2 This file is part of GNUnet
3 Copyright (C) 2014,2015 Christian Grothoff (and other contributing authors)
5 GNUnet is free software; you can redistribute it and/or modify it under the
6 terms of the GNU General Public License as published by the Free Software
7 Foundation; either version 3, or (at your option) any later version.
9 GNUnet is distributed in the hope that it will be useful, but WITHOUT ANY
10 WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
11 A PARTICULAR PURPOSE. See the GNU General Public License for more details.
13 You should have received a copy of the GNU General Public License along with
14 TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
18 * @file util/test_crypto_rsa.c
19 * @brief testcase for utility functions for RSA cryptography
20 * @author Sree Harsha Totakura <sreeharsha@totakura.in>
23 #include "gnunet_util_lib.h"
32 #define RND_BLK_SIZE 4096
33 unsigned char rnd_blk[RND_BLK_SIZE];
34 struct GNUNET_CRYPTO_rsa_PrivateKey *priv;
35 struct GNUNET_CRYPTO_rsa_PublicKey *pub;
36 struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
37 struct GNUNET_CRYPTO_rsa_Signature *sig;
38 struct GNUNET_CRYPTO_rsa_Signature *bsig;
39 struct GNUNET_HashCode hash;
43 GNUNET_log_setup ("test-rsa", "WARNING", NULL);
44 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
47 GNUNET_CRYPTO_hash (rnd_blk,
50 priv = GNUNET_CRYPTO_rsa_private_key_create (KEY_SIZE);
51 pub = GNUNET_CRYPTO_rsa_private_key_get_public (priv);
56 size = GNUNET_CRYPTO_rsa_private_key_encode (priv, &enc);
58 GNUNET_CRYPTO_rsa_private_key_free (priv);
60 priv = GNUNET_CRYPTO_rsa_private_key_decode (enc, size);
61 GNUNET_assert (NULL != priv);
62 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
64 GNUNET_assert (NULL == GNUNET_CRYPTO_rsa_private_key_decode (enc, size));
65 (void) fprintf (stderr, "The above warning is expected.\n");
68 /* try ordinary sig first */
69 sig = GNUNET_CRYPTO_rsa_sign (priv,
72 GNUNET_assert (GNUNET_OK ==
73 GNUNET_CRYPTO_rsa_verify (&hash, sig, pub));
74 /* corrupt our hash and see if the signature is still valid */
75 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash,
76 sizeof (struct GNUNET_HashCode));
77 GNUNET_assert (GNUNET_OK != GNUNET_CRYPTO_rsa_verify (&hash,
80 (void) fprintf (stderr, "The above warning is expected.\n");
81 GNUNET_CRYPTO_rsa_signature_free (sig);
84 /* test blind signing */
85 bkey = GNUNET_CRYPTO_rsa_blinding_key_create (KEY_SIZE);
86 bsize = GNUNET_CRYPTO_rsa_blind (&hash,
90 GNUNET_assert (0 != bsize);
91 bsig = GNUNET_CRYPTO_rsa_sign (priv,
94 GNUNET_free (blind_buf);
95 sig = GNUNET_CRYPTO_rsa_unblind (bsig,
98 GNUNET_CRYPTO_rsa_signature_free (bsig);
99 GNUNET_assert (GNUNET_OK ==
100 GNUNET_CRYPTO_rsa_verify (&hash, sig, pub));
101 GNUNET_CRYPTO_rsa_signature_free (sig);
102 GNUNET_CRYPTO_rsa_private_key_free (priv);
103 GNUNET_CRYPTO_rsa_public_key_free (pub);
104 GNUNET_CRYPTO_rsa_blinding_key_free (bkey);