount++; | 328 | failureCount++; |
327 | 329 | ||
328 | if (failureCount != 0) | 330 | if (failureCount != 0) |
329 | { | 331 | { |
330 | printf ("\n\n%d TESTS FAILED!\n\n", failureCount); | 332 | printf ("\n\n%d TESTS FAILED!\n\n", failureCount); |
331 | return -1; | 333 | return -1; |
332 | } | 334 | } |
333 | return 0; | 335 | return 0; |
334 | } /* end of main */ | 336 | } /* end of main */ |