aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_ksk.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/util/test_crypto_ksk.c')
-rw-r--r--src/util/test_crypto_ksk.c220
1 files changed, 220 insertions, 0 deletions
diff --git a/src/util/test_crypto_ksk.c b/src/util/test_crypto_ksk.c
new file mode 100644
index 000000000..c8555b5de
--- /dev/null
+++ b/src/util/test_crypto_ksk.c
@@ -0,0 +1,220 @@
1/*
2 This file is part of GNUnet.
3 Copyright (C) 2004, 2005, 2006 Christian Grothoff (and other contributing authors)
4
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 2, or (at your
8 option) any later version.
9
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
14
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
19*/
20
21/**
22 * @file util/test_crypto_ksk.c
23 * @brief testcase for util/crypto_ksk.c
24 * @author Christian Grothoff
25 */
26#include "platform.h"
27#include "gnunet_common.h"
28#include "gnunet_crypto_lib.h"
29#include "gnunet_signatures.h"
30#include "gnunet_time_lib.h"
31
32#define TESTSTRING "Hello World\0"
33#define MAX_TESTVAL 20
34#define UNIQUE_ITER 6
35#define ITER 25
36
37
38static int
39testMultiKey (const char *word)
40{
41 GNUNET_HashCode in;
42 struct GNUNET_CRYPTO_RsaPrivateKey *hostkey;
43 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
44 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey1;
45 int i;
46
47 fprintf (stderr, "Testing KBlock key uniqueness (%s) ", word);
48 GNUNET_CRYPTO_hash (word, strlen (word), &in);
49 hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in);
50 if (hostkey == NULL)
51 {
52 GNUNET_break (0);
53 return GNUNET_SYSERR;
54 }
55 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey);
56 /*
57 for (i=0;i<sizeof(struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded);i++)
58 printf("%02x", ((unsigned char*) &pkey)[i]);
59 printf("\n"); */
60 GNUNET_CRYPTO_rsa_key_free (hostkey);
61 for (i = 0; i < UNIQUE_ITER; i++)
62 {
63 fprintf (stderr, ".");
64 hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in);
65 if (hostkey == NULL)
66 {
67 GNUNET_break (0);
68 fprintf (stderr, " ERROR\n");
69 return GNUNET_SYSERR;
70 }
71 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey1);
72 GNUNET_CRYPTO_rsa_key_free (hostkey);
73 if (0 !=
74 memcmp (&pkey, &pkey1,
75 sizeof (struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded)))
76 {
77 GNUNET_break (0);
78 fprintf (stderr, " ERROR\n");
79 return GNUNET_SYSERR;
80 }
81 }
82 fprintf (stderr, " OK\n");
83 return GNUNET_OK;
84}
85
86
87static int
88testEncryptDecrypt (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey)
89{
90 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
91 struct GNUNET_CRYPTO_RsaEncryptedData target;
92 char result[MAX_TESTVAL];
93 int i;
94 struct GNUNET_TIME_Absolute start;
95 int ok;
96
97 fprintf (stderr, "W");
98 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey);
99
100 ok = 0;
101 start = GNUNET_TIME_absolute_get ();
102 for (i = 0; i < ITER; i++)
103 {
104 fprintf (stderr, ".");
105 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING,
106 strlen (TESTSTRING) + 1,
107 &pkey, &target))
108 {
109 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
110 ok++;
111 continue;
112 }
113 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey,
114 &target, result,
115 strlen (TESTSTRING) + 1))
116 {
117 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
118 ok++;
119 continue;
120 }
121 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
122 {
123 printf ("%s != %.*s - testEncryptDecrypt failed!\n",
124 TESTSTRING, MAX_TESTVAL, result);
125 ok++;
126 continue;
127 }
128 }
129 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n",
130 ITER,
131 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
132 value, ok);
133 if (ok == 0)
134 return GNUNET_OK;
135 else
136 return GNUNET_SYSERR;
137}
138
139static int
140testSignVerify (struct GNUNET_CRYPTO_RsaPrivateKey *hostkey)
141{
142 struct GNUNET_CRYPTO_RsaSignature sig;
143 struct GNUNET_CRYPTO_RsaSignaturePurpose purp;
144 struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pkey;
145 int i;
146 struct GNUNET_TIME_Absolute start;
147 int ok = GNUNET_OK;
148
149 fprintf (stderr, "W");
150 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey);
151 start = GNUNET_TIME_absolute_get ();
152 purp.size = htonl (sizeof (struct GNUNET_CRYPTO_RsaSignaturePurpose));
153 purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
154 for (i = 0; i < ITER; i++)
155 {
156 fprintf (stderr, ".");
157 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
158 {
159 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
160 ok = GNUNET_SYSERR;
161 continue;
162 }
163 if (GNUNET_SYSERR ==
164 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
165 &purp, &sig, &pkey))
166 {
167 printf ("GNUNET_CRYPTO_rsa_verify failed!\n");
168 ok = GNUNET_SYSERR;
169 continue;
170 }
171 if (GNUNET_SYSERR !=
172 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_HELLO,
173 &purp, &sig, &pkey))
174 {
175 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
176 ok = GNUNET_SYSERR;
177 continue;
178 }
179 }
180 printf ("%d RSA sign/verify operations %llums\n",
181 ITER,
182 (unsigned long long) GNUNET_TIME_absolute_get_duration (start).
183 value);
184 return ok;
185}
186
187
188int
189main (int argc, char *argv[])
190{
191 int failureCount = 0;
192 GNUNET_HashCode in;
193 struct GNUNET_CRYPTO_RsaPrivateKey *hostkey;
194
195 GNUNET_log_setup ("test-crypto-ksk", "WARNING", NULL);
196 GNUNET_CRYPTO_hash_create_random (&in);
197 hostkey = GNUNET_CRYPTO_rsa_key_create_from_hash (&in);
198 if (hostkey == NULL)
199 {
200 printf ("\nGNUNET_CRYPTO_rsa_key_create_from_hash failed!\n");
201 return 1;
202 }
203
204 if (GNUNET_OK != testMultiKey ("foo"))
205 failureCount++;
206 if (GNUNET_OK != testMultiKey ("bar"))
207 failureCount++;
208 if (GNUNET_OK != testEncryptDecrypt (hostkey))
209 failureCount++;
210 if (GNUNET_OK != testSignVerify (hostkey))
211 failureCount++;
212 GNUNET_CRYPTO_rsa_key_free (hostkey);
213
214 if (failureCount != 0)
215 {
216 printf ("\n\n%d TESTS FAILED!\n\n", failureCount);
217 return -1;
218 }
219 return 0;
220}