3 * AUTHOR: Rudolf Polzer - divVerent@xonotic.org
5 * Copyright (c) 2010, Rudolf Polzer
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the copyright holder nor the names of contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTOR(S) ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTOR(S) BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include "d0_blind_id.h"
45 static struct timeval thistime, lasttime;
47 static double *lastclock = &x;
49 gettimeofday(&thistime, NULL);
50 *lastclock += (thistime.tv_sec - lasttime.tv_sec) + 0.000001 * (thistime.tv_usec - lasttime.tv_usec);
55 #include <sys/signal.h>
57 volatile D0_BOOL quit = 0;
58 void mysignal(int signo)
66 static void errx(int status, const char *format, ...)
70 vfprintf(stderr, format, ap);
76 int main(int argc, char **argv)
78 char buf[65536]; size_t bufsize;
79 char buf2[65536]; size_t buf2size;
80 d0_blind_id_t *ctx_self, *ctx_other;
82 d0_blind_id_INITIALIZE();
83 ctx_self = d0_blind_id_new();
84 ctx_other = d0_blind_id_new();
86 printf("keygen RSA...\n");
87 if(!d0_blind_id_generate_private_key(ctx_self, 1024))
88 errx(1, "keygen fail");
89 buf2size = sizeof(buf2) - 1;
90 if(!d0_blind_id_fingerprint64_public_key(ctx_self, buf2, &buf2size))
92 printf("key has fingerprint %s\n", buf2);
93 bufsize = sizeof(buf); if(!d0_blind_id_write_public_key(ctx_self, buf, &bufsize))
94 errx(2, "writepub fail");
95 if(!d0_blind_id_read_public_key(ctx_other, buf, bufsize))
96 errx(3, "readpub fail");
98 printf("keygen modulus...\n");
99 if(!d0_blind_id_generate_private_id_modulus(ctx_other))
100 errx(1, "keygen fail");
102 bufsize = sizeof(buf); if(!d0_blind_id_write_private_id_modulus(ctx_other, buf, &bufsize))
103 errx(2, "writepub fail");
104 if(!d0_blind_id_read_private_id_modulus(ctx_self, buf, bufsize))
105 errx(3, "readpub fail");
109 signal(SIGINT, mysignal);
113 double bench_gen = 0, bench_fp = 0, bench_stop = 0;
117 bufsize = sizeof(buf); if(!d0_blind_id_generate_private_id_start(ctx_other))
118 errx(4, "genid fail");
120 buf2size = sizeof(buf2) - 1; if(!d0_blind_id_fingerprint64_public_id(ctx_other, buf2, &buf2size))
121 errx(4, "fp64 fail");
125 printf("gen=%f fp=%f\n", n/bench_gen, n/bench_fp);
127 while(!(quit || argc != 2 || (buf2size > strlen(argv[1]) && !memcmp(buf2, argv[1], strlen(argv[1])))));
130 printf("Generated key has ID: %s\n", buf2);
132 bufsize = sizeof(buf); if(!d0_blind_id_generate_private_id_request(ctx_other, buf, &bufsize))
133 errx(4, "genreq fail");
134 buf2size = sizeof(buf2); if(!d0_blind_id_answer_private_id_request(ctx_self, buf, bufsize, buf2, &buf2size))
135 errx(5, "ansreq fail");
136 if(!d0_blind_id_finish_private_id_request(ctx_other, buf2, buf2size))
137 errx(6, "finishreq fail");
139 bufsize = sizeof(buf); if(!d0_blind_id_write_public_id(ctx_other, buf, &bufsize))
140 errx(7, "writepub2 fail");
141 if(!d0_blind_id_read_public_id(ctx_self, buf, bufsize))
142 errx(8, "readpub2 fail");
145 double bench_auth = 0, bench_chall = 0, bench_resp = 0, bench_verify = 0, bench_dhkey1 = 0, bench_dhkey2 = 0, bench_sign = 0, bench_signverify = 0;
150 bufsize = sizeof(buf); if(!d0_blind_id_sign_with_private_id_sign(ctx_other, 1, 1, "hello world", 11, buf, &bufsize))
151 errx(9, "sign fail");
152 bench(&bench_signverify);
153 buf2size = sizeof(buf2); if(!d0_blind_id_sign_with_private_id_verify(ctx_self, 1, 1, buf, bufsize, buf2, &buf2size, &status))
154 errx(9, "signverify fail");
156 if(buf2size != 11 || memcmp(buf2, "hello world", 11))
157 errx(13, "signhello fail");
159 errx(14, "signsignature fail");
161 bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_start(ctx_other, 1, 1, "hello world", 11, buf, &bufsize))
162 errx(9, "start fail");
164 buf2size = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_challenge(ctx_self, 1, 1, buf, bufsize, buf2, &buf2size, &status))
165 errx(10, "challenge fail");
167 errx(14, "signature prefail");
169 bufsize = sizeof(buf); if(!d0_blind_id_authenticate_with_private_id_response(ctx_other, buf2, buf2size, buf, &bufsize))
170 errx(11, "response fail");
171 bench(&bench_verify);
172 buf2size = sizeof(buf2); if(!d0_blind_id_authenticate_with_private_id_verify(ctx_self, buf, bufsize, buf2, &buf2size, &status))
173 errx(12, "verify fail");
174 if(buf2size != 11 || memcmp(buf2, "hello world", 11))
175 errx(13, "hello fail");
177 errx(14, "signature fail");
178 bench(&bench_dhkey1);
179 bufsize = 20; if(!d0_blind_id_sessionkey_public_id(ctx_self, buf, &bufsize))
180 errx(15, "dhkey1 fail");
181 bench(&bench_dhkey2);
182 buf2size = 20; if(!d0_blind_id_sessionkey_public_id(ctx_other, buf2, &buf2size))
183 errx(16, "dhkey2 fail");
185 if(bufsize != buf2size || memcmp(buf, buf2, bufsize))
186 errx(17, "dhkey match fail");
189 printf("sign=%f signverify=%f auth=%f chall=%f resp=%f verify=%f dh1=%f dh2=%f\n", n/bench_sign, n/bench_signverify, n/bench_auth, n/bench_chall, n/bench_resp, n/bench_verify, n/bench_dhkey1, n/bench_dhkey2);