Skip to content
Snippets Groups Projects
Select Git revision
  • a1f6f7c992a8380cf08a539015fcb74e6ae27466
  • master default
  • wip-slh-dsa-sha2-128s
  • master-updates
  • release-3.10-fixes
  • getopt-prototype
  • fix-bcrypt-warning
  • refactor-hmac
  • wip-use-alignas
  • trim-sha3-context
  • fix-gitlab-ci
  • check-fat-emulate
  • delete-digest_func-size
  • slh-dsa-shake-128f-nettle
  • slh-dsa-shake-128s-nettle
  • slh-dsa-shake-128s
  • delete-openpgp
  • ppc64-sha512
  • delete-md5-compat
  • cleanup-hmac-tests
  • ppc64-sha256
  • nettle_3.10.2_release_20250626
  • nettle_3.10.1_release_20241230
  • nettle_3.10_release_20240616
  • nettle_3.10rc2
  • nettle_3.10rc1
  • nettle_3.9.1_release_20230601
  • nettle_3.9_release_20230514
  • nettle_3.8.1_release_20220727
  • nettle_3.8_release_20220602
  • nettle_3.7.3_release_20210606
  • nettle_3.7.2_release_20210321
  • nettle_3.7.1_release_20210217
  • nettle_3.7_release_20210104
  • nettle_3.7rc1
  • nettle_3.6_release_20200429
  • nettle_3.6rc3
  • nettle_3.6rc2
  • nettle_3.6rc1
  • nettle_3.5.1_release_20190627
  • nettle_3.5_release_20190626
41 results

dsa.c

Blame
  • rsa-encrypt-test.c 2.18 KiB
    #include "testutils.h"
    
    #include "rsa.h"
    #include "knuth-lfib.h"
    
    void
    test_main(void)
    {
      struct rsa_public_key pub;
      struct rsa_private_key key;
      struct knuth_lfib_ctx lfib;
    
      /* FIXME: How is this spelled? */
      const uint8_t *msg = "Squemish ossifrage";
      size_t msg_length;
    
      uint8_t *decrypted;
      size_t decrypted_length;
      uint8_t after;
    
      mpz_t gibberish;
    
      rsa_private_key_init(&key);
      rsa_public_key_init(&pub);
      mpz_init(gibberish);
    
      knuth_lfib_init(&lfib, 17);
      
      test_rsa_set_key_1(&pub, &key);
      msg_length = strlen(msg);
    
      if (verbose)
        fprintf(stderr, "msg: `%s', length = %d\n", msg, (int) msg_length);
      
      ASSERT(rsa_encrypt(&pub,
    		     &lfib, (nettle_random_func *) knuth_lfib_random,
    		     msg_length, msg,
    		     gibberish));
    
      if (verbose)
        {
          /* In which GMP version was gmp_fprintf introduced? */
          fprintf(stderr, "encrypted: ");
          mpz_out_str(stderr, 10, gibberish);
        }
      
      decrypted = xalloc(msg_length + 1);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
      
      decrypted_length = msg_length - 1;
      ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = key.size;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
      
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt_tr(&pub, &key,
    			&lfib, (nettle_random_func *) knuth_lfib_random,
    			&decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      rsa_private_key_clear(&key);
      rsa_public_key_clear(&pub);
      mpz_clear(gibberish);
      free(decrypted);
    }