LibCrypto: Implement RSA_PSS_EMSA with OpenSSL

This commit is contained in:
devgianlu 2024-12-25 23:42:49 +01:00 committed by Jelle Raaijmakers
commit 3eeb35e787
Notes: github-actions[bot] 2025-01-17 11:44:25 +00:00
4 changed files with 86 additions and 0 deletions

View file

@ -0,0 +1,53 @@
/*
* Copyright (c) 2025, Altomani Gianluca <altomanigianluca@gmail.com>
*
* SPDX-License-Identifier: BSD-2-Clause
*/
#include <AK/ByteBuffer.h>
#include <LibCrypto/PK/RSA.h>
#include <LibTest/TestCase.h>
TEST_CASE(test_pss)
{
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
rsa.set_salt_length(48);
auto sig = TRY_OR_FAIL(rsa.sign(msg));
auto ok = TRY_OR_FAIL(rsa.verify(msg, sig));
EXPECT(ok);
}
TEST_CASE(test_pss_tampered_message)
{
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
auto msg_tampered = "WellHell0FriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
rsa.set_salt_length(48);
auto sig = TRY_OR_FAIL(rsa.sign(msg));
auto ok = TRY_OR_FAIL(rsa.verify(msg_tampered, sig));
EXPECT(!ok);
}
TEST_CASE(test_pss_tampered_signature)
{
auto msg = "WellHelloFriendsWellHelloFriendsWellHelloFriendsWellHelloFriends"sv.bytes();
auto keypair = TRY_OR_FAIL(Crypto::PK::RSA::generate_key_pair(1024));
auto rsa = Crypto::PK::RSA_PSS_EMSA(Crypto::Hash::HashKind::SHA1, keypair);
rsa.set_salt_length(48);
auto sig = TRY_OR_FAIL(rsa.sign(msg));
// Tamper with the signature
sig[8]++;
auto ok = TRY_OR_FAIL(rsa.verify(msg, sig));
EXPECT(!ok);
}