/**
* @file util/test_crypto_paillier.c
* @brief testcase paillier crypto
+ * @author Christian Fuchs
* @author Florian Dold
*/
#include "platform.h"
int
-main (int argc, char *argv[])
+test_crypto ()
{
- struct GNUNET_CRYPTO_PaillierPlaintext plaintext;
- struct GNUNET_CRYPTO_PaillierPlaintext plaintext_result;
+ gcry_mpi_t plaintext;
+ gcry_mpi_t plaintext_result;
struct GNUNET_CRYPTO_PaillierCiphertext ciphertext;
struct GNUNET_CRYPTO_PaillierPublicKey public_key;
struct GNUNET_CRYPTO_PaillierPrivateKey private_key;
GNUNET_CRYPTO_paillier_create (&public_key, &private_key);
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &plaintext, sizeof plaintext);
- plaintext.bits[0] = 0;
+ GNUNET_assert (NULL != (plaintext = gcry_mpi_new (0)));
+ GNUNET_assert (NULL != (plaintext_result = gcry_mpi_new (0)));
+
+ gcry_mpi_randomize (plaintext, GNUNET_CRYPTO_PAILLIER_BITS / 2, GCRY_WEAK_RANDOM);
- GNUNET_CRYPTO_paillier_encrypt (&public_key, &plaintext, &ciphertext);
+ GNUNET_CRYPTO_paillier_encrypt (&public_key, plaintext, 0, &ciphertext);
GNUNET_CRYPTO_paillier_decrypt (&private_key, &public_key,
- &ciphertext, &plaintext_result);
+ &ciphertext, plaintext_result);
+
+ if (0 != gcry_mpi_cmp (plaintext, plaintext_result))
+ {
+ printf ("paillier failed with plaintext of size %u\n", gcry_mpi_get_nbits (plaintext));
+ gcry_log_debugmpi("\n", plaintext);
+ gcry_log_debugmpi("\n", plaintext_result);
+ return 1;
+ }
+ return 0;
+}
+
+int
+test_hom()
+{
+ int ret;
+ gcry_mpi_t m1;
+ gcry_mpi_t m2;
+ gcry_mpi_t result;
+ gcry_mpi_t hom_result;
+ struct GNUNET_CRYPTO_PaillierCiphertext c1;
+ struct GNUNET_CRYPTO_PaillierCiphertext c2;
+ struct GNUNET_CRYPTO_PaillierCiphertext c_result;
+ struct GNUNET_CRYPTO_PaillierPublicKey public_key;
+ struct GNUNET_CRYPTO_PaillierPrivateKey private_key;
+
+ GNUNET_CRYPTO_paillier_create (&public_key, &private_key);
- if (0 != memcmp (&plaintext, &plaintext_result, sizeof plaintext))
+ GNUNET_assert (NULL != (m1 = gcry_mpi_new (0)));
+ GNUNET_assert (NULL != (m2 = gcry_mpi_new (0)));
+ GNUNET_assert (NULL != (result = gcry_mpi_new (0)));
+ GNUNET_assert (NULL != (hom_result = gcry_mpi_new (0)));
+ //gcry_mpi_randomize (m1, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM);
+ m1 = gcry_mpi_set_ui(m1,1);
+ gcry_mpi_mul_2exp(m1,m1,GNUNET_CRYPTO_PAILLIER_BITS-3);
+ //gcry_mpi_randomize (m2, GNUNET_CRYPTO_PAILLIER_BITS-2, GCRY_WEAK_RANDOM);
+ m2 = gcry_mpi_set_ui(m2,1);
+ gcry_mpi_mul_2exp(m2,m2,GNUNET_CRYPTO_PAILLIER_BITS-3);
+ gcry_mpi_add(result,m1,m2);
+
+ if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m1, 2, &c1))){
+ printf ("GNUNET_CRYPTO_paillier_encrypt 1 failed, should return 1 allowed operation, got %d!\n", ret);
+ return 1;
+ }
+ if (1 != (ret = GNUNET_CRYPTO_paillier_encrypt (&public_key, m2, 2, &c2))){
+ printf ("GNUNET_CRYPTO_paillier_encrypt 2 failed, should return 1 allowed operation, got %d!\n", ret);
+ return 1;
+ }
+
+ if (0 != (ret = GNUNET_CRYPTO_paillier_hom_add (&public_key, &c1,&c2, &c_result))){
+ printf ("GNUNET_CRYPTO_paillier_hom_add failed, expected 0 remaining operations, got %d!\n", ret);
+ return 1;
+ }
+
+ GNUNET_CRYPTO_paillier_decrypt (&private_key, &public_key,
+ &c_result, hom_result);
+
+ gcry_log_debugmpi("\n", hom_result);
+ gcry_log_debugmpi("\n", result);
+ if (0 != gcry_mpi_cmp(result, hom_result)){
+ printf ("GNUNET_CRYPTO_paillier miscalculated!\n");
return 1;
+ }
+
return 0;
}
+
+int
+main (int argc, char *argv[])
+{
+ int ret;
+ ret = test_crypto ();
+ if (0 != ret)
+ return ret;
+ ret = test_hom ();
+ return ret;
+}
+
/* end of test_crypto_paillier.c */