diff options
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r-- | src/util/test_crypto_rsa.c | 190 |
1 files changed, 95 insertions, 95 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c index 396294a48..d7c23731e 100644 --- a/src/util/test_crypto_rsa.c +++ b/src/util/test_crypto_rsa.c | |||
@@ -54,33 +54,33 @@ testEncryptDecrypt () | |||
54 | ok = 0; | 54 | ok = 0; |
55 | start = GNUNET_TIME_absolute_get (); | 55 | start = GNUNET_TIME_absolute_get (); |
56 | for (i = 0; i < ITER; i++) | 56 | for (i = 0; i < ITER; i++) |
57 | { | ||
58 | fprintf (stderr, "."); | ||
59 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, | ||
60 | strlen (TESTSTRING) + 1, | ||
61 | &pkey, &target)) | ||
57 | { | 62 | { |
58 | fprintf (stderr, "."); | 63 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); |
59 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, | 64 | ok++; |
60 | strlen (TESTSTRING) + 1, | 65 | continue; |
61 | &pkey, &target)) | 66 | } |
62 | { | 67 | if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, |
63 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | 68 | &target, result, |
64 | ok++; | 69 | strlen (TESTSTRING) + 1)) |
65 | continue; | 70 | { |
66 | } | 71 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); |
67 | if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, | 72 | ok++; |
68 | &target, result, | 73 | continue; |
69 | strlen (TESTSTRING) + 1)) | ||
70 | { | ||
71 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
72 | ok++; | ||
73 | continue; | ||
74 | 74 | ||
75 | } | ||
76 | if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0) | ||
77 | { | ||
78 | printf ("%s != %.*s - testEncryptDecrypt failed!\n", | ||
79 | TESTSTRING, (int) MAX_TESTVAL, result); | ||
80 | ok++; | ||
81 | continue; | ||
82 | } | ||
83 | } | 75 | } |
76 | if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0) | ||
77 | { | ||
78 | printf ("%s != %.*s - testEncryptDecrypt failed!\n", | ||
79 | TESTSTRING, (int) MAX_TESTVAL, result); | ||
80 | ok++; | ||
81 | continue; | ||
82 | } | ||
83 | } | ||
84 | printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", | 84 | printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", |
85 | ITER, | 85 | ITER, |
86 | (unsigned long long) | 86 | (unsigned long long) |
@@ -110,17 +110,17 @@ testEncryptPerformance () | |||
110 | ok = 0; | 110 | ok = 0; |
111 | start = GNUNET_TIME_absolute_get (); | 111 | start = GNUNET_TIME_absolute_get (); |
112 | for (i = 0; i < ITER; i++) | 112 | for (i = 0; i < ITER; i++) |
113 | { | ||
114 | fprintf (stderr, "."); | ||
115 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, | ||
116 | strlen (TESTSTRING) + 1, | ||
117 | &pkey, &target)) | ||
113 | { | 118 | { |
114 | fprintf (stderr, "."); | 119 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); |
115 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, | 120 | ok++; |
116 | strlen (TESTSTRING) + 1, | 121 | continue; |
117 | &pkey, &target)) | ||
118 | { | ||
119 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
120 | ok++; | ||
121 | continue; | ||
122 | } | ||
123 | } | 122 | } |
123 | } | ||
124 | printf ("%d RSA encrypt operations %llu ms (%d failures)\n", | 124 | printf ("%d RSA encrypt operations %llu ms (%d failures)\n", |
125 | ITER, | 125 | ITER, |
126 | (unsigned long long) | 126 | (unsigned long long) |
@@ -151,35 +151,35 @@ testEncryptDecryptSK () | |||
151 | ok = 0; | 151 | ok = 0; |
152 | start = GNUNET_TIME_absolute_get (); | 152 | start = GNUNET_TIME_absolute_get (); |
153 | for (i = 0; i < ITER; i++) | 153 | for (i = 0; i < ITER; i++) |
154 | { | ||
155 | fprintf (stderr, "."); | ||
156 | GNUNET_CRYPTO_aes_create_session_key (&insk); | ||
157 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (&insk, | ||
158 | sizeof (struct | ||
159 | GNUNET_CRYPTO_AesSessionKey), | ||
160 | &pkey, &target)) | ||
161 | { | ||
162 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
163 | ok++; | ||
164 | continue; | ||
165 | } | ||
166 | if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, | ||
167 | &target, &outsk, | ||
168 | sizeof (struct | ||
169 | GNUNET_CRYPTO_AesSessionKey))) | ||
170 | { | ||
171 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
172 | ok++; | ||
173 | continue; | ||
174 | } | ||
175 | if (0 != | ||
176 | memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey))) | ||
154 | { | 177 | { |
155 | fprintf (stderr, "."); | 178 | printf ("testEncryptDecryptSK failed!\n"); |
156 | GNUNET_CRYPTO_aes_create_session_key (&insk); | 179 | ok++; |
157 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (&insk, | 180 | continue; |
158 | sizeof (struct | ||
159 | GNUNET_CRYPTO_AesSessionKey), | ||
160 | &pkey, &target)) | ||
161 | { | ||
162 | fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); | ||
163 | ok++; | ||
164 | continue; | ||
165 | } | ||
166 | if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, | ||
167 | &target, &outsk, | ||
168 | sizeof (struct | ||
169 | GNUNET_CRYPTO_AesSessionKey))) | ||
170 | { | ||
