exchange/src/util/test_crypto.c

183 lines
4.8 KiB
C
Raw Normal View History

2015-04-13 17:20:46 +02:00
/*
This file is part of TALER
2016-01-19 14:39:00 +01:00
(C) 2015 GNUnet e.V.
2015-04-13 17:20:46 +02:00
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
*/
/**
* @file util/test_crypto.c
* @brief Tests for Taler-specific crypto logic
* @author Christian Grothoff <christian@grothoff.org>
*/
#include "platform.h"
#include "taler_util.h"
#include "taler_crypto_lib.h"
/**
* Test low-level link encryption/decryption APIs.
*
* @return 0 on success
*/
2015-04-15 18:34:14 +02:00
static int
test_basics ()
2015-04-13 17:20:46 +02:00
{
struct TALER_EncryptedLinkSecretP secret_enc;
struct TALER_TransferSecretP trans_sec;
struct TALER_LinkSecretP secret;
2015-04-13 18:57:37 +02:00
struct TALER_LinkSecretP secret2;
struct TALER_RefreshLinkEncrypted *rl_enc;
struct TALER_RefreshLinkDecrypted rl;
2015-04-13 18:57:37 +02:00
struct TALER_RefreshLinkDecrypted *rld;
2015-04-13 17:20:46 +02:00
GNUNET_log_setup ("test-crypto",
"WARNING",
NULL);
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
&secret,
sizeof (secret));
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
&rl.coin_priv,
sizeof (rl.coin_priv));
2015-04-13 18:57:37 +02:00
rl.blinding_key.rsa_blinding_key = GNUNET_CRYPTO_rsa_blinding_key_create (1024);
rl_enc = TALER_refresh_encrypt (&rl,
&secret);
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
&trans_sec,
sizeof (trans_sec));
GNUNET_assert (GNUNET_OK ==
TALER_transfer_encrypt (&secret,
&trans_sec,
&secret_enc));
2015-04-13 18:57:37 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_transfer_decrypt (&secret_enc,
&trans_sec,
&secret2));
GNUNET_assert (0 == memcmp (&secret,
&secret2,
sizeof (secret)));
rld = TALER_refresh_decrypt (rl_enc,
&secret2);
GNUNET_assert (NULL != rld);
GNUNET_assert (0 == memcmp (&rld->coin_priv,
&rl.coin_priv,
sizeof (struct TALER_CoinSpendPrivateKeyP)));
2015-04-13 18:57:37 +02:00
GNUNET_assert (0 ==
GNUNET_CRYPTO_rsa_blinding_key_cmp (rl.blinding_key.rsa_blinding_key,
rld->blinding_key.rsa_blinding_key));
GNUNET_CRYPTO_rsa_blinding_key_free (rld->blinding_key.rsa_blinding_key);
GNUNET_free (rld);
GNUNET_CRYPTO_rsa_blinding_key_free (rl.blinding_key.rsa_blinding_key);
2015-04-13 17:20:46 +02:00
return 0;
}
2015-04-15 18:34:14 +02:00
/**
* Test #TALER_refresh_link_encrypted_decode().
*
* @return 0 on success
*/
static int
test_rled ()
{
struct TALER_RefreshLinkEncrypted *rle;
char buf[512];
char *buf2;
size_t buf_len = sizeof (buf);
memset (buf, 42, sizeof (buf));
rle = TALER_refresh_link_encrypted_decode (buf,
buf_len);
GNUNET_assert (NULL != rle);
buf_len = 42;
buf2 = TALER_refresh_link_encrypted_encode (rle,
&buf_len);
GNUNET_assert (NULL != buf2);
GNUNET_assert (buf_len == sizeof (buf));
GNUNET_assert (0 == memcmp (buf,
buf2,
buf_len));
GNUNET_free (rle);
GNUNET_free (buf2);
return 0;
}
/**
* Test high-level link encryption/decryption API.
*
* @return 0 on success
*/
2015-04-15 18:34:14 +02:00
static int
test_high_level ()
{
struct GNUNET_CRYPTO_EddsaPrivateKey *pk;
2015-04-15 18:34:14 +02:00
struct TALER_LinkSecretP secret;
struct TALER_LinkSecretP secret2;
struct TALER_CoinSpendPublicKeyP coin_pub;
struct TALER_CoinSpendPrivateKeyP coin_priv;
2015-04-15 18:34:14 +02:00
struct TALER_TransferPrivateKeyP trans_priv;
struct TALER_TransferPublicKeyP trans_pub;
struct TALER_EncryptedLinkSecretP secret_enc;
pk = GNUNET_CRYPTO_eddsa_key_create ();
2015-04-15 18:34:14 +02:00
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
&secret,
sizeof (secret));
GNUNET_CRYPTO_eddsa_key_get_public (pk,
&coin_pub.eddsa_pub);
2015-04-15 18:34:14 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_link_encrypt_secret (&secret,
&coin_pub,
&trans_priv,
&trans_pub,
&secret_enc));
GNUNET_assert (GNUNET_OK ==
TALER_link_decrypt_secret (&secret_enc,
&trans_priv,
&coin_pub,
&secret2));
GNUNET_assert (0 ==
memcmp (&secret,
&secret2,
sizeof (secret)));
coin_priv.eddsa_priv = *pk;
2015-04-15 18:34:14 +02:00
GNUNET_assert (GNUNET_OK ==
TALER_link_decrypt_secret2 (&secret_enc,
&trans_pub,
&coin_priv,
&secret2));
GNUNET_assert (0 ==
memcmp (&secret,
&secret2,
sizeof (secret)));
GNUNET_free (pk);
return 0;
}
int
main(int argc,
const char *const argv[])
{
if (0 != test_basics ())
return 1;
if (0 != test_rled ())
return 1;
2015-04-15 18:34:14 +02:00
if (0 != test_high_level ())
return 1;
return 0;
}
2015-04-13 17:20:46 +02:00
/* end of test_crypto.c */