Skip to content
Snippets Groups Projects
Select Git revision
  • 8886720061ff771ba4b3e954a7413f3d4ed5bffa
  • master default
  • dbck-q-n-d-link
  • foutput-text_stat-override
  • generations
  • text-stat-sha256
  • use-nettle
  • import-nettle
  • refactor-cached_get_text
  • refactor-cached_get_text-part-2
  • add-text_store
  • introduce-generation_position
  • remove-reclamation
  • dbfile-temp-filenames
  • sstrdup
  • dbfile_open_read-check-magic
  • adns_dist
  • liboop_dist
  • search
  • isc
  • dbdbckmultiplechoice
  • last.cvs.revision
  • 2.1.2
  • 2.1.1
  • 2.1.0
  • adns_1_0
  • liboop_0_9
  • 2.0.7
  • search_bp
  • 2.0.6
  • 2.0.5
  • isc_1_01
  • Protocol-A-10.4
  • 2.0.4
  • 2.0.3
  • 2.0.2
  • 2.0.1
  • 2.0.0
  • isc_1_00
  • isc_merge_1999_05_01
  • isc_merge_1999_04_21
41 results

ram-output.c

Blame
  • rsa-encrypt-test.c 2.18 KiB
    #include "testutils.h"
    
    #include "rsa.h"
    #include "knuth-lfib.h"
    
    void
    test_main(void)
    {
      struct rsa_public_key pub;
      struct rsa_private_key key;
      struct knuth_lfib_ctx lfib;
    
      /* FIXME: How is this spelled? */
      const uint8_t *msg = "Squemish ossifrage";
      size_t msg_length;
    
      uint8_t *decrypted;
      size_t decrypted_length;
      uint8_t after;
    
      mpz_t gibberish;
    
      rsa_private_key_init(&key);
      rsa_public_key_init(&pub);
      mpz_init(gibberish);
    
      knuth_lfib_init(&lfib, 17);
      
      test_rsa_set_key_1(&pub, &key);
      msg_length = strlen(msg);
    
      if (verbose)
        fprintf(stderr, "msg: `%s', length = %d\n", msg, (int) msg_length);
      
      ASSERT(rsa_encrypt(&pub,
    		     &lfib, (nettle_random_func *) knuth_lfib_random,
    		     msg_length, msg,
    		     gibberish));
    
      if (verbose)
        {
          /* In which GMP version was gmp_fprintf introduced? */
          fprintf(stderr, "encrypted: ");
          mpz_out_str(stderr, 10, gibberish);
        }
      
      decrypted = xalloc(msg_length + 1);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
      
      decrypted_length = msg_length - 1;
      ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = key.size;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
      
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt_tr(&pub, &key,
    			&lfib, (nettle_random_func *) knuth_lfib_random,
    			&decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      rsa_private_key_clear(&key);
      rsa_public_key_clear(&pub);
      mpz_clear(gibberish);
      free(decrypted);
    }