use super::*;
define_test_set!("RSA PKCS1 verify", "rsassa_pkcs1_verify_schema.json");
define_algorithm_map!("RSASSA-PKCS1-v1_5" => RsaPkcs1v15);
define_test_set_names!(
Rsa2048Sha224 => "rsa_signature_2048_sha224",
Rsa2048Sha256 => "rsa_signature_2048_sha256",
Rsa2048Sha3_224 => "rsa_signature_2048_sha3_224",
Rsa2048Sha3_256 => "rsa_signature_2048_sha3_256",
Rsa2048Sha3_384 => "rsa_signature_2048_sha3_384",
Rsa2048Sha3_512 => "rsa_signature_2048_sha3_512",
Rsa2048Sha384 => "rsa_signature_2048_sha384",
Rsa2048Sha512_224 => "rsa_signature_2048_sha512_224",
Rsa2048Sha512_256 => "rsa_signature_2048_sha512_256",
Rsa2048Sha512 => "rsa_signature_2048_sha512",
Rsa3072Sha256 => "rsa_signature_3072_sha256",
Rsa3072Sha3_256 => "rsa_signature_3072_sha3_256",
Rsa3072Sha3_384 => "rsa_signature_3072_sha3_384",
Rsa3072Sha3_512 => "rsa_signature_3072_sha3_512",
Rsa3072Sha384 => "rsa_signature_3072_sha384",
Rsa3072Sha512_256 => "rsa_signature_3072_sha512_256",
Rsa3072Sha512 => "rsa_signature_3072_sha512",
Rsa4096Sha256 => "rsa_signature_4096_sha256",
Rsa4096Sha384 => "rsa_signature_4096_sha384",
Rsa4096Sha512_256 => "rsa_signature_4096_sha512_256",
Rsa4096Sha512 => "rsa_signature_4096_sha512",
Rsa8192Sha256 => "rsa_signature_8192_sha256",
Rsa8192Sha384 => "rsa_signature_8192_sha384",
Rsa8192Sha512 => "rsa_signature_8192_sha512",
);
define_test_flags!(
BerEncodedPadding,
EdgeCaseSignature,
InvalidAsnInPadding,
InvalidPadding,
InvalidSignature,
MissingNull,
ModifiedPadding,
NoHash,
ShortPadding,
SignatureMalleability,
SmallPublicKey,
SmallSignature,
WrongHash,
WrongPrimitive,
);
define_test_group_type_id!(
"RsassaPkcs1Verify" => RsaPkcs1Verify,
);
define_test_group!(
"publicKey" => key: RsaPublic,
"publicKeyAsn" => asn_key: ByteString,
"publicKeyDer" => der: ByteString,
"keyJwk" => jwk: Option<RsaPublicJwk>,
"publicKeyPem" => pem: String,
"keySize" => key_size: usize,
"sha" => hash: HashFunction,
);
define_test!(msg: ByteString, sig: ByteString);