From d41ed82a4ea0cc8e1674b6d5d2c49fd6462610bb Mon Sep 17 00:00:00 2001 From: ng0 Date: Sun, 8 Sep 2019 12:33:09 +0000 Subject: uncrustify as demanded. --- src/util/test_crypto_ecdsa.c | 266 +++++++++++++++++++++---------------------- 1 file changed, 133 insertions(+), 133 deletions(-) (limited to 'src/util/test_crypto_ecdsa.c') diff --git a/src/util/test_crypto_ecdsa.c b/src/util/test_crypto_ecdsa.c index 00cc72af4..797d61285 100644 --- a/src/util/test_crypto_ecdsa.c +++ b/src/util/test_crypto_ecdsa.c @@ -11,13 +11,13 @@ WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. - + You should have received a copy of the GNU Affero General Public License along with this program. If not, see . SPDX-License-Identifier: AGPL3.0-or-later -*/ + */ /** * @file util/test_crypto_ecdsa.c * @brief testcase for ECC ECDSA public key crypto @@ -37,7 +37,7 @@ static struct GNUNET_CRYPTO_EcdsaPrivateKey *key; static int -testSignVerify () +testSignVerify() { struct GNUNET_CRYPTO_EcdsaSignature sig; struct GNUNET_CRYPTO_EccSignaturePurpose purp; @@ -46,48 +46,48 @@ testSignVerify () struct GNUNET_TIME_Absolute start; int ok = GNUNET_OK; - fprintf (stderr, "%s", "W"); - GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); - start = GNUNET_TIME_absolute_get (); - purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); + fprintf(stderr, "%s", "W"); + GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); + start = GNUNET_TIME_absolute_get(); + purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); for (i = 0; i < ITER; i++) - { - fprintf (stderr, "%s", "."); fflush (stderr); - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig)) - { - fprintf (stderr, - "%s", - "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - ok = GNUNET_SYSERR; - continue; - } - if (GNUNET_SYSERR == - GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig, - &pkey)) - { - printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n"); - ok = GNUNET_SYSERR; - continue; - } - if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, - &purp, &sig, &pkey)) { - printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - ok = GNUNET_SYSERR; - continue; + fprintf(stderr, "%s", "."); fflush(stderr); + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig)) + { + fprintf(stderr, + "%s", + "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + ok = GNUNET_SYSERR; + continue; + } + if (GNUNET_SYSERR == + GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, &purp, &sig, + &pkey)) + { + printf("GNUNET_CRYPTO_ecdsa_verify failed!\n"); + ok = GNUNET_SYSERR; + continue; + } + if (GNUNET_SYSERR != + GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, + &purp, &sig, &pkey)) + { + printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + ok = GNUNET_SYSERR; + continue; + } } - } - printf ("%d ECDSA sign/verify operations %s\n", ITER, - GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES)); + printf("%d ECDSA sign/verify operations %s\n", ITER, + GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES)); return ok; } static int -testDeriveSignVerify () +testDeriveSignVerify() { struct GNUNET_CRYPTO_EcdsaSignature sig; struct GNUNET_CRYPTO_EccSignaturePurpose purp; @@ -95,52 +95,52 @@ testDeriveSignVerify () struct GNUNET_CRYPTO_EcdsaPublicKey pkey; struct GNUNET_CRYPTO_EcdsaPublicKey dpub; - dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive (key, "test-derive", "test-CTX"); - GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); - GNUNET_CRYPTO_ecdsa_public_key_derive (&pkey, "test-derive", "test-CTX", &dpub); - purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); - - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (dpriv, &purp, &sig)) - { - fprintf (stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - GNUNET_free (dpriv); - return GNUNET_SYSERR; - } + dpriv = GNUNET_CRYPTO_ecdsa_private_key_derive(key, "test-derive", "test-CTX"); + GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); + GNUNET_CRYPTO_ecdsa_public_key_derive(&pkey, "test-derive", "test-CTX", &dpub); + purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); + + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(dpriv, &purp, &sig)) + { + fprintf(stderr, "%s", "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + GNUNET_free(dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR == - GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, - &purp, &sig, - &dpub)) - { - printf ("GNUNET_CRYPTO_ecdsa_verify failed!\n"); - GNUNET_free (dpriv); - return GNUNET_SYSERR; - } + GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, + &purp, &sig, + &dpub)) + { + printf("GNUNET_CRYPTO_ecdsa_verify failed!