From c4e9ba925ffd758aaa3feee2ccfc0b76f26fe207 Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Sat, 5 Oct 2019 15:09:28 +0200 Subject: global reindent, now with uncrustify hook enabled --- src/util/test_crypto_ecdsa.c | 264 ++++++++++++++++++++++--------------------- 1 file changed, 135 insertions(+), 129 deletions(-) (limited to 'src/util/test_crypto_ecdsa.c') diff --git a/src/util/test_crypto_ecdsa.c b/src/util/test_crypto_ecdsa.c index 797d61285..d6f406b47 100644 --- a/src/util/test_crypto_ecdsa.c +++ b/src/util/test_crypto_ecdsa.c @@ -37,7 +37,7 @@ static struct GNUNET_CRYPTO_EcdsaPrivateKey *key; static int -testSignVerify() +testSignVerify () { struct GNUNET_CRYPTO_EcdsaSignature sig; struct GNUNET_CRYPTO_EccSignaturePurpose purp; @@ -46,48 +46,49 @@ testSignVerify() struct GNUNET_TIME_Absolute start; int ok = GNUNET_OK; - fprintf(stderr, "%s", "W"); - GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); - start = GNUNET_TIME_absolute_get(); - purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); + fprintf (stderr, "%s", "W"); + GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); + start = GNUNET_TIME_absolute_get (); + purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); for (i = 0; i < ITER; i++) + { + fprintf (stderr, "%s", "."); fflush (stderr); + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig)) { - fprintf(stderr, "%s", "."); fflush(stderr); - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig)) - { - fprintf(stderr, - "%s", - "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - ok = GNUNET_SYSERR; - continue; - } - if (GNUNET_SYSERR == - GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig, - &pkey)) - { - printf("GNUNET_CRYPTO_ecdsa_verify failed!\n"); - ok = GNUNET_SYSERR; - continue; - } - if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, - &purp, &sig, &pkey)) - { - printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - ok = GNUNET_SYSERR; - continue; - } + fprintf (stderr, + "%s", + "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + ok = GNUNET_SYSERR; + continue; } - printf("%d ECDSA sign/verify operations %s\n", ITER, - GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES)); + if (GNUNET_SYSERR == + GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig, + &pkey)) + { + printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n"); + ok = GNUNET_SYSERR; + continue; + } + if (GNUNET_SYSERR != + GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, + &purp, &sig, &pkey)) + { + printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + ok = GNUNET_SYSERR; + continue; + } + } + printf ("%d ECDSA sign/verify operations %s\n", ITER, + GNUNET_STRINGS_relative_time_to_string ( + GNUNET_TIME_absolute_get_duration (start), GNUNET_YES)); return ok; } static int -testDeriveSignVerify() +testDeriveSignVerify () { struct GNUNET_CRYPTO_EcdsaSignature sig; struct GNUNET_CRYPTO_EccSignaturePurpose purp; @@ -95,52 +96,54 @@ testDeriveSignVerify() struct GNUNET_CRYPTO_EcdsaPublicKey pkey; struct GNUNET_CRYPTO_EcdsaPublicKey dpub; - dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive(key, "test-derive", "test-CTX"); - GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); - GNUNET_CRYPTO_ecdsa_public_key_derive(&pkey, "test-derive", "test-CTX", &dpub); - purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); - - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(dpriv, &purp, &sig)) - { - fprintf(stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - GNUNET_free(dpriv); - return GNUNET_SYSERR; - } + dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive (key, "test-derive", + "test-CTX"); + GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); + GNUNET_CRYPTO_ecdsa_public_key_derive (&pkey, "test-derive", "test-CTX", + &dpub); + purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); + + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (dpriv, &purp, &sig)) + { + fprintf (stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + GNUNET_free (dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR == - GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, - &purp, &sig, - &dpub)) - { - printf("GNUNET_CRYPTO_ecdsa_verify failed!