aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_rsa.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2011-10-11 09:43:04 +0000
committerChristian Grothoff <christian@grothoff.org>2011-10-11 09:43:04 +0000
commitd9d94d0e53d26af75ec8241383d166544ebd79f3 (patch)
tree9080b73624389403a198257fe0547bb4634e64d2 /src/util/test_crypto_rsa.c
parent2d792ee2e9cc0c993b8907e2c8edb0c2b8465343 (diff)
downloadgnunet-d9d94d0e53d26af75ec8241383d166544ebd79f3.tar.gz
gnunet-d9d94d0e53d26af75ec8241383d166544ebd79f3.zip
converting to GNUNET_LOG_from*
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r--src/util/test_crypto_rsa.c210
1 files changed, 106 insertions, 104 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c
index f26a76a38..6a2c1b355 100644
--- a/src/util/test_crypto_rsa.c
+++ b/src/util/test_crypto_rsa.c
@@ -54,36 +54,36 @@ testEncryptDecrypt ()
54 ok = 0; 54 ok = 0;
55 start = GNUNET_TIME_absolute_get (); 55 start = GNUNET_TIME_absolute_get ();
56 for (i = 0; i < ITER; i++) 56 for (i = 0; i < ITER; i++)
57 {
58 fprintf (stderr, ".");
59 if (GNUNET_SYSERR ==
60 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey,
61 &target))
62 { 57 {
63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 58 fprintf (stderr, ".");
64 ok++; 59 if (GNUNET_SYSERR ==
65 continue; 60 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1,
66 } 61 &pkey, &target))
67 if (-1 == 62 {
68 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result, 63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
69 strlen (TESTSTRING) + 1)) 64 ok++;
70 { 65 continue;
71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); 66 }
72 ok++; 67 if (-1 ==
73 continue; 68 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, result,
69 strlen (TESTSTRING) + 1))
70 {
71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
72 ok++;
73 continue;
74 74
75 }
76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
77 {
78 printf ("%s != %.*s - testEncryptDecrypt failed!\n", TESTSTRING,
79 (int) MAX_TESTVAL, result);
80 ok++;
81 continue;
82 }
75 } 83 }
76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
77 {
78 printf ("%s != %.*s - testEncryptDecrypt failed!\n", TESTSTRING,
79 (int) MAX_TESTVAL, result);
80 ok++;
81 continue;
82 }
83 }
84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER, 84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", ITER,
85 (unsigned long long) 85 (unsigned long long)
86 GNUNET_TIME_absolute_get_duration (start).rel_value, ok); 86 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
87 GNUNET_CRYPTO_rsa_key_free (hostkey); 87 GNUNET_CRYPTO_rsa_key_free (hostkey);
88 if (ok == 0) 88 if (ok == 0)
89 return GNUNET_OK; 89 return GNUNET_OK;
@@ -109,20 +109,20 @@ testEncryptPerformance ()
109 ok = 0; 109 ok = 0;
110 start = GNUNET_TIME_absolute_get (); 110 start = GNUNET_TIME_absolute_get ();
111 for (i = 0; i < ITER; i++) 111 for (i = 0; i < ITER; i++)
112 {
113 fprintf (stderr, ".");
114 if (GNUNET_SYSERR ==
115 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &pkey,
116 &target))
117 { 112 {
118 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 113 fprintf (stderr, ".");
119 ok++; 114 if (GNUNET_SYSERR ==
120 continue; 115 GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, strlen (TESTSTRING) + 1,
116 &pkey, &target))
117 {
118 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
119 ok++;
120 continue;
121 }
121 } 122 }
122 }
123 printf ("%d RSA encrypt operations %llu ms (%d failures)\n", ITER, 123 printf ("%d RSA encrypt operations %llu ms (%d failures)\n", ITER,
124 (unsigned long long) 124 (unsigned long long)
125 GNUNET_TIME_absolute_get_duration (start).rel_value, ok); 125 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
126 GNUNET_CRYPTO_rsa_key_free (hostkey); 126 GNUNET_CRYPTO_rsa_key_free (hostkey);
127 if (ok != 0) 127 if (ok != 0)
128 return GNUNET_SYSERR; 128 return GNUNET_SYSERR;
@@ -149,37 +149,39 @@ testEncryptDecryptSK ()
149 ok = 0; 149 ok = 0;
150 start = GNUNET_TIME_absolute_get (); 150 start = GNUNET_TIME_absolute_get ();
151 for (i = 0; i < ITER; i++) 151 for (i = 0; i < ITER; i++)
152 {
153 fprintf (stderr, ".");
154 GNUNET_CRYPTO_aes_create_session_key (&insk);
155 if (GNUNET_SYSERR ==
156 GNUNET_CRYPTO_rsa_encrypt (&insk,
157 sizeof (struct GNUNET_CRYPTO_AesSessionKey),
158 &pkey, &target))
159 {
160 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
161 ok++;
162 continue;
163 }
164 if (-1 ==
165 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, &outsk,
166 sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
167 {
168 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
169 ok++;
170 continue;
171 }
172 if (0 !=
173 memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
