Skip to content
Snippets Groups Projects
Select Git revision
  • a78265874b34c2885ceb32e839698b2a892b274e
  • master default
  • chacha-poly1305-test
  • rsa-crt-hardening
  • chacha96
  • fat-library
  • versioned-symbols
  • curve25519
  • dsa-reorg
  • aead-api
  • set_key-changes
  • poly1305
  • aes-reorg
  • nettle-2.7-fixes
  • size_t-changes
  • ecc-support
  • experimental-20050201
  • lsh-1.4.2
  • nettle_3.1.1_release_20150424
  • nettle_3.1_release_20150407
  • nettle_3.1rc3
  • nettle_3.1rc2
  • nettle_3.1rc1
  • nettle_3.0_release_20140607
  • nettle_2.7.1_release_20130528
  • nettle_2.7_release_20130424
  • nettle_2.6_release_20130116
  • nettle_2.5_release_20120707
  • converted-master-branch-to-git
  • nettle_2.4_release_20110903
  • nettle_2.3_release_20110902
  • nettle_2.2_release_20110711
  • nettle_2.1_release_20100725
  • camellia_32bit_20100720
  • nettle_2.0_release_20090608
  • nettle_1.15_release_20061128
  • after_experimental_merge_20060516
  • head_before_experimental_merge_20060516
38 results

rsa-encrypt-test.c

Blame
  • Forked from Nettle / nettle
    Source project has a limited visibility.
    rsa-encrypt-test.c 2.18 KiB
    #include "testutils.h"
    
    #include "rsa.h"
    #include "knuth-lfib.h"
    
    void
    test_main(void)
    {
      struct rsa_public_key pub;
      struct rsa_private_key key;
      struct knuth_lfib_ctx lfib;
    
      /* FIXME: How is this spelled? */
      const uint8_t *msg = "Squemish ossifrage";
      size_t msg_length;
    
      uint8_t *decrypted;
      size_t decrypted_length;
      uint8_t after;
    
      mpz_t gibberish;
    
      rsa_private_key_init(&key);
      rsa_public_key_init(&pub);
      mpz_init(gibberish);
    
      knuth_lfib_init(&lfib, 17);
      
      test_rsa_set_key_1(&pub, &key);
      msg_length = strlen(msg);
    
      if (verbose)
        fprintf(stderr, "msg: `%s', length = %d\n", msg, (int) msg_length);
      
      ASSERT(rsa_encrypt(&pub,
    		     &lfib, (nettle_random_func *) knuth_lfib_random,
    		     msg_length, msg,
    		     gibberish));
    
      if (verbose)
        {
          /* In which GMP version was gmp_fprintf introduced? */
          fprintf(stderr, "encrypted: ");
          mpz_out_str(stderr, 10, gibberish);
        }
      
      decrypted = xalloc(msg_length + 1);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
      
      decrypted_length = msg_length - 1;
      ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = key.size;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
      
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt_tr(&pub, &key,
    			&lfib, (nettle_random_func *) knuth_lfib_random,
    			&decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      rsa_private_key_clear(&key);
      rsa_public_key_clear(&pub);
      mpz_clear(gibberish);
      free(decrypted);
    }