Skip to content
Snippets Groups Projects
Select Git revision
  • 91e7fca38c5ed92c4e1f7ab22792a50e0468fa9f
  • master default
  • wip-add-ed25519
  • disable-sha1
  • lsh-2.0.4
  • experimental-20050201
  • lsh-1.4.2
  • lsh-1.2
  • lsh_2.1_release_20130626
  • converted-master-branch-to-git
  • nettle_2.4_release_20110903
  • nettle_2.3_release_20110902
  • nettle_2.2_release_20110711
  • nettle_2.1_release_20100725
  • camellia_32bit_20100720
  • nettle_2.0_release_20090608
  • converted-lsh-2.0.4-branch-to-git
  • lsh_2.0.4_release_20070905
  • lsh_2.9_exp_release_20070404
  • nettle_1.15_release_20061128
  • after_experimental_merge_20060516
  • branch_before_experimental_merge_20060516
  • converted-experimental-branch-to-git
  • head_before_experimental_merge_20060516
  • lsh_2.0.3_release_20060509
  • lsh_2.0.2_release_20060127
  • nettle_1.14_release_20051205
  • nettle_1.13_release_20051006
28 results

combinators.c

Blame
  • rsa-encrypt-test.c 2.18 KiB
    #include "testutils.h"
    
    #include "rsa.h"
    #include "knuth-lfib.h"
    
    void
    test_main(void)
    {
      struct rsa_public_key pub;
      struct rsa_private_key key;
      struct knuth_lfib_ctx lfib;
    
      /* FIXME: How is this spelled? */
      const uint8_t *msg = "Squemish ossifrage";
      size_t msg_length;
    
      uint8_t *decrypted;
      size_t decrypted_length;
      uint8_t after;
    
      mpz_t gibberish;
    
      rsa_private_key_init(&key);
      rsa_public_key_init(&pub);
      mpz_init(gibberish);
    
      knuth_lfib_init(&lfib, 17);
      
      test_rsa_set_key_1(&pub, &key);
      msg_length = strlen(msg);
    
      if (verbose)
        fprintf(stderr, "msg: `%s', length = %d\n", msg, (int) msg_length);
      
      ASSERT(rsa_encrypt(&pub,
    		     &lfib, (nettle_random_func *) knuth_lfib_random,
    		     msg_length, msg,
    		     gibberish));
    
      if (verbose)
        {
          /* In which GMP version was gmp_fprintf introduced? */
          fprintf(stderr, "encrypted: ");
          mpz_out_str(stderr, 10, gibberish);
        }
      
      decrypted = xalloc(msg_length + 1);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
      
      decrypted_length = msg_length - 1;
      ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = key.size;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
      
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt_tr(&pub, &key,
    			&lfib, (nettle_random_func *) knuth_lfib_random,
    			&decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      rsa_private_key_clear(&key);
      rsa_public_key_clear(&pub);
      mpz_clear(gibberish);
      free(decrypted);
    }