1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
|
/*
* (C) 2014,2015 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include "tests.h"
#if defined(BOTAN_HAS_RW)
#include "test_pubkey.h"
#include <botan/hex.h>
#include <iostream>
#include <fstream>
#include <botan/pubkey.h>
#include <botan/rw.h>
using namespace Botan;
namespace {
const std::string padding = "EMSA2(SHA-1)";
size_t rw_sig_kat(const std::string& e,
const std::string& p,
const std::string& q,
const std::string& msg,
const std::string& signature)
{
auto& rng = test_rng();
RW_PrivateKey privkey(rng, BigInt(p), BigInt(q), BigInt(e));
RW_PublicKey pubkey = privkey;
PK_Verifier verify(pubkey, padding);
PK_Signer sign(privkey, padding);
return validate_signature(verify, sign, "RW/" + padding, msg, rng, signature);
}
size_t rw_sig_verify(const std::string& e,
const std::string& n,
const std::string& msg,
const std::string& signature)
{
BigInt e_bn(e);
BigInt n_bn(n);
RW_PublicKey key(n_bn, e_bn);
PK_Verifier verify(key, padding);
if(!verify.verify_message(hex_decode(msg), hex_decode(signature)))
return 1;
return 0;
}
}
size_t test_rw()
{
size_t fails = 0;
std::ifstream rw_sig(PK_TEST_DATA_DIR "/rw_sig.vec");
std::ifstream rw_verify(PK_TEST_DATA_DIR "/rw_verify.vec");
fails += run_tests_bb(rw_sig, "RW Signature", "Signature", true,
[](std::map<std::string, std::string> m) -> size_t
{
return rw_sig_kat(m["E"], m["P"], m["Q"], m["Msg"], m["Signature"]);
});
fails += run_tests_bb(rw_verify, "RW Verify", "Signature", true,
[](std::map<std::string, std::string> m) -> size_t
{
return rw_sig_verify(m["E"], m["N"], m["Msg"], m["Signature"]);
});
return fails;
}
#else
SKIP_TEST(rw);
#endif // BOTAN_HAS_RW
|