diff options
author | Christian Grothoff <christian@grothoff.org> | 2013-09-30 11:32:30 +0000 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2013-09-30 11:32:30 +0000 |
commit | 45b5c1f11144bc14fae34c991ae9db89d6ba8913 (patch) | |
tree | f4a2fbe70573e0d9bb56d4ccb8be29fcf0c50c55 /src/util/test_crypto_symmetric.c | |
parent | 05ef63d9f8cf65561b7ed2234efdc80e3fb40bd0 (diff) | |
download | gnunet-45b5c1f11144bc14fae34c991ae9db89d6ba8913.tar.gz gnunet-45b5c1f11144bc14fae34c991ae9db89d6ba8913.zip |
-rename files/symbols from _aes to _symmetric
Diffstat (limited to 'src/util/test_crypto_symmetric.c')
-rw-r--r-- | src/util/test_crypto_symmetric.c | 171 |
1 files changed, 171 insertions, 0 deletions
diff --git a/src/util/test_crypto_symmetric.c b/src/util/test_crypto_symmetric.c new file mode 100644 index 000000000..b350e9efe --- /dev/null +++ b/src/util/test_crypto_symmetric.c | |||
@@ -0,0 +1,171 @@ | |||
1 | /* | ||
2 | This file is part of GNUnet. | ||
3 | (C) 2002, 2003, 2004, 2006 Christian Grothoff (and other contributing authors) | ||
4 | |||
5 | GNUnet is free software; you can redistribute it and/or modify | ||
6 | it under the terms of the GNU General Public License as published | ||
7 | by the Free Software Foundation; either version 3, or (at your | ||
8 | option) any later version. | ||
9 | |||
10 | GNUnet is distributed in the hope that it will be useful, but | ||
11 | WITHOUT ANY WARRANTY; without even the implied warranty of | ||
12 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | ||
13 | General Public License for more details. | ||
14 | |||
15 | You should have received a copy of the GNU General Public License | ||
16 | along with GNUnet; see the file COPYING. If not, write to the | ||
17 | Free Software Foundation, Inc., 59 Temple Place - Suite 330, | ||
18 | Boston, MA 02111-1307, USA. | ||
19 | |||
20 | */ | ||
21 | /** | ||
22 | * @author Christian Grothoff | ||
23 | * @file util/test_crypto_symmetric.c | ||
24 | * @brief test for AES ciphers | ||
25 | */ | ||
26 | #include "platform.h" | ||
27 | #include "gnunet_common.h" | ||
28 | #include "gnunet_crypto_lib.h" | ||
29 | |||
30 | #define TESTSTRING "Hello World!" | ||
31 | #define INITVALUE "InitializationVectorValueinitializationvectorvalue" | ||
32 | |||
33 | static int | ||
34 | testSymcipher () | ||
35 | { | ||
36 | struct GNUNET_CRYPTO_SymmetricSessionKey key; | ||
37 | char result[100]; | ||
38 | int size; | ||
39 | char res[100]; | ||
40 | |||
41 | GNUNET_CRYPTO_symmetric_create_session_key (&key); | ||
42 | size = | ||
43 | GNUNET_CRYPTO_symmetric_encrypt (TESTSTRING, strlen (TESTSTRING) + 1, &key, | ||
44 | (const struct | ||
45 | GNUNET_CRYPTO_SymmetricInitializationVector *) | ||
46 | INITVALUE, result); | ||
47 | if (size == -1) | ||
48 | { | ||
49 | printf ("symciphertest failed: encryptBlock returned %d\n", size); | ||
50 | return 1; | ||
51 | } | ||
52 | size = | ||
53 | GNUNET_CRYPTO_symmetric_decrypt (result, size, &key, | ||
54 | (const struct | ||
55 | GNUNET_CRYPTO_SymmetricInitializationVector *) | ||
56 | INITVALUE, res); | ||
57 | if (strlen (TESTSTRING) + 1 != size) | ||
58 | { | ||
59 | printf ("symciphertest failed: decryptBlock returned %d\n", size); | ||
60 | return 1; | ||
61 | } | ||
62 | if (0 != strcmp (res, TESTSTRING)) | ||
63 | { | ||
64 | printf ("symciphertest failed: %s != %s\n", res, TESTSTRING); | ||
65 | return 1; | ||
66 | } | ||
67 | else | ||
68 | return 0; | ||
69 | } | ||
70 | |||
71 | |||
72 | static int | ||
