diff options
author | lloyd <[email protected]> | 2014-01-10 23:07:16 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2014-01-10 23:07:16 +0000 |
commit | ad6555f522ae16f6284e8dafa02f630b88bcf289 (patch) | |
tree | bd63c51dbeab75eb0f90c72589bc922141237056 /src/tests/test_rsa.cpp | |
parent | 6894dca64c04936d07048c0e8cbf7e25858548c3 (diff) |
Split up docs into the reference manual, the website, and everything else.
Add `website` target to makefile.
Some progress towards fixing minimized builds.
TLS now hard requires ECDSA and GCM since otherwise a minimized build
has only insecure options.
Remove boost_thread dependency in command line tool
Diffstat (limited to 'src/tests/test_rsa.cpp')
-rw-r--r-- | src/tests/test_rsa.cpp | 117 |
1 files changed, 117 insertions, 0 deletions
diff --git a/src/tests/test_rsa.cpp b/src/tests/test_rsa.cpp new file mode 100644 index 000000000..28320ddb0 --- /dev/null +++ b/src/tests/test_rsa.cpp @@ -0,0 +1,117 @@ +#include "tests.h" +#include "test_pubkey.h" + +#include <botan/auto_rng.h> +#include <botan/pubkey.h> +#include <botan/rsa.h> +#include <botan/hex.h> +#include <iostream> +#include <fstream> + +using namespace Botan; + +namespace { + +size_t rsaes_kat(const std::string& e, + const std::string& p, + const std::string& q, + const std::string& msg, + std::string padding, + const std::string& nonce, + const std::string& output) + { + AutoSeeded_RNG rng; + + RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e)); + + RSA_PublicKey pubkey = privkey; + + if(padding == "") + padding = "Raw"; + + PK_Encryptor_EME enc(pubkey, padding); + PK_Decryptor_EME dec(privkey, padding); + + return validate_encryption(enc, dec, "RSAES/" + padding, msg, nonce, output); + } + +size_t rsa_sig_kat(const std::string& e, + const std::string& p, + const std::string& q, + const std::string& msg, + std::string padding, + const std::string& nonce, + const std::string& output) + { + AutoSeeded_RNG rng; + + RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e)); + + RSA_PublicKey pubkey = privkey; + + if(padding == "") + padding = "Raw"; + + PK_Verifier verify(pubkey, padding); + PK_Signer sign(privkey, padding); + + return validate_signature(verify, sign, "RSA/" + padding, msg, rng, nonce, output); + } + +size_t rsa_sig_verify(const std::string& e, + const std::string& n, + const std::string& msg, + std::string padding, + const std::string& signature) + { + AutoSeeded_RNG rng; + + BigInt e_bn(e); + BigInt n_bn(n); + + RSA_PublicKey key(n_bn, e_bn); + + if(padding == "") + padding = "Raw"; + + PK_Verifier verify(key, padding); + + if(!verify.verify_message(hex_decode(msg), hex_decode(signature))) + return 1; + return 0; + } + +} + +size_t test_rsa() + { + std::ifstream rsa_enc(PK_TEST_DATA_DIR "/rsaes.vec"); + std::ifstream rsa_sig(PK_TEST_DATA_DIR "/rsa_sig.vec"); + std::ifstream rsa_verify(PK_TEST_DATA_DIR "/rsa_verify.vec"); + + size_t fails = 0; + + fails += run_tests_bb(rsa_enc, "RSA Encryption", "Ciphertext", true, + [](std::map<std::string, std::string> m) -> size_t + { + return rsaes_kat(m["E"], m["P"], m["Q"], m["Msg"], + m["Padding"], m["Nonce"], m["Ciphertext"]); + }); + + fails += run_tests_bb(rsa_sig, "RSA Signature", "Signature", true, + [](std::map<std::string, std::string> m) -> size_t + { + return rsa_sig_kat(m["E"], m["P"], m["Q"], m["Msg"], + m["Padding"], m["Nonce"], m["Signature"]); + }); + + fails += run_tests_bb(rsa_verify, "RSA Verify", "Signature", true, + [](std::map<std::string, std::string> m) -> size_t + { + return rsa_sig_verify(m["E"], m["N"], m["Msg"], + m["Padding"], m["Signature"]); + }); + + return fails; + } + |