summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNiels Möller <nisse@lysator.liu.se>2015-11-15 21:35:38 +0100
committerNiels Möller <nisse@lysator.liu.se>2015-11-15 21:35:38 +0100
commitd8b586f5b403bceba725b3a7624f41d6b19d9f22 (patch)
tree0ae7d8390b74e5faca44f2665e129ca657015d1e
parent38f11b9b46e9cd44a6767e6687891984a9e2ec5f (diff)
downloadnettle-d8b586f5b403bceba725b3a7624f41d6b19d9f22.tar.gz
Extended rsa signature test cases.
-rw-r--r--ChangeLog3
-rw-r--r--testsuite/testutils.c86
2 files changed, 46 insertions, 43 deletions
diff --git a/ChangeLog b/ChangeLog
index 70cc1c28..826766e1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -11,6 +11,9 @@
* rsa.h: Added corresponding prototypes.
* Makefile.in (hogweed_SOURCES): Added new files.
+ * testsuite/testutils.c (SIGN): Extend macro to test new
+ functions, and the rsa_*_sign_digest functions. Updated callers.
+
2015-09-14 Niels Möller <nisse@lysator.liu.se>
* rsa-decrypt-tr.c (rsa_decrypt_tr): Use rsa_compute_root_tr.
diff --git a/testsuite/testutils.c b/testsuite/testutils.c
index 1ef04c98..36efe855 100644
--- a/testsuite/testutils.c
+++ b/testsuite/testutils.c
@@ -663,9 +663,33 @@ xalloc_limbs (mp_size_t n)
return xalloc (n * sizeof (mp_limb_t));
}
-#define SIGN(key, hash, msg, signature) do { \
- hash##_update(&hash, LDATA(msg)); \
- ASSERT(rsa_##hash##_sign(key, &hash, signature)); \
+/* Expects local variables pub, key, rstate, digest, signature */
+#define SIGN(hash, msg, expected) do { \
+ hash##_update(&hash, LDATA(msg)); \
+ ASSERT(rsa_##hash##_sign(key, &hash, signature)); \
+ if (verbose) \
+ { \
+ fprintf(stderr, "rsa-%s signature: ", #hash); \
+ mpz_out_str(stderr, 16, signature); \
+ fprintf(stderr, "\n"); \
+ } \
+ ASSERT(mpz_cmp (signature, expected) == 0); \
+ \
+ hash##_update(&hash, LDATA(msg)); \
+ ASSERT(rsa_##hash##_sign_tr(pub, key, &rstate, \
+ (nettle_random_func *) knuth_lfib_random, \
+ &hash, signature)); \
+ ASSERT(mpz_cmp (signature, expected) == 0); \
+ \
+ hash##_update(&hash, LDATA(msg)); \
+ hash##_digest(&hash, sizeof(digest), digest); \
+ ASSERT(rsa_##hash##_sign_digest(key, digest, signature)); \
+ ASSERT(mpz_cmp (signature, expected) == 0); \
+ \
+ ASSERT(rsa_##hash##_sign_digest_tr(pub, key, &rstate, \
+ (nettle_random_func *)knuth_lfib_random, \
+ digest, signature)); \
+ ASSERT(mpz_cmp (signature, expected) == 0); \
} while(0)
#define VERIFY(key, hash, msg, signature) ( \
@@ -770,22 +794,16 @@ test_rsa_md5(struct rsa_public_key *pub,
mpz_t expected)
{
struct md5_ctx md5;
+ struct knuth_lfib_ctx rstate;
+ uint8_t digest[MD5_DIGEST_SIZE];
mpz_t signature;
md5_init(&md5);
mpz_init(signature);
-
- SIGN(key, md5, "The magic words are squeamish ossifrage", signature);
+ knuth_lfib_init (&rstate, 15);
- if (verbose)
- {
- fprintf(stderr, "rsa-md5 signature: ");
- mpz_out_str(stderr, 16, signature);
- fprintf(stderr, "\n");
- }
+ SIGN(md5, "The magic words are squeamish ossifrage", expected);
- ASSERT (mpz_cmp(signature, expected) == 0);
-
/* Try bad data */
ASSERT (!VERIFY(pub, md5,
"The magick words are squeamish ossifrage", signature));
@@ -808,22 +826,16 @@ test_rsa_sha1(struct rsa_public_key *pub,
mpz_t expected)
{
struct sha1_ctx sha1;
+ struct knuth_lfib_ctx rstate;
+ uint8_t digest[SHA1_DIGEST_SIZE];
mpz_t signature;
sha1_init(&sha1);
mpz_init(signature);
+ knuth_lfib_init (&rstate, 16);
- SIGN(key, sha1, "The magic words are squeamish ossifrage", signature);
+ SIGN(sha1, "The magic words are squeamish ossifrage", expected);
- if (verbose)
- {
- fprintf(stderr, "rsa-sha1 signature: ");
- mpz_out_str(stderr, 16, signature);
- fprintf(stderr, "\n");
- }
-
- ASSERT (mpz_cmp(signature, expected) == 0);
-
/* Try bad data */
ASSERT (!VERIFY(pub, sha1,
"The magick words are squeamish ossifrage", signature));
@@ -846,22 +858,16 @@ test_rsa_sha256(struct rsa_public_key *pub,
mpz_t expected)
{
struct sha256_ctx sha256;
+ struct knuth_lfib_ctx rstate;
+ uint8_t digest[SHA256_DIGEST_SIZE];
mpz_t signature;
sha256_init(&sha256);
mpz_init(signature);
+ knuth_lfib_init (&rstate, 17);
- SIGN(key, sha256, "The magic words are squeamish ossifrage", signature);
+ SIGN(sha256, "The magic words are squeamish ossifrage", expected);
- if (verbose)
- {
- fprintf(stderr, "rsa-sha256 signature: ");
- mpz_out_str(stderr, 16, signature);
- fprintf(stderr, "\n");
- }
-
- ASSERT (mpz_cmp(signature, expected) == 0);
-
/* Try bad data */
ASSERT (!VERIFY(pub, sha256,
"The magick words are squeamish ossifrage", signature));
@@ -884,22 +890,16 @@ test_rsa_sha512(struct rsa_public_key *pub,
mpz_t expected)
{
struct sha512_ctx sha512;
+ struct knuth_lfib_ctx rstate;
+ uint8_t digest[SHA512_DIGEST_SIZE];
mpz_t signature;
sha512_init(&sha512);
mpz_init(signature);
+ knuth_lfib_init (&rstate, 18);
- SIGN(key, sha512, "The magic words are squeamish ossifrage", signature);
+ SIGN(sha512, "The magic words are squeamish ossifrage", expected);
- if (verbose)
- {
- fprintf(stderr, "rsa-sha512 signature: ");
- mpz_out_str(stderr, 16, signature);
- fprintf(stderr, "\n");
- }
-
- ASSERT (mpz_cmp(signature, expected) == 0);
-
/* Try bad data */
ASSERT (!VERIFY(pub, sha512,
"The magick words are squeamish ossifrage", signature));