73 | verifyCrypto () | ||
74 | { | ||
75 | struct GNUNET_CRYPTO_SymmetricSessionKey key; | ||
76 | char result[GNUNET_CRYPTO_AES_KEY_LENGTH]; | ||
77 | char *res; | ||
78 | int ret; | ||
79 | |||
80 | unsigned char plain[] = | ||
81 | { | ||
82 | 29, 128, 192, 253, 74, 171, 38, 187, 84, 219, 76, 76, 209, 118, 33, 249, | ||
83 | 172, 124, 96, 9, 157, 110, 8, 215, 200, 63, 69, 230, 157, 104, 247, 164 | ||
84 | }; | ||
85 | unsigned char raw_key_aes[] = | ||
86 | { | ||
87 | 106, 74, 209, 88, 145, 55, 189, 135, 125, 180, 225, 108, 183, 54, 25, | ||
88 | 169, 129, 188, 131, 75, 227, 245, 105, 10, 225, 15, 115, 159, 148, 184, | ||
89 | 34, 191 | ||
90 | }; | ||
91 | unsigned char raw_key_twofish[] = | ||
92 | { | ||
93 | 145, 55, 189, 135, 125, 180, 225, 108, 183, 54, 25, | ||
94 | 169, 129, 188, 131, 75, 227, 245, 105, 10, 225, 15, 115, 159, 148, 184, | ||
95 | 34, 191, 106, 74, 209, 88 | ||
96 | }; | ||
97 | unsigned char encrresult[] = | ||
98 | { | ||
99 | 161, 152, 186, 231, 214, 55, 225, 206, 85, 43, 80, 134, 145, 198, 20, | ||
100 | 233, 236, 57, 194, 10, 147, 149, 30, 106, 179, 54, 182, 247, 71, 204, | ||
101 | 179, 51, 1 | ||
102 | }; | ||
103 | |||
104 | res = NULL; | ||
105 | ret = 0; | ||
106 | |||
107 | memcpy (key.aes_key, raw_key_aes, GNUNET_CRYPTO_AES_KEY_LENGTH); | ||
108 | memcpy (key.twofish_key, raw_key_twofish, GNUNET_CRYPTO_AES_KEY_LENGTH); | ||
109 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != | ||
110 | GNUNET_CRYPTO_symmetric_encrypt (plain, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, | ||
111 | (const struct | ||
112 | GNUNET_CRYPTO_SymmetricInitializationVector *) | ||
113 | "testtesttesttest", result)) | ||
114 | { | ||
115 | printf ("Wrong return value from encrypt block.\n"); | ||
116 | ret = 1; | ||
117 | goto error; | ||
118 | } | ||
119 | |||
120 | if (0 != memcmp (encrresult, result, GNUNET_CRYPTO_AES_KEY_LENGTH)) | ||
121 | { | ||
122 | int i; | ||
123 | printf ("Encrypted result wrong.\n"); | ||
124 | for (i=0;i<GNUNET_CRYPTO_AES_KEY_LENGTH;i++) | ||
125 | printf ("%u, ", (uint8_t) result[i]); | ||
126 | ret = 1; | ||
127 | goto error; | ||
128 | } | ||
129 | |||
130 | res = GNUNET_malloc (GNUNET_CRYPTO_AES_KEY_LENGTH); | ||
131 | if (GNUNET_CRYPTO_AES_KEY_LENGTH != | ||
132 | GNUNET_CRYPTO_symmetric_decrypt (result, GNUNET_CRYPTO_AES_KEY_LENGTH, &key, | ||
133 | (const struct | ||
134 | GNUNET_CRYPTO_SymmetricInitializationVector *) | ||
135 | "testtesttesttest", res)) | ||
136 | { | ||
137 | printf ("Wrong return value from decrypt block.\n"); | ||
138 | ret = 1; | ||
139 | goto error; | ||
140 | } | ||
141 | if (0 != memcmp (res, plain, GNUNET_CRYPTO_AES_KEY_LENGTH)) | ||
142 | { | ||
143 | printf ("Decrypted result does not match input.\n"); | ||
144 | ret = 1; | ||
145 | } | ||
146 | error: | ||
147 | GNUNET_free_non_null (res); | ||
148 | return ret; | ||
149 | } | ||
150 | |||
151 | |||
152 | int | ||
153 | main (int argc, char *argv[]) | ||
154 | { | ||
155 | int failureCount = 0; | ||
156 | |||
157 | GNUNET_log_setup ("test-crypto-aes", "WARNING", NULL); | ||
158 | GNUNET_assert (strlen (INITVALUE) > | ||
159 | sizeof (struct GNUNET_CRYPTO_SymmetricInitializationVector)); | ||
160 | failureCount += testSymcipher (); | ||
161 | failureCount += verifyCrypto (); | ||
162 | |||
163 | if (failureCount != 0) | ||
164 | { | ||
165 | printf ("%d TESTS FAILED!\n", failureCount); | ||
166 | return -1; | ||
167 | } | ||
168 | return 0; | ||
169 | } | ||
170 | |||
171 | /* end of test_crypto_aes.c */ | ||