171 | fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n"); | ||
172 | ok++; | ||
173 | continue; | ||
174 | } | ||
175 | if (0 != | ||
176 | memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey))) | ||
177 | { | ||
178 | printf ("testEncryptDecryptSK failed!\n"); | ||
179 | ok++; | ||
180 | continue; | ||
181 | } | ||
182 | } | 181 | } |
182 | } | ||
183 | printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", | 183 | printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", |
184 | ITER, | 184 | ITER, |
185 | (unsigned long long) | 185 | (unsigned long long) |
@@ -210,31 +210,31 @@ testSignVerify () | |||
210 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); | 210 | purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); |
211 | 211 | ||
212 | for (i = 0; i < ITER; i++) | 212 | for (i = 0; i < ITER; i++) |
213 | { | ||
214 | fprintf (stderr, "."); | ||
215 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | ||
213 | { | 216 | { |
214 | fprintf (stderr, "."); | 217 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); |
215 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | 218 | ok = GNUNET_SYSERR; |
216 | { | 219 | continue; |
217 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | ||
218 | ok = GNUNET_SYSERR; | ||
219 | continue; | ||
220 | } | ||
221 | if (GNUNET_SYSERR == | ||
222 | GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, | ||
223 | &purp, &sig, &pkey)) | ||
224 | { | ||
225 | printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); | ||
226 | ok = GNUNET_SYSERR; | ||
227 | continue; | ||
228 | } | ||
229 | if (GNUNET_SYSERR != | ||
230 | GNUNET_CRYPTO_rsa_verify | ||
231 | (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey)) | ||
232 | { | ||
233 | printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n"); | ||
234 | ok = GNUNET_SYSERR; | ||
235 | continue; | ||
236 | } | ||
237 | } | 220 | } |
221 | if (GNUNET_SYSERR == | ||
222 | GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, | ||
223 | &purp, &sig, &pkey)) | ||
224 | { | ||
225 | printf ("GNUNET_CRYPTO_rsa_verify failed!\n"); | ||
226 | ok = GNUNET_SYSERR; | ||
227 | continue; | ||
228 | } | ||
229 | if (GNUNET_SYSERR != | ||
230 | GNUNET_CRYPTO_rsa_verify | ||
231 | (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey)) | ||
232 | { | ||
233 | printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n"); | ||
234 | ok = GNUNET_SYSERR; | ||
235 | continue; | ||
236 | } | ||
237 | } | ||
238 | printf ("%d RSA sign/verify operations %llums\n", | 238 | printf ("%d RSA sign/verify operations %llums\n", |
239 | ITER, | 239 | ITER, |
240 | (unsigned long long) | 240 | (unsigned long long) |
@@ -263,15 +263,15 @@ testSignPerformance () | |||
263 | GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); | 263 | GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); |
264 | start = GNUNET_TIME_absolute_get (); | 264 | start = GNUNET_TIME_absolute_get (); |
265 | for (i = 0; i < ITER; i++) | 265 | for (i = 0; i < ITER; i++) |
266 | { | ||
267 | fprintf (stderr, "."); | ||
268 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | ||
266 | { | 269 | { |
267 | fprintf (stderr, "."); | 270 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); |
268 | if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) | 271 | ok = GNUNET_SYSERR; |
269 | { | 272 | continue; |
270 | fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n"); | ||
271 | ok = GNUNET_SYSERR; | ||
272 | continue; | ||
273 | } | ||
274 | } | 273 | } |
274 | } | ||
275 | printf ("%d RSA sign operations %llu ms\n", ITER, | 275 | printf ("%d RSA sign operations %llu ms\n", ITER, |
276 | (unsigned long long) | 276 | (unsigned long long) |
277 | GNUNET_TIME_absolute_get_duration (start).rel_value); | 277 | GNUNET_TIME_absolute_get_duration (start).rel_value); |
@@ -292,7 +292,7 @@ testCreateFromFile () | |||
292 | GNUNET_assert (NULL != key); | 292 | GNUNET_assert (NULL != key); |
293 | GNUNET_CRYPTO_rsa_key_get_public (key, &p1); | 293 | GNUNET_CRYPTO_rsa_key_get_public (key, &p1); |
294 | GNUNET_CRYPTO_rsa_key_free (key); | 294 | GNUNET_CRYPTO_rsa_key_free (key); |
295 | key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE); | 295 | key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE); |
296 | GNUNET_assert (NULL != key); | 296 | GNUNET_assert (NULL != key); |
297 | GNUNET_CRYPTO_rsa_key_get_public (key, &p2); | 297 | GNUNET_CRYPTO_rsa_key_get_public (key, &p2); |
298 | GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); | 298 | GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); |
@@ -331,9 +331,9 @@ main (int argc, char *argv[]) | |||
331 | failureCount++; | 331 | failureCount++; |
332 | 332 | ||
333 | if (failureCount != 0) | 333 | if (failureCount != 0) |
334 | { | 334 | { |
335 | printf ("\n\n%d TESTS FAILED!\n\n", failureCount); | 335 | printf ("\n\n%d TESTS FAILED!\n\n", failureCount); |
336 | return -1; | 336 | return -1; |
337 | } | 337 | } |
338 | return 0; | 338 | return 0; |
339 | } /* end of main */ | 339 | } /* end of main */ |