mirror of
https://github.com/openssl/openssl.git
synced 2025-02-23 14:42:15 +08:00
Refactor rsa_test
Reduce code copying by factoring out common code into a separate function. Reviewed-by: Paul Dale <pauli@openssl.org>
This commit is contained in:
parent
55869f594f
commit
4357b6174a
@ -41,8 +41,7 @@
|
||||
BN_bin2bn(dmp1, sizeof(dmp1)-1, NULL), \
|
||||
BN_bin2bn(dmq1, sizeof(dmq1)-1, NULL), \
|
||||
BN_bin2bn(iqmp, sizeof(iqmp)-1, NULL)); \
|
||||
if (c == NULL) \
|
||||
return 0; \
|
||||
if (c != NULL) \
|
||||
memcpy(c, ctext_ex, sizeof(ctext_ex) - 1); \
|
||||
return sizeof(ctext_ex) - 1;
|
||||
|
||||
@ -212,15 +211,6 @@ static int key3(RSA *key, unsigned char *c)
|
||||
SetKey;
|
||||
}
|
||||
|
||||
static int pad_unknown(void)
|
||||
{
|
||||
unsigned long l;
|
||||
while ((l = ERR_get_error()) != 0)
|
||||
if (ERR_GET_REASON(l) == RSA_R_UNKNOWN_PADDING_TYPE)
|
||||
return 1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int rsa_setkey(RSA** key, unsigned char *ctext, int idx)
|
||||
{
|
||||
int clen = 0;
|
||||
@ -241,64 +231,49 @@ static int rsa_setkey(RSA** key, unsigned char* ctext, int idx)
|
||||
return clen;
|
||||
}
|
||||
|
||||
static int test_rsa_pkcs1(int idx)
|
||||
static int test_rsa_simple(int idx, int pad_type, unsigned char *ctext_ex,
|
||||
int *clen, RSA **retkey)
|
||||
{
|
||||
int ret = 0;
|
||||
RSA *key;
|
||||
unsigned char ptext[256];
|
||||
unsigned char ctext[256];
|
||||
static unsigned char ptext_ex[] = "\x54\x85\x9b\x34\x2c\x49\xea\x2a";
|
||||
unsigned char ctext_ex[256];
|
||||
int plen;
|
||||
int clen = 0;
|
||||
int clentmp = 0;
|
||||
int num;
|
||||
|
||||
plen = sizeof(ptext_ex) - 1;
|
||||
clen = rsa_setkey(&key, ctext_ex, idx);
|
||||
clentmp = rsa_setkey(&key, ctext_ex, idx);
|
||||
if (clen != NULL)
|
||||
*clen = clentmp;
|
||||
|
||||
num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
|
||||
RSA_PKCS1_PADDING);
|
||||
if (!TEST_int_eq(num, clen))
|
||||
num = RSA_public_encrypt(plen, ptext_ex, ctext, key, pad_type);
|
||||
if (!TEST_int_eq(num, clentmp))
|
||||
goto err;
|
||||
|
||||
num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING);
|
||||
num = RSA_private_decrypt(num, ctext, ptext, key, pad_type);
|
||||
if (!TEST_mem_eq(ptext, num, ptext_ex, plen))
|
||||
goto err;
|
||||
|
||||
ret = 1;
|
||||
if (retkey != NULL) {
|
||||
*retkey = key;
|
||||
key = NULL;
|
||||
}
|
||||
err:
|
||||
RSA_free(key);
|
||||
return ret;
|
||||
}
|
||||
|
||||
static int test_rsa_pkcs1(int idx)
|
||||
{
|
||||
return test_rsa_simple(idx, RSA_PKCS1_PADDING, NULL, NULL, NULL);
|
||||
}
|
||||
|
||||
static int test_rsa_sslv23(int idx)
|
||||
{
|
||||
int ret = 0;
|
||||
RSA *key;
|
||||
unsigned char ptext[256];
|
||||
unsigned char ctext[256];
|
||||
static unsigned char ptext_ex[] = "\x54\x85\x9b\x34\x2c\x49\xea\x2a";
|
||||
unsigned char ctext_ex[256];
|
||||
int plen;
|
||||
int clen = 0;
|
||||
int num;
|
||||
|
||||
plen = sizeof(ptext_ex) - 1;
|
||||
clen = rsa_setkey(&key, ctext_ex, idx);
|
||||
|
||||
num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
|
||||
RSA_SSLV23_PADDING);
|
||||
if (!TEST_int_eq(num, clen))
|
||||
goto err;
|
||||
|
||||
num = RSA_private_decrypt(num, ctext, ptext, key, RSA_SSLV23_PADDING);
|
||||
if (!TEST_mem_eq(ptext, num, ptext_ex, plen))
|
||||
goto err;
|
||||
|
||||
ret = 1;
|
||||
err:
|
||||
RSA_free(key);
|
||||
return ret;
|
||||
return test_rsa_simple(idx, RSA_SSLV23_PADDING, NULL, NULL, NULL);
|
||||
}
|
||||
|
||||
static int test_rsa_oaep(int idx)
|
||||
@ -314,28 +289,15 @@ static int test_rsa_oaep(int idx)
|
||||
int num;
|
||||
int n;
|
||||
|
||||
if (!test_rsa_simple(idx, RSA_PKCS1_OAEP_PADDING, ctext_ex, &clen, &key))
|
||||
goto err;
|
||||
|
||||
plen = sizeof(ptext_ex) - 1;
|
||||
clen = rsa_setkey(&key, ctext_ex, idx);
|
||||
|
||||
num = RSA_public_encrypt(plen, ptext_ex, ctext, key,
|
||||
RSA_PKCS1_OAEP_PADDING);
|
||||
if (num == -1 && pad_unknown()) {
|
||||
TEST_info("Skipping: No OAEP support");
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
if (!TEST_int_eq(num, clen))
|
||||
goto err;
|
||||
|
||||
num = RSA_private_decrypt(num, ctext, ptext, key,
|
||||
RSA_PKCS1_OAEP_PADDING);
|
||||
if (!TEST_mem_eq(ptext, num, ptext_ex, plen))
|
||||
goto err;
|
||||
|
||||
/* Different ciphertexts. Try decrypting ctext_ex */
|
||||
num = RSA_private_decrypt(clen, ctext_ex, ptext, key,
|
||||
RSA_PKCS1_OAEP_PADDING);
|
||||
if (!TEST_mem_eq(ptext, num, ptext_ex, plen))
|
||||
if (num <= 0 || !TEST_mem_eq(ptext, num, ptext_ex, plen))
|
||||
goto err;
|
||||
|
||||
/* Try decrypting corrupted ciphertexts. */
|
||||
|
Loading…
Reference in New Issue
Block a user