aboutsummaryrefslogtreecommitdiff
path: root/src/util/test_crypto_rsa.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r--src/util/test_crypto_rsa.c190
1 files changed, 95 insertions, 95 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c
index 396294a48..d7c23731e 100644
--- a/src/util/test_crypto_rsa.c
+++ b/src/util/test_crypto_rsa.c
@@ -54,33 +54,33 @@ testEncryptDecrypt ()
54 ok = 0; 54 ok = 0;
55 start = GNUNET_TIME_absolute_get (); 55 start = GNUNET_TIME_absolute_get ();
56 for (i = 0; i < ITER; i++) 56 for (i = 0; i < ITER; i++)
57 {
58 fprintf (stderr, ".");
59 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING,
60 strlen (TESTSTRING) + 1,
61 &pkey, &target))
57 { 62 {
58 fprintf (stderr, "."); 63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
59 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, 64 ok++;
60 strlen (TESTSTRING) + 1, 65 continue;
61 &pkey, &target)) 66 }
62 { 67 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey,
63 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n"); 68 &target, result,
64 ok++; 69 strlen (TESTSTRING) + 1))
65 continue; 70 {
66 } 71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
67 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey, 72 ok++;
68 &target, result, 73 continue;
69 strlen (TESTSTRING) + 1))
70 {
71 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
72 ok++;
73 continue;
74 74
75 }
76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
77 {
78 printf ("%s != %.*s - testEncryptDecrypt failed!\n",
79 TESTSTRING, (int) MAX_TESTVAL, result);
80 ok++;
81 continue;
82 }
83 } 75 }
76 if (strncmp (TESTSTRING, result, strlen (TESTSTRING)) != 0)
77 {
78 printf ("%s != %.*s - testEncryptDecrypt failed!\n",
79 TESTSTRING, (int) MAX_TESTVAL, result);
80 ok++;
81 continue;
82 }
83 }
84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n", 84 printf ("%d RSA encrypt/decrypt operations %llums (%d failures)\n",
85 ITER, 85 ITER,
86 (unsigned long long) 86 (unsigned long long)
@@ -110,17 +110,17 @@ testEncryptPerformance ()
110 ok = 0; 110 ok = 0;
111 start = GNUNET_TIME_absolute_get (); 111 start = GNUNET_TIME_absolute_get ();
112 for (i = 0; i < ITER; i++) 112 for (i = 0; i < ITER; i++)
113 {
114 fprintf (stderr, ".");
115 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING,
116 strlen (TESTSTRING) + 1,
117 &pkey, &target))
113 { 118 {
114 fprintf (stderr, "."); 119 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
115 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (TESTSTRING, 120 ok++;
116 strlen (TESTSTRING) + 1, 121 continue;
117 &pkey, &target))
118 {
119 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
120 ok++;
121 continue;
122 }
123 } 122 }
123 }
124 printf ("%d RSA encrypt operations %llu ms (%d failures)\n", 124 printf ("%d RSA encrypt operations %llu ms (%d failures)\n",
125 ITER, 125 ITER,
126 (unsigned long long) 126 (unsigned long long)
@@ -151,35 +151,35 @@ testEncryptDecryptSK ()
151 ok = 0; 151 ok = 0;
152 start = GNUNET_TIME_absolute_get (); 152 start = GNUNET_TIME_absolute_get ();
153 for (i = 0; i < ITER; i++) 153 for (i = 0; i < ITER; i++)
154 {
155 fprintf (stderr, ".");
156 GNUNET_CRYPTO_aes_create_session_key (&insk);
157 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (&insk,
158 sizeof (struct
159 GNUNET_CRYPTO_AesSessionKey),
160 &pkey, &target))
161 {
162 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
163 ok++;
164 continue;
165 }
166 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey,
167 &target, &outsk,
168 sizeof (struct
169 GNUNET_CRYPTO_AesSessionKey)))
170 {
171 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
172 ok++;
173 continue;
174 }
175 if (0 !=
176 memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
154 { 177 {
155 fprintf (stderr, "."); 178 printf ("testEncryptDecryptSK failed!\n");
156 GNUNET_CRYPTO_aes_create_session_key (&insk); 179 ok++;
157 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_encrypt (&insk, 180 continue;
158 sizeof (struct
159 GNUNET_CRYPTO_AesSessionKey),
160 &pkey, &target))
161 {
162 fprintf (stderr, "GNUNET_CRYPTO_rsa_encrypt returned SYSERR\n");
163 ok++;
164 continue;
165 }
166 if (-1 == GNUNET_CRYPTO_rsa_decrypt (hostkey,
167 &target, &outsk,
168 sizeof (struct
169 GNUNET_CRYPTO_AesSessionKey)))
170 {
