aboutsummaryrefslogtreecommitdiffstats
path: root/src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp')
-rw-r--r--src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp85
1 files changed, 0 insertions, 85 deletions
diff --git a/src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp b/src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp
deleted file mode 100644
index e8d88e99f3..0000000000
--- a/src/libs/3rdparty/botan/src/lib/pubkey/keypair/keypair.cpp
+++ /dev/null
@@ -1,85 +0,0 @@
-/*
-* Keypair Checks
-* (C) 1999-2010 Jack Lloyd
-*
-* Botan is released under the Simplified BSD License (see license.txt)
-*/
-
-#include <botan/keypair.h>
-#include <botan/pubkey.h>
-#include <botan/rng.h>
-
-namespace Botan {
-
-namespace KeyPair {
-
-/*
-* Check an encryption key pair for consistency
-*/
-bool encryption_consistency_check(RandomNumberGenerator& rng,
- const Private_Key& private_key,
- const Public_Key& public_key,
- const std::string& padding)
- {
- PK_Encryptor_EME encryptor(public_key, rng, padding);
- PK_Decryptor_EME decryptor(private_key, rng, padding);
-
- /*
- Weird corner case, if the key is too small to encrypt anything at
- all. This can happen with very small RSA keys with PSS
- */
- if(encryptor.maximum_input_size() == 0)
- return true;
-
- std::vector<uint8_t> plaintext =
- unlock(rng.random_vec(encryptor.maximum_input_size() - 1));
-
- std::vector<uint8_t> ciphertext = encryptor.encrypt(plaintext, rng);
- if(ciphertext == plaintext)
- return false;
-
- std::vector<uint8_t> decrypted = unlock(decryptor.decrypt(ciphertext));
-
- return (plaintext == decrypted);
- }
-
-/*
-* Check a signature key pair for consistency
-*/
-bool signature_consistency_check(RandomNumberGenerator& rng,
- const Private_Key& private_key,
- const Public_Key& public_key,
- const std::string& padding)
- {
- PK_Signer signer(private_key, rng, padding);
- PK_Verifier verifier(public_key, padding);
-
- std::vector<uint8_t> message(32);
- rng.randomize(message.data(), message.size());
-
- std::vector<uint8_t> signature;
-
- try
- {
- signature = signer.sign_message(message, rng);
- }
- catch(Encoding_Error&)
- {
- return false;
- }
-
- if(!verifier.verify_message(message, signature))
- return false;
-
- // Now try to check a corrupt signature, ensure it does not succeed
- ++signature[0];
-
- if(verifier.verify_message(message, signature))
- return false;
-
- return true;
- }
-
-}
-
-}