#include "tests.h" #include "test_pubkey.h" #include #include #include #if defined(BOTAN_HAS_RW) #include #include #endif using namespace Botan; #if defined(BOTAN_HAS_RW) namespace { const std::string padding = "EMSA2(SHA-1)"; size_t rw_sig_kat(const std::string& e, const std::string& p, const std::string& q, const std::string& msg, const std::string& signature) { auto& rng = test_rng(); RW_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e)); RW_PublicKey pubkey = privkey; PK_Verifier verify(pubkey, padding); PK_Signer sign(privkey, padding); return validate_signature(verify, sign, "RW/" + padding, msg, rng, signature); } size_t rw_sig_verify(const std::string& e, const std::string& n, const std::string& msg, const std::string& signature) { BigInt e_bn(e); BigInt n_bn(n); RW_PublicKey key(n_bn, e_bn); PK_Verifier verify(key, padding); if(!verify.verify_message(hex_decode(msg), hex_decode(signature))) return 1; return 0; } } #endif size_t test_rw() { size_t fails = 0; #if defined(BOTAN_HAS_RW) std::ifstream rw_sig(PK_TEST_DATA_DIR "/rw_sig.vec"); std::ifstream rw_verify(PK_TEST_DATA_DIR "/rw_verify.vec"); fails += run_tests_bb(rw_sig, "RW Signature", "Signature", true, [](std::map m) -> size_t { return rw_sig_kat(m["E"], m["P"], m["Q"], m["Msg"], m["Signature"]); }); fails += run_tests_bb(rw_verify, "RW Verify", "Signature", true, [](std::map m) -> size_t { return rw_sig_verify(m["E"], m["N"], m["Msg"], m["Signature"]); }); #endif return fails; }