aboutsummaryrefslogtreecommitdiffstats
path: root/src/tests/test_rsa.cpp
blob: 9405255741b7d501814615ef280a187ed50ca899 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
/*
* (C) 2014,2015 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/

#include "tests.h"

#if defined(BOTAN_HAS_RSA)

#include "test_pubkey.h"

#include <botan/pubkey.h>
#include <botan/rsa.h>
#include <botan/hex.h>
#include <iostream>
#include <fstream>

using namespace Botan;

namespace {

size_t rsaes_kat(const std::string& e,
                 const std::string& p,
                 const std::string& q,
                 const std::string& msg,
                 std::string padding,
                 const std::string& nonce,
                 const std::string& output)
   {
   auto& rng = test_rng();

   RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e));

   RSA_PublicKey pubkey = privkey;

   if(padding == "")
      padding = "Raw";

   PK_Encryptor_EME enc(pubkey, padding);
   PK_Decryptor_EME dec(privkey, padding);

   return validate_encryption(enc, dec, "RSAES/" + padding, msg, nonce, output);
   }

size_t rsa_sig_kat(const std::string& e,
                 const std::string& p,
                 const std::string& q,
                 const std::string& msg,
                 std::string padding,
                 const std::string& nonce,
                 const std::string& output)
   {
   auto& rng = test_rng();

   RSA_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e));

   RSA_PublicKey pubkey = privkey;

   if(padding == "")
      padding = "Raw";

   PK_Verifier verify(pubkey, padding);
   PK_Signer sign(privkey, padding);

   return validate_signature(verify, sign, "RSA/" + padding, msg, rng, nonce, output);
   }

size_t rsa_sig_verify(const std::string& e,
                      const std::string& n,
                      const std::string& msg,
                      std::string padding,
                      const std::string& signature)
   {
   BigInt e_bn(e);
   BigInt n_bn(n);

   RSA_PublicKey key(n_bn, e_bn);

   if(padding == "")
      padding = "Raw";

   PK_Verifier verify(key, padding);

   if(!verify.verify_message(hex_decode(msg), hex_decode(signature)))
      return 1;
   return 0;
   }

}

size_t test_rsa()
   {
   std::ifstream rsa_enc(TEST_DATA_DIR_PK "/rsaes.vec");
   std::ifstream rsa_sig(TEST_DATA_DIR_PK "/rsa_sig.vec");
   std::ifstream rsa_verify(TEST_DATA_DIR_PK "/rsa_verify.vec");

   size_t fails = 0;

   fails += run_tests_bb(rsa_enc, "RSA Encryption", "Ciphertext", true,
             [](std::map<std::string, std::string> m) -> size_t
             {
             return rsaes_kat(m["E"], m["P"], m["Q"], m["Msg"],
                              m["Padding"], m["Nonce"], m["Ciphertext"]);
             });

   fails += run_tests_bb(rsa_sig, "RSA Signature", "Signature", true,
             [](std::map<std::string, std::string> m) -> size_t
             {
             return rsa_sig_kat(m["E"], m["P"], m["Q"], m["Msg"],
                                m["Padding"], m["Nonce"], m["Signature"]);
             });

   fails += run_tests_bb(rsa_verify, "RSA Verify", "Signature", true,
             [](std::map<std::string, std::string> m) -> size_t
             {
             return rsa_sig_verify(m["E"], m["N"], m["Msg"],
                                   m["Padding"], m["Signature"]);
             });

   return fails;
   }

#else

SKIP_TEST(rsa);

#endif // BOTAN_HAS_RSA