diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 18:45:59 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 18:45:59 +0000 |
commit | 19fcec84d8d7d21e796c7624e521b60d28ee21ed (patch) | |
tree | 42d26aa27d1e3f7c0b8bd3fd14e7d7082f5008dc /src/test/testcrypto.cc | |
parent | Initial commit. (diff) | |
download | ceph-19fcec84d8d7d21e796c7624e521b60d28ee21ed.tar.xz ceph-19fcec84d8d7d21e796c7624e521b60d28ee21ed.zip |
Adding upstream version 16.2.11+ds.upstream/16.2.11+dsupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/test/testcrypto.cc')
-rw-r--r-- | src/test/testcrypto.cc | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/src/test/testcrypto.cc b/src/test/testcrypto.cc new file mode 100644 index 000000000..4e8a7e2c8 --- /dev/null +++ b/src/test/testcrypto.cc @@ -0,0 +1,58 @@ +#include "auth/Crypto.h" +#include "common/Clock.h" + +#include "common/config.h" +#include "common/debug.h" + +#define dout_subsys ceph_subsys_auth + +#define AES_KEY_LEN 16 + +#define dout_context g_ceph_context + +int main(int argc, char *argv[]) +{ + char aes_key[AES_KEY_LEN]; + memset(aes_key, 0x77, sizeof(aes_key)); + bufferptr keybuf(aes_key, sizeof(aes_key)); + CryptoKey key(CEPH_CRYPTO_AES, ceph_clock_now(), keybuf); + + const char *msg="hello! this is a message\n"; + char pad[16]; + memset(pad, 0, 16); + bufferptr ptr(msg, strlen(msg)); + bufferlist enc_in; + enc_in.append(ptr); + enc_in.append(msg, strlen(msg)); + + bufferlist enc_out; + std::string error; + if (key.encrypt(g_ceph_context, enc_in, enc_out, &error) < 0) { + ceph_assert(!error.empty()); + dout(0) << "couldn't encode! error " << error << dendl; + exit(1); + } + + const char *enc_buf = enc_out.c_str(); + for (unsigned i=0; i<enc_out.length(); i++) { + std::cout << hex << (int)(unsigned char)enc_buf[i] << dec << " "; + if (i && !(i%16)) + std::cout << std::endl; + } + + bufferlist dec_in, dec_out; + + dec_in = enc_out; + + if (key.decrypt(g_ceph_context, dec_in, dec_out, &error) < 0) { + ceph_assert(!error.empty()); + dout(0) << "couldn't decode! error " << error << dendl; + exit(1); + } + + dout(0) << "decoded len: " << dec_out.length() << dendl; + dout(0) << "decoded msg: " << dec_out.c_str() << dendl; + + return 0; +} + |