Skip to content
Snippets Groups Projects
Select Git revision
  • 99255182b33407b29edee5fc30c4495ee09ccb1f
  • master default protected
  • 9.0
  • marcus/wix3
  • 8.0
  • nt-tools
  • 7.8
  • 7.6
  • 7.4
  • 7.2
  • 7.0
  • 0.6
  • rosuav/latex-markdown-renderer
  • rxnpatch/rxnpatch
  • marcus/gobject-introspection
  • rxnpatch/8.0
  • rosuav/pre-listening-ports
  • rosuav/async-annotations
  • rosuav/pgsql-ssl
  • rxnpatch/rxnpatch-broken/2023-10-06T094250
  • grubba/fdlib
  • v8.0.2020
  • v8.0.2018
  • v8.0.2016
  • v8.0.2014
  • v8.0.2012
  • v8.0.2008
  • v8.0.2006
  • v8.0.2004
  • v8.0.2002
  • v8.0.2000
  • v8.0.1998
  • v8.0.1996
  • v8.0.1994
  • v8.0.1992
  • v8.0.1990
  • v8.0.1988
  • v8.0.1986
  • rxnpatch/clusters/8.0/2025-04-29T124414
  • rxnpatch/2025-04-29T124414
  • v8.0.1984
41 results

stralloc.h

Blame
  • rsa-encrypt-test.c 2.18 KiB
    #include "testutils.h"
    
    #include "rsa.h"
    #include "knuth-lfib.h"
    
    void
    test_main(void)
    {
      struct rsa_public_key pub;
      struct rsa_private_key key;
      struct knuth_lfib_ctx lfib;
    
      /* FIXME: How is this spelled? */
      const uint8_t *msg = "Squemish ossifrage";
      size_t msg_length;
    
      uint8_t *decrypted;
      size_t decrypted_length;
      uint8_t after;
    
      mpz_t gibberish;
    
      rsa_private_key_init(&key);
      rsa_public_key_init(&pub);
      mpz_init(gibberish);
    
      knuth_lfib_init(&lfib, 17);
      
      test_rsa_set_key_1(&pub, &key);
      msg_length = strlen(msg);
    
      if (verbose)
        fprintf(stderr, "msg: `%s', length = %d\n", msg, (int) msg_length);
      
      ASSERT(rsa_encrypt(&pub,
    		     &lfib, (nettle_random_func *) knuth_lfib_random,
    		     msg_length, msg,
    		     gibberish));
    
      if (verbose)
        {
          /* In which GMP version was gmp_fprintf introduced? */
          fprintf(stderr, "encrypted: ");
          mpz_out_str(stderr, 10, gibberish);
        }
      
      decrypted = xalloc(msg_length + 1);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
      
      decrypted_length = msg_length - 1;
      ASSERT(!rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = key.size;
      ASSERT(rsa_decrypt(&key, &decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
      
      knuth_lfib_random (&lfib, msg_length + 1, decrypted);
      after = decrypted[msg_length];
    
      decrypted_length = msg_length;
      ASSERT(rsa_decrypt_tr(&pub, &key,
    			&lfib, (nettle_random_func *) knuth_lfib_random,
    			&decrypted_length, decrypted, gibberish));
      ASSERT(decrypted_length == msg_length);
      ASSERT(MEMEQ(msg_length, msg, decrypted));
      ASSERT(decrypted[msg_length] == after);
    
      rsa_private_key_clear(&key);
      rsa_public_key_clear(&pub);
      mpz_clear(gibberish);
      free(decrypted);
    }