summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2015-01-26 12:24:36 +0100
committerChristian Grothoff <christian@grothoff.org>2015-01-26 12:24:36 +0100
commit60fdc863ee5b60025f554cfbd60c18c4fef0b79e (patch)
tree38e92e71b4f0edae937e2fb49c5f7ab234f941ca /src
parent52591a77f01fadfd748b01a4fd101e50bd473661 (diff)
downloadexchange-60fdc863ee5b60025f554cfbd60c18c4fef0b79e.tar.gz
exchange-60fdc863ee5b60025f554cfbd60c18c4fef0b79e.tar.bz2
exchange-60fdc863ee5b60025f554cfbd60c18c4fef0b79e.zip
test is dead, too
Diffstat (limited to 'src')
-rw-r--r--src/util/test_rsa.c124
1 files changed, 0 insertions, 124 deletions
diff --git a/src/util/test_rsa.c b/src/util/test_rsa.c
deleted file mode 100644
index fdacf521..00000000
--- a/src/util/test_rsa.c
+++ /dev/null
@@ -1,124 +0,0 @@
-/* NOTE: this is obsolete logic, we should migrate to the
- GNUNET_CRYPTO_rsa-API as soon as possible */
-
-
-/*
- This file is part of TALER
- (C) 2014 Christian Grothoff (and other contributing authors)
-
- TALER is free software; you can redistribute it and/or modify it under the
- terms of the GNU General Public License as published by the Free Software
- Foundation; either version 3, or (at your option) any later version.
-
- TALER is distributed in the hope that it will be useful, but WITHOUT ANY
- WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
- A PARTICULAR PURPOSE. See the GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License along with
- TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
-*/
-
-/**
- * @file util/test_rsa.c
- * @brief testcase for utility functions for RSA cryptography
- * @author Sree Harsha Totakura <sreeharsha@totakura.in>
- */
-#include "platform.h"
-#include "taler_rsa.h"
-#include <gnunet/gnunet_util_lib.h>
-
-#define TEST_PURPOSE UINT32_MAX
-
-
-#define EXITIF(cond) \
- do { \
- if (cond) { GNUNET_break (0); goto EXITIF_exit; } \
- } while (0)
-
-int
-main (int argc, char *argv[])
-{
-#define RND_BLK_SIZE 16524
- unsigned char rnd_blk[RND_BLK_SIZE];
- struct TALER_RSA_PrivateKey *priv;
- struct TALER_RSA_PrivateKeyBinaryEncoded *priv_enc;
- struct TALER_RSA_PublicKeyBinaryEncoded pubkey;
- struct TALER_RSA_BlindingKey *bkey;
- struct TALER_RSA_BlindedSignaturePurpose *bsp;
- struct TALER_RSA_Signature sig;
- struct GNUNET_HashCode hash;
- int ret;
-
- priv = NULL;
- bsp = NULL;
- bkey = NULL;
- ret = 1;
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, rnd_blk,
- RND_BLK_SIZE);
- GNUNET_CRYPTO_hash (rnd_blk, RND_BLK_SIZE, &hash);
- priv = TALER_RSA_key_create ();
- GNUNET_assert (NULL != priv);
- EXITIF (GNUNET_OK != TALER_RSA_sign (priv,
- &hash, sizeof (hash),
- &sig));
- TALER_RSA_key_get_public (priv, &pubkey);
- EXITIF (NULL == (priv_enc = TALER_RSA_encode_key (priv)));
- TALER_RSA_key_free (priv);
- priv = NULL;
- EXITIF (NULL == (priv = TALER_RSA_decode_key ((const char *) priv_enc,
- ntohs (priv_enc->len))));
- GNUNET_free (priv_enc);
- priv_enc = NULL;
- EXITIF (GNUNET_OK != TALER_RSA_verify (&hash, sizeof (hash),
- &sig,
- &pubkey));
- /* corrupt our hash and see if the signature is still valid */
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash,
- sizeof (struct GNUNET_HashCode));
- EXITIF (GNUNET_OK == TALER_RSA_verify (&hash, sizeof (hash),
- &sig,
- &pubkey));
-
- /* test blind signing */
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, rnd_blk,
- RND_BLK_SIZE);
- GNUNET_CRYPTO_hash (rnd_blk, RND_BLK_SIZE, &hash);
- (void) memset (&sig, 0, sizeof (struct TALER_RSA_Signature));
- EXITIF (NULL == (bkey = TALER_RSA_blinding_key_create ()));
- EXITIF (NULL == (bsp =
- TALER_RSA_message_blind (&hash, sizeof (hash),
- bkey, &pubkey)));
- EXITIF (GNUNET_OK != TALER_RSA_sign (priv,
- bsp,
- sizeof (struct TALER_RSA_BlindedSignaturePurpose),
- &sig));
- EXITIF (GNUNET_OK != TALER_RSA_unblind (&sig,
- bkey,
- &pubkey));
- EXITIF (GNUNET_OK != TALER_RSA_verify (&hash, sizeof (hash),
- &sig,
- &pubkey));
- /* corrupt our hash and see if the signature is still valid */
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash,
- sizeof (struct GNUNET_HashCode));
- EXITIF (GNUNET_OK == TALER_RSA_verify (&hash, sizeof (hash),
- &sig,
- &pubkey));
- ret = 0; /* all OK */
-
- EXITIF_exit:
- if (NULL != priv)
- {
- TALER_RSA_key_free (priv);
- priv = NULL;
- }
- if (NULL != priv_enc)
- {
- GNUNET_free (priv_enc);
- priv_enc = NULL;
- }
- if (NULL != bkey)
- TALER_RSA_blinding_key_destroy (bkey);
- GNUNET_free_non_null (bsp);
- return ret;
-}