mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-09-03 16:16:43 +00:00
LibCrypto: Implement RSA_PSS_EMSA
with OpenSSL
This commit is contained in:
parent
cce000d57c
commit
3eeb35e787
Notes:
github-actions[bot]
2025-01-17 11:44:25 +00:00
Author: https://github.com/devgianlu
Commit: 3eeb35e787
Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/3252
Reviewed-by: https://github.com/gmta ✅
4 changed files with 86 additions and 0 deletions
53
Tests/LibCrypto/TestPSS.cpp
Normal file
53
Tests/LibCrypto/TestPSS.cpp
Normal file
|
@ -0,0 +1,53 @@
|
|||
/*
|
||||
* Copyright (c) 2025, Altomani Gianluca <altomanigianluca@gmail.com>
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-2-Clause
|
||||
*/
|
||||
|
||||
#include <AK/ByteBuffer.h>
|
||||
#include <LibCrypto/PK/RSA.h>
|
||||
#include <LibTest/TestCase.h>
|
||||
|
||||
TEST_CASE(test_pss)
|
||||
{
|
||||
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
|
||||
|
||||
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
|
||||
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
|
||||
rsa.set_salt_length(48);
|
||||
|
||||
auto sig = TRY_OR_FAIL(rsa.sign(msg));
|
||||
auto ok = TRY_OR_FAIL(rsa.verify(msg, sig));
|
||||
EXPECT(ok);
|
||||
}
|
||||
|
||||
TEST_CASE(test_pss_tampered_message)
|
||||
{
|
||||
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
|
||||
auto msg_tampered = "WellHell0FriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
|
||||
|
||||
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
|
||||
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
|
||||
rsa.set_salt_length(48);
|
||||
|
||||
auto sig = TRY_OR_FAIL(rsa.sign(msg));
|
||||
auto ok = TRY_OR_FAIL(rsa.verify(msg_tampered, sig));
|
||||
EXPECT(!ok);
|
||||
}
|
||||
|
||||
TEST_CASE(test_pss_tampered_signature)
|
||||
{
|
||||
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
|
||||
|
||||
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
|
||||
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
|
||||
rsa.set_salt_length(48);
|
||||
|
||||
auto sig = TRY_OR_FAIL(rsa.sign(msg));
|
||||
|
||||
// Tamper with the signature
|
||||
sig[8]++;
|
||||
|
||||
auto ok = TRY_OR_FAIL(rsa.verify(msg, sig));
|
||||
EXPECT(!ok);
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue