Gaurav Shah | 7d122e2 | 2010-02-24 16:41:32 -0800 | [diff] [blame^] | 1 | /* Copyright (c) 2010 The Chromium OS Authors. All rights reserved. |
| 2 | * Use of this source code is governed by a BSD-style license that can be |
| 3 | * found in the LICENSE file. |
| 4 | */ |
| 5 | |
| 6 | #include "rsa_padding_test.h" |
| 7 | |
| 8 | #include <stdio.h> |
| 9 | |
| 10 | #include "file_keys.h" |
| 11 | #include "rsa_utility.h" |
| 12 | |
| 13 | int main(int argc, char* argv[]) { |
| 14 | int i; |
| 15 | int error = 0; |
| 16 | RSAPublicKey* key; |
| 17 | if (argc != 2) { |
| 18 | fprintf(stderr, "Usage: %s <test public key>\n", argv[0]); |
| 19 | return 1; |
| 20 | } |
| 21 | key = RSAPublicKeyFromFile(argv[1]); |
| 22 | if (!key) { |
| 23 | fprintf(stderr, "Couldn't read RSA public key for the test.\n"); |
| 24 | return 1; |
| 25 | } |
| 26 | |
| 27 | /* The first test signature is valid. */ |
| 28 | if (!RSA_verify(key, signatures[0], RSA1024NUMBYTES, 0, |
| 29 | test_message_sha1_hash)) { |
| 30 | fprintf(stderr, "RSA Padding Test vector 0 FAILED!\n"); |
| 31 | error = 255; /* Test failure. */ |
| 32 | } |
| 33 | /* All other signatures should fail verification. */ |
| 34 | for (i = 1; i < sizeof(signatures) / sizeof(signatures[0]); i++) { |
| 35 | if (RSA_verify(key, signatures[i], RSA1024NUMBYTES, 0, |
| 36 | test_message_sha1_hash)) { |
| 37 | fprintf(stderr, "RSA Padding Test vector %d FAILED!\n", i); |
| 38 | error = 255; /* Test failure. */ |
| 39 | } |
| 40 | } |
| 41 | if (!error) |
| 42 | fprintf(stderr, "RSA Padding Test PASSED for all test vectors."); |
| 43 | |
| 44 | return error; |
| 45 | } |