174 { 152 {
175 printf ("testEncryptDecryptSK failed!\n"); 153 fprintf (stderr, ".");
176 ok++; 154 GNUNET_CRYPTO_aes_create_session_key (&insk);
177 continue; 155 if (GNUNET_SYSERR ==
156 GNUNET_CRYPTO_rsa_encrypt (&insk,
157 sizeof (struct
158 GNUNET_CRYPTO_AesSessionKey),
159 &pkey, &target))
160 {
161 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
162 ok++;
163 continue;
164 }
165 if (-1 ==
166 GNUNET_CRYPTO_rsa_decrypt (hostkey, &target, &outsk,
167 sizeof (struct
168 GNUNET_CRYPTO_AesSessionKey)))
169 {
170 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
171 ok++;
172 continue;
173 }
174 if (0 !=
175 memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
176 {
177 printf ("testEncryptDecryptSK failed!\n");
178 ok++;
179 continue;
180 }
178 } 181 }
179 }
180 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", ITER, 182 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", ITER,
181 (unsigned long long) 183 (unsigned long long)
182 GNUNET_TIME_absolute_get_duration (start).rel_value, ok); 184 GNUNET_TIME_absolute_get_duration (start).rel_value, ok);
183 GNUNET_CRYPTO_rsa_key_free (hostkey); 185 GNUNET_CRYPTO_rsa_key_free (hostkey);
184 if (ok != 0) 186 if (ok != 0)
185 return GNUNET_SYSERR; 187 return GNUNET_SYSERR;
@@ -206,34 +208,34 @@ testSignVerify ()
206 purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); 208 purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
207 209
208 for (i = 0; i < ITER; i++) 210 for (i = 0; i < ITER; i++)
209 {
210 fprintf (stderr, ".");
211 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
212 {
213 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
214 ok = GNUNET_SYSERR;
215 continue;
216 }
217 if (GNUNET_SYSERR ==
218 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig,
219 &pkey))
220 { 211 {
221 printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); 212 fprintf (stderr, ".");
222 ok = GNUNET_SYSERR; 213 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
223 continue; 214 {
215 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
216 ok = GNUNET_SYSERR;
217 continue;
218 }
219 if (GNUNET_SYSERR ==
220 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp,
221 &sig, &pkey))
222 {
223 printf ("GNUNET_CRYPTO_rsa_verify failed!\n");
224 ok = GNUNET_SYSERR;
225 continue;
226 }
227 if (GNUNET_SYSERR !=
228 GNUNET_CRYPTO_rsa_verify
229 (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey))
230 {
231 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
232 ok = GNUNET_SYSERR;
233 continue;
234 }
224 } 235 }
225 if (GNUNET_SYSERR !=
226 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN,
227 &purp, &sig, &pkey))
228 {
229 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
230 ok = GNUNET_SYSERR;
231 continue;
232 }
233 }
234 printf ("%d RSA sign/verify operations %llums\n", ITER, 236 printf ("%d RSA sign/verify operations %llums\n", ITER,
235 (unsigned long long) 237 (unsigned long long)
236 GNUNET_TIME_absolute_get_duration (start).rel_value); 238 GNUNET_TIME_absolute_get_duration (start).rel_value);
237 GNUNET_CRYPTO_rsa_key_free (hostkey); 239 GNUNET_CRYPTO_rsa_key_free (hostkey);
238 return ok; 240 return ok;
239} 241}
@@ -258,18 +260,18 @@ testSignPerformance ()
258 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); 260 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey);
259 start = GNUNET_TIME_absolute_get (); 261 start = GNUNET_TIME_absolute_get ();
260 for (i = 0; i < ITER; i++) 262 for (i = 0; i < ITER; i++)
261 {
262 fprintf (stderr, ".");
263 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
264 { 263 {
265 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); 264 fprintf (stderr, ".");
266 ok = GNUNET_SYSERR; 265 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
267 continue; 266 {
267 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
268 ok = GNUNET_SYSERR;
269 continue;
270 }
268 } 271 }
269 }
270 printf ("%d RSA sign operations %llu ms\n", ITER, 272 printf ("%d RSA sign operations %llu ms\n", ITER,
271 (unsigned long long) 273 (unsigned long long)
272 GNUNET_TIME_absolute_get_duration (start).rel_value); 274 GNUNET_TIME_absolute_get_duration (start).rel_value);
273 GNUNET_CRYPTO_rsa_key_free (hostkey); 275 GNUNET_CRYPTO_rsa_key_free (hostkey);
274 return ok; 276 return ok;
275} 277}
@@ -326,9 +328,9 @@ main (int argc, char *argv[])
326 failureCount++; 328 failureCount++;
327 329
328 if (failureCount != 0) 330 if (failureCount != 0)
329 { 331 {
330 printf ("\n\n%d TESTS FAILED!\n\n", failureCount); 332 printf ("\n\n%d TESTS FAILED!\n\n", failureCount);
331 return -1; 333 return -1;
332 } 334 }
333 return 0; 335 return 0;
334} /* end of main */ 336} /* end of main */