tests: Assert success of calls to mbedtls_rsa_set_padding()
Signed-off-by: Ronald Cron <ronald.cron@arm.com>
This commit is contained in:
parent
d2cfa3e980
commit
266b6d2121
3 changed files with 32 additions and 16 deletions
|
@ -26,7 +26,8 @@ void pkcs1_rsaes_v15_encrypt( int mod, int radix_N, char * input_N,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V15, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V15, hash ) == 0 );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
@ -73,7 +74,8 @@ void pkcs1_rsaes_v15_decrypt( int mod, int radix_P, char * input_P,
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V15, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V15, hash ) == 0 );
|
||||||
|
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
||||||
|
@ -280,7 +282,8 @@ void pkcs1_rsassa_v15_sign( int mod, int radix_P, char * input_P, int radix_Q,
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V15, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V15, hash ) == 0 );
|
||||||
|
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
@ -329,7 +332,8 @@ void pkcs1_rsassa_v15_verify( int mod, int radix_N, char * input_N,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V15, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V15, hash ) == 0 );
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
|
|
@ -25,7 +25,8 @@ void pkcs1_rsaes_oaep_encrypt( int mod, data_t * input_N, data_t * input_E,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V21, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V21, hash ) == 0 );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
||||||
|
@ -69,7 +70,8 @@ void pkcs1_rsaes_oaep_decrypt( int mod, data_t * input_P, data_t * input_Q,
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
|
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V21, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V21, hash ) == 0 );
|
||||||
|
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
||||||
|
@ -134,7 +136,8 @@ void pkcs1_rsassa_pss_sign( int mod, data_t * input_P, data_t * input_Q,
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V21, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V21, hash ) == 0 );
|
||||||
|
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
@ -193,7 +196,8 @@ void pkcs1_rsassa_pss_verify( int mod, data_t * input_N, data_t * input_E,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V21, hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V21, hash ) == 0 );
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
||||||
|
@ -230,7 +234,8 @@ void pkcs1_rsassa_pss_verify_ext( int mod, data_t * input_N, data_t * input_E,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, MBEDTLS_RSA_PKCS_V21, ctx_hash );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,
|
||||||
|
MBEDTLS_RSA_PKCS_V21, ctx_hash ) == 0 );
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_binary( &N, input_N->x, input_N->len ) == 0 );
|
||||||
|
|
|
@ -80,7 +80,8 @@ void mbedtls_rsa_pkcs1_sign( data_t * message_str, int padding_mode,
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx,padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
|
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
@ -130,7 +131,8 @@ void mbedtls_rsa_pkcs1_verify( data_t * message_str, int padding_mode,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
memset( hash_result, 0x00, sizeof( hash_result ) );
|
memset( hash_result, 0x00, sizeof( hash_result ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
@ -165,7 +167,8 @@ void rsa_pkcs1_sign_raw( data_t * hash_result,
|
||||||
mbedtls_test_rnd_pseudo_info rnd_info;
|
mbedtls_test_rnd_pseudo_info rnd_info;
|
||||||
|
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &P );
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
|
|
||||||
|
@ -213,7 +216,8 @@ void rsa_pkcs1_verify_raw( data_t * hash_result,
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
|
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
@ -248,7 +252,8 @@ void mbedtls_rsa_pkcs1_encrypt( data_t * message_str, int padding_mode,
|
||||||
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
||||||
|
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
@ -290,7 +295,8 @@ void rsa_pkcs1_encrypt_bad_rng( data_t * message_str, int padding_mode,
|
||||||
|
|
||||||
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &N ); mbedtls_mpi_init( &E );
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
|
|
||||||
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
TEST_ASSERT( mbedtls_mpi_read_string( &N, radix_N, input_N ) == 0 );
|
||||||
|
@ -336,7 +342,8 @@ void mbedtls_rsa_pkcs1_decrypt( data_t * message_str, int padding_mode,
|
||||||
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
mbedtls_mpi_init( &Q ); mbedtls_mpi_init( &E );
|
||||||
|
|
||||||
mbedtls_rsa_init( &ctx );
|
mbedtls_rsa_init( &ctx );
|
||||||
mbedtls_rsa_set_padding( &ctx, padding_mode, MBEDTLS_MD_NONE );
|
TEST_ASSERT( mbedtls_rsa_set_padding( &ctx, padding_mode,
|
||||||
|
MBEDTLS_MD_NONE ) == 0 );
|
||||||
|
|
||||||
memset( output, 0x00, sizeof( output ) );
|
memset( output, 0x00, sizeof( output ) );
|
||||||
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
memset( &rnd_info, 0, sizeof( mbedtls_test_rnd_pseudo_info ) );
|
||||||
|
|
Loading…
Reference in a new issue