\n"); + GNUNET_free(dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TEST, - &purp, &sig, - &pkey)) - { - printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - GNUNET_free (dpriv); - return GNUNET_SYSERR; - } + GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TEST, + &purp, &sig, + &pkey)) + { + printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + GNUNET_free(dpriv); + return GNUNET_SYSERR; + } if (GNUNET_SYSERR != - GNUNET_CRYPTO_ecdsa_verify (GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, - &purp, &sig, &dpub)) - { - printf ("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); - GNUNET_free (dpriv); - return GNUNET_SYSERR; - } - GNUNET_free (dpriv); + GNUNET_CRYPTO_ecdsa_verify(GNUNET_SIGNATURE_PURPOSE_TRANSPORT_PONG_OWN, + &purp, &sig, &dpub)) + { + printf("GNUNET_CRYPTO_ecdsa_verify failed to fail!\n"); + GNUNET_free(dpriv); + return GNUNET_SYSERR; + } + GNUNET_free(dpriv); return GNUNET_OK; } #if PERF static int -testSignPerformance () +testSignPerformance() { struct GNUNET_CRYPTO_EccSignaturePurpose purp; struct GNUNET_CRYPTO_EcdsaSignature sig; @@ -149,93 +149,93 @@ testSignPerformance () struct GNUNET_TIME_Absolute start; int ok = GNUNET_OK; - purp.size = htonl (sizeof (struct GNUNET_CRYPTO_EccSignaturePurpose)); - purp.purpose = htonl (GNUNET_SIGNATURE_PURPOSE_TEST); - fprintf (stderr, "%s", "W"); - GNUNET_CRYPTO_ecdsa_key_get_public (key, &pkey); - start = GNUNET_TIME_absolute_get (); + purp.size = htonl(sizeof(struct GNUNET_CRYPTO_EccSignaturePurpose)); + purp.purpose = htonl(GNUNET_SIGNATURE_PURPOSE_TEST); + fprintf(stderr, "%s", "W"); + GNUNET_CRYPTO_ecdsa_key_get_public(key, &pkey); + start = GNUNET_TIME_absolute_get(); for (i = 0; i < ITER; i++) - { - fprintf (stderr, "%s", "."); fflush (stderr); - if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign (key, &purp, &sig)) { - fprintf (stderr, "%s", - "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); - ok = GNUNET_SYSERR; - continue; + fprintf(stderr, "%s", "."); fflush(stderr); + if (GNUNET_SYSERR == GNUNET_CRYPTO_ecdsa_sign(key, &purp, &sig)) + { + fprintf(stderr, "%s", + "GNUNET_CRYPTO_ecdsa_sign returned SYSERR\n"); + ok = GNUNET_SYSERR; + continue; + } } - } - printf ("%d ECC sign operations %s\n", ITER, - GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), - GNUNET_YES)); + printf("%d ECC sign operations %s\n", ITER, + GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), + GNUNET_YES)); return ok; } #endif static void -perf_keygen () +perf_keygen() { struct GNUNET_TIME_Absolute start; struct GNUNET_CRYPTO_EcdsaPrivateKey *pk; int i; - fprintf (stderr, "%s", "W"); - start = GNUNET_TIME_absolute_get (); - for (i=0;i<10;i++) - { - fprintf (stderr, "."); fflush (stderr); - pk = GNUNET_CRYPTO_ecdsa_key_create (); - GNUNET_free (pk); - } - for (;i<25;i++) - fprintf (stderr, "."); - fflush (stderr); - printf ("10 ECDSA keys created in %s\n", - GNUNET_STRINGS_relative_time_to_string (GNUNET_TIME_absolute_get_duration (start), GNUNET_YES)); + fprintf(stderr, "%s", "W"); + start = GNUNET_TIME_absolute_get(); + for (i = 0; i < 10; i++) + { + fprintf(stderr, "."); fflush(stderr); + pk = GNUNET_CRYPTO_ecdsa_key_create(); + GNUNET_free(pk); + } + for (; i < 25; i++) + fprintf(stderr, "."); + fflush(stderr); + printf("10 ECDSA keys created in %s\n", + GNUNET_STRINGS_relative_time_to_string(GNUNET_TIME_absolute_get_duration(start), GNUNET_YES)); } int -main (int argc, char *argv[]) +main(int argc, char *argv[]) { int failure_count = 0; - if (! gcry_check_version ("1.6.0")) - { - fprintf (stderr, - _ - ("libgcrypt has not the expected version (version %s is required).\n"), - "1.6.0"); - return 0; - } - if (getenv ("GNUNET_GCRYPT_DEBUG")) - gcry_control (GCRYCTL_SET_DEBUG_FLAGS, 1u , 0); - GNUNET_log_setup ("test-crypto-ecc", "WARNING", NULL); - key = GNUNET_CRYPTO_ecdsa_key_create (); - if (GNUNET_OK != testDeriveSignVerify ()) - { - failure_count++; - fprintf (stderr, - "\n\n%d TESTS FAILED!\n\n", failure_count); - return -1; - } + if (!gcry_check_version("1.6.0")) + { + fprintf(stderr, + _ + ("libgcrypt has not the expected version (version %s is required).\n"), + "1.6.0"); + return 0; + } + if (getenv("GNUNET_GCRYPT_DEBUG")) + gcry_control(GCRYCTL_SET_DEBUG_FLAGS, 1u, 0); + GNUNET_log_setup("test-crypto-ecc", "WARNING", NULL); + key = GNUNET_CRYPTO_ecdsa_key_create(); + if (GNUNET_OK != testDeriveSignVerify()) + { + failure_count++; + fprintf(stderr, + "\n\n%d TESTS FAILED!\n\n", failure_count); + return -1; + } #if PERF - if (GNUNET_OK != testSignPerformance ()) + if (GNUNET_OK != testSignPerformance()) failure_count++; #endif - if (GNUNET_OK != testSignVerify ()) + if (GNUNET_OK != testSignVerify()) failure_count++; - GNUNET_free (key); - perf_keygen (); + GNUNET_free(key); + perf_keygen(); if (0 != failure_count) - { - fprintf (stderr, - "\n\n%d TESTS FAILED!\n\n", - failure_count); - return -1; - } + { + fprintf(stderr, + "\n\n%d TESTS FAILED!\n\n", + failure_count); + return -1; + } return 0; } -- cgit v1.2.3