summaryrefslogtreecommitdiffstats
path: root/src/test/testcrypto.cc
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 18:45:59 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 18:45:59 +0000
commit19fcec84d8d7d21e796c7624e521b60d28ee21ed (patch)
tree42d26aa27d1e3f7c0b8bd3fd14e7d7082f5008dc /src/test/testcrypto.cc
parentInitial commit. (diff)
downloadceph-19fcec84d8d7d21e796c7624e521b60d28ee21ed.tar.xz
ceph-19fcec84d8d7d21e796c7624e521b60d28ee21ed.zip
Adding upstream version 16.2.11+ds.upstream/16.2.11+dsupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/test/testcrypto.cc')
-rw-r--r--src/test/testcrypto.cc58
1 files changed, 58 insertions, 0 deletions
diff --git a/src/test/testcrypto.cc b/src/test/testcrypto.cc
new file mode 100644
index 000000000..4e8a7e2c8
--- /dev/null
+++ b/src/test/testcrypto.cc
@@ -0,0 +1,58 @@
+#include "auth/Crypto.h"
+#include "common/Clock.h"
+
+#include "common/config.h"
+#include "common/debug.h"
+
+#define dout_subsys ceph_subsys_auth
+
+#define AES_KEY_LEN 16
+
+#define dout_context g_ceph_context
+
+int main(int argc, char *argv[])
+{
+ char aes_key[AES_KEY_LEN];
+ memset(aes_key, 0x77, sizeof(aes_key));
+ bufferptr keybuf(aes_key, sizeof(aes_key));
+ CryptoKey key(CEPH_CRYPTO_AES, ceph_clock_now(), keybuf);
+
+ const char *msg="hello! this is a message\n";
+ char pad[16];
+ memset(pad, 0, 16);
+ bufferptr ptr(msg, strlen(msg));
+ bufferlist enc_in;
+ enc_in.append(ptr);
+ enc_in.append(msg, strlen(msg));
+
+ bufferlist enc_out;
+ std::string error;
+ if (key.encrypt(g_ceph_context, enc_in, enc_out, &error) < 0) {
+ ceph_assert(!error.empty());
+ dout(0) << "couldn't encode! error " << error << dendl;
+ exit(1);
+ }
+
+ const char *enc_buf = enc_out.c_str();
+ for (unsigned i=0; i<enc_out.length(); i++) {
+ std::cout << hex << (int)(unsigned char)enc_buf[i] << dec << " ";
+ if (i && !(i%16))
+ std::cout << std::endl;
+ }
+
+ bufferlist dec_in, dec_out;
+
+ dec_in = enc_out;
+
+ if (key.decrypt(g_ceph_context, dec_in, dec_out, &error) < 0) {
+ ceph_assert(!error.empty());
+ dout(0) << "couldn't decode! error " << error << dendl;
+ exit(1);
+ }
+
+ dout(0) << "decoded len: " << dec_out.length() << dendl;
+ dout(0) << "decoded msg: " << dec_out.c_str() << dendl;
+
+ return 0;
+}
+