171 fprintf (stderr, "GNUNET_CRYPTO_rsa_decrypt returned SYSERR\n");
172 ok++;
173 continue;
174 }
175 if (0 !=
176 memcmp (&insk, &outsk, sizeof (struct GNUNET_CRYPTO_AesSessionKey)))
177 {
178 printf ("testEncryptDecryptSK failed!\n");
179 ok++;
180 continue;
181 }
182 } 181 }
182 }
183 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n", 183 printf ("%d RSA encrypt/decrypt SK operations %llums (%d failures)\n",
184 ITER, 184 ITER,
185 (unsigned long long) 185 (unsigned long long)
@@ -210,31 +210,31 @@ testSignVerify ()
210 purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); 210 purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST);
211 211
212 for (i = 0; i < ITER; i++) 212 for (i = 0; i < ITER; i++)
213 {
214 fprintf (stderr, ".");
215 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
213 { 216 {
214 fprintf (stderr, "."); 217 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
215 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) 218 ok = GNUNET_SYSERR;
216 { 219 continue;
217 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
218 ok = GNUNET_SYSERR;
219 continue;
220 }
221 if (GNUNET_SYSERR ==
222 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
223 &purp, &sig, &pkey))
224 {
225 printf ("GNUNET_CRYPTO_rsa_verify failed!\n");
226 ok = GNUNET_SYSERR;
227 continue;
228 }
229 if (GNUNET_SYSERR !=
230 GNUNET_CRYPTO_rsa_verify
231 (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey))
232 {
233 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
234 ok = GNUNET_SYSERR;
235 continue;
236 }
237 } 220 }
221 if (GNUNET_SYSERR ==
222 GNUNET_CRYPTO_rsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST,
223 &purp, &sig, &pkey))
224 {
225 printf ("GNUNET_CRYPTO_rsa_verify failed!\n");
226 ok = GNUNET_SYSERR;
227 continue;
228 }
229 if (GNUNET_SYSERR !=
230 GNUNET_CRYPTO_rsa_verify
231 (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, &purp, &sig, &pkey))
232 {
233 printf ("GNUNET_CRYPTO_rsa_verify failed to fail!\n");
234 ok = GNUNET_SYSERR;
235 continue;
236 }
237 }
238 printf ("%d RSA sign/verify operations %llums\n", 238 printf ("%d RSA sign/verify operations %llums\n",
239 ITER, 239 ITER,
240 (unsigned long long) 240 (unsigned long long)
@@ -263,15 +263,15 @@ testSignPerformance ()
263 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey); 263 GNUNET_CRYPTO_rsa_key_get_public (hostkey, &pkey);
264 start = GNUNET_TIME_absolute_get (); 264 start = GNUNET_TIME_absolute_get ();
265 for (i = 0; i < ITER; i++) 265 for (i = 0; i < ITER; i++)
266 {
267 fprintf (stderr, ".");
268 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig))
266 { 269 {
267 fprintf (stderr, "."); 270 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
268 if (GNUNET_SYSERR == GNUNET_CRYPTO_rsa_sign (hostkey, &purp, &sig)) 271 ok = GNUNET_SYSERR;
269 { 272 continue;
270 fprintf (stderr, "GNUNET_CRYPTO_rsa_sign returned SYSERR\n");
271 ok = GNUNET_SYSERR;
272 continue;
273 }
274 } 273 }
274 }
275 printf ("%d RSA sign operations %llu ms\n", ITER, 275 printf ("%d RSA sign operations %llu ms\n", ITER,
276 (unsigned long long) 276 (unsigned long long)
277 GNUNET_TIME_absolute_get_duration (start).rel_value); 277 GNUNET_TIME_absolute_get_duration (start).rel_value);
@@ -292,7 +292,7 @@ testCreateFromFile ()
292 GNUNET_assert (NULL != key); 292 GNUNET_assert (NULL != key);
293 GNUNET_CRYPTO_rsa_key_get_public (key, &p1); 293 GNUNET_CRYPTO_rsa_key_get_public (key, &p1);
294 GNUNET_CRYPTO_rsa_key_free (key); 294 GNUNET_CRYPTO_rsa_key_free (key);
295 key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE); 295 key = GNUNET_CRYPTO_rsa_key_create_from_file (KEYFILE);
296 GNUNET_assert (NULL != key); 296 GNUNET_assert (NULL != key);
297 GNUNET_CRYPTO_rsa_key_get_public (key, &p2); 297 GNUNET_CRYPTO_rsa_key_get_public (key, &p2);
298 GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1))); 298 GNUNET_assert (0 == memcmp (&p1, &p2, sizeof (p1)));
@@ -331,9 +331,9 @@ main (int argc, char *argv[])
331 failureCount++; 331 failureCount++;
332 332
333 if (failureCount != 0) 333 if (failureCount != 0)
334 { 334 {
335 printf ("\n\n%d TESTS FAILED!\n\n", failureCount); 335 printf ("\n\n%d TESTS FAILED!\n\n", failureCount);
336 return -1; 336 return -1;
337 } 337 }
338 return 0; 338 return 0;
339} /* end of main */ 339} /* end of main */