aboutsummaryrefslogtreecommitdiffstats
path: root/src/tests/test_rsa.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2014-01-10 23:07:16 +0000
committerlloyd <[email protected]>2014-01-10 23:07:16 +0000
commitad6555f522ae16f6284e8dafa02f630b88bcf289 (patch)
treebd63c51dbeab75eb0f90c72589bc922141237056 /src/tests/test_rsa.cpp
parent6894dca64c04936d07048c0e8cbf7e25858548c3 (diff)
Split up docs into the reference manual, the website, and everything else.
Add `website` target to makefile. Some progress towards fixing minimized builds. TLS now hard requires ECDSA and GCM since otherwise a minimized build has only insecure options. Remove boost_thread dependency in command line tool
Diffstat (limited to 'src/tests/test_rsa.cpp')
-rw-r--r--src/tests/test_rsa.cpp117
1 files changed, 117 insertions, 0 deletions
diff --git a/src/tests/test_rsa.cpp b/src/tests/test_rsa.cpp
new file mode 100644
index 000000000..28320ddb0
--- /dev/null
+++ b/src/tests/test_rsa.cpp
@@ -0,0 +1,117 @@
+#include "tests.h"
+#include "test_pubkey.h"
+
+#include <botan/auto_rng.h>
+#include <botan/pubkey.h>
+#include <botan/rsa.h>
+#include <botan/hex.h>
+#include <iostream>
+#include <fstream>
+
+using namespace Botan;
+
+namespace {
+
+size_t rsaes_kat(const std::string& e,
+ const std::string& p,
+ const std::string& q,
+ const std::string& msg,
+ std::string padding,
+ const std::string& nonce,
+ const std::string& output)
+ {
+ AutoSeeded_RNG rng;
+
+ RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e));
+
+ RSA_PublicKey pubkey = privkey;
+
+ if(padding == "")
+ padding = "Raw";
+
+ PK_Encryptor_EME enc(pubkey, padding);
+ PK_Decryptor_EME dec(privkey, padding);
+
+ return validate_encryption(enc, dec, "RSAES/" + padding, msg, nonce, output);
+ }
+
+size_t rsa_sig_kat(const std::string& e,
+ const std::string& p,
+ const std::string& q,
+ const std::string& msg,
+ std::string padding,
+ const std::string& nonce,
+ const std::string& output)
+ {
+ AutoSeeded_RNG rng;
+
+ RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e));
+
+ RSA_PublicKey pubkey = privkey;
+
+ if(padding == "")
+ padding = "Raw";
+
+ PK_Verifier verify(pubkey, padding);
+ PK_Signer sign(privkey, padding);
+
+ return validate_signature(verify, sign, "RSA/" + padding, msg, rng, nonce, output);
+ }
+
+size_t rsa_sig_verify(const std::string& e,
+ const std::string& n,
+ const std::string& msg,
+ std::string padding,
+ const std::string& signature)
+ {
+ AutoSeeded_RNG rng;
+
+ BigInt e_bn(e);
+ BigInt n_bn(n);
+
+ RSA_PublicKey key(n_bn, e_bn);
+
+ if(padding == "")
+ padding = "Raw";
+
+ PK_Verifier verify(key, padding);
+
+ if(!verify.verify_message(hex_decode(msg), hex_decode(signature)))
+ return 1;
+ return 0;
+ }
+
+}
+
+size_t test_rsa()
+ {
+ std::ifstream rsa_enc(PK_TEST_DATA_DIR "/rsaes.vec");
+ std::ifstream rsa_sig(PK_TEST_DATA_DIR "/rsa_sig.vec");
+ std::ifstream rsa_verify(PK_TEST_DATA_DIR "/rsa_verify.vec");
+
+ size_t fails = 0;
+
+ fails += run_tests_bb(rsa_enc, "RSA Encryption", "Ciphertext", true,
+ [](std::map<std::string, std::string> m) -> size_t
+ {
+ return rsaes_kat(m["E"], m["P"], m["Q"], m["Msg"],
+ m["Padding"], m["Nonce"], m["Ciphertext"]);
+ });
+
+ fails += run_tests_bb(rsa_sig, "RSA Signature", "Signature", true,
+ [](std::map<std::string, std::string> m) -> size_t
+ {
+ return rsa_sig_kat(m["E"], m["P"], m["Q"], m["Msg"],
+ m["Padding"], m["Nonce"], m["Signature"]);
+ });
+
+ fails += run_tests_bb(rsa_verify, "RSA Verify", "Signature", true,
+ [](std::map<std::string, std::string> m) -> size_t
+ {
+ return rsa_sig_verify(m["E"], m["N"], m["Msg"],
+ m["Padding"], m["Signature"]);
+ });
+
+ return fails;
+ }
+