\n"); - GNUNET_free(dpriv); - return GNUNET_SYSERR; - } + GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, + &purp, &sig, + &dpub)) + { + printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n"); + GNUNET_free (dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, - &purp, &sig, - &pkey)) - { - printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - GNUNET_free(dpriv); - return GNUNET_SYSERR; - } + GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, + &purp, &sig, + &pkey)) + { + printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + GNUNET_free (dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, - &purp, &sig, &dpub)) - { - printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - GNUNET_free(dpriv); - return GNUNET_SYSERR; - } - GNUNET_free(dpriv); + GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, + &purp, &sig, &dpub)) + { + printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + GNUNET_free (dpriv); + return GNUNET_SYSERR; + } + GNUNET_free (dpriv); return GNUNET_OK; } #if PERF static int -testSignPerformance() +testSignPerformance () { struct GNUNET_CRYPTO_EccSignaturePurpose purp; struct GNUNET_CRYPTO_EcdsaSignature sig; @@ -149,93 +152,96 @@ testSignPerformance() struct GNUNET_TIME_Absolute start; int ok = GNUNET_OK; - purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); - fprintf(stderr, "%s", "W"); - GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); - start = GNUNET_TIME_absolute_get(); + purp.size = htonl (sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); + fprintf (stderr, "%s", "W"); + GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); + start = GNUNET_TIME_absolute_get (); for (i = 0; i < ITER; i++) + { + fprintf (stderr, "%s", "."); fflush (stderr); + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig)) { - fprintf(stderr, "%s", "."); fflush(stderr); - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig)) - { - fprintf(stderr, "%s", - "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - ok = GNUNET_SYSERR; - continue; - } + fprintf (stderr, "%s", + "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + ok = GNUNET_SYSERR; + continue; } - printf("%d ECC sign operations %s\n", ITER, - GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), - GNUNET_YES)); + } + printf ("%d ECC sign operations %s\n", ITER, + GNUNET_STRINGS_relative_time_to_string ( + GNUNET_TIME_absolute_get_duration (start), + GNUNET_YES)); return ok; } #endif static void -perf_keygen() +perf_keygen () { struct GNUNET_TIME_Absolute start; struct GNUNET_CRYPTO_EcdsaPrivateKey *pk; int i; - fprintf(stderr, "%s", "W"); - start = GNUNET_TIME_absolute_get(); + fprintf (stderr, "%s", "W"); + start = GNUNET_TIME_absolute_get (); for (i = 0; i < 10; i++) - { - fprintf(stderr, "."); fflush(stderr); - pk = GNUNET_CRYPTO_ecdsa_key_create(); - GNUNET_free(pk); - } + { + fprintf (stderr, "."); fflush (stderr); + pk = GNUNET_CRYPTO_ecdsa_key_create (); + GNUNET_free (pk); + } for (; i < 25; i++) - fprintf(stderr, "."); - fflush(stderr); - printf("10 ECDSA keys created in %s\n", - GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES)); + fprintf (stderr, "."); + fflush (stderr); + printf ("10 ECDSA keys created in %s\n", + GNUNET_STRINGS_relative_time_to_string ( + GNUNET_TIME_absolute_get_duration (start), GNUNET_YES)); } int -main(int argc, char *argv[]) +main (int argc, char *argv[]) { int failure_count = 0; - if (!gcry_check_version("1.6.0")) - { - fprintf(stderr, - _ - ("libgcrypt has not the expected version (version %s is required).\n"), - "1.6.0"); - return 0; - } - if (getenv("GNUNET_GCRYPT_DEBUG")) - gcry_control(GCRYCTL_SET_DEBUG_FLAGS, 1u, 0); - GNUNET_log_setup("test-crypto-ecc", "WARNING", NULL); - key = GNUNET_CRYPTO_ecdsa_key_create(); - if (GNUNET_OK != testDeriveSignVerify()) - { - failure_count++; - fprintf(stderr, - "\n\n%d TESTS FAILED!\n\n", failure_count); - return -1; - } + if (! gcry_check_version ("1.6.0")) + { + fprintf (stderr, + _ + ( + "libgcrypt has not the expected version (version %s is required).\n"), + "1.6.0"); + return 0; + } + if (getenv ("GNUNET_GCRYPT_DEBUG")) + gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u, 0); + GNUNET_log_setup ("test-crypto-ecc", "WARNING", NULL); + key = GNUNET_CRYPTO_ecdsa_key_create (); + if (GNUNET_OK != testDeriveSignVerify ()) + { + failure_count++; + fprintf (stderr, + "\n\n%d TESTS FAILED!\n\n", failure_count); + return -1; + } #if PERF - if (GNUNET_OK != testSignPerformance()) + if (GNUNET_OK != testSignPerformance ()) failure_count++; #endif - if (GNUNET_OK != testSignVerify()) + if (GNUNET_OK != testSignVerify ()) failure_count++; - GNUNET_free(key); - perf_keygen(); + GNUNET_free (key); + perf_keygen (); if (0 != failure_count) - { - fprintf(stderr, - "\n\n%d TESTS FAILED!\n\n", - failure_count); - return -1; - } + { + fprintf (stderr, + "\n\n%d TESTS FAILED!\n\n", + failure_count); + return -1; + } return 0; } -- cgit v1.2.3