adapt rsa_test() to modified pkcs#1 decoding routines
This commit is contained in:
parent
1e9e98aa0d
commit
46c038f7d4
@ -138,7 +138,7 @@ int rsa_test(void)
|
|||||||
{
|
{
|
||||||
unsigned char in[1024], out[1024], tmp[1024];
|
unsigned char in[1024], out[1024], tmp[1024];
|
||||||
rsa_key key, privKey, pubKey;
|
rsa_key key, privKey, pubKey;
|
||||||
int hash_idx, prng_idx, stat, stat2, i;
|
int hash_idx, prng_idx, stat, stat2, i, err;
|
||||||
unsigned long rsa_msgsize, len, len2, len3, cnt, cnt2;
|
unsigned long rsa_msgsize, len, len2, len3, cnt, cnt2;
|
||||||
static unsigned char lparam[] = { 0x01, 0x02, 0x03, 0x04 };
|
static unsigned char lparam[] = { 0x01, 0x02, 0x03, 0x04 };
|
||||||
|
|
||||||
@ -204,11 +204,12 @@ for (cnt = 0; cnt < len; ) {
|
|||||||
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
|
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
|
||||||
/* change a byte */
|
/* change a byte */
|
||||||
out[8] ^= 1;
|
out[8] ^= 1;
|
||||||
DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
|
DOX((err = rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key))
|
||||||
|
== CRYPT_INVALID_PACKET ? CRYPT_OK:err, "should fail");
|
||||||
/* change a byte back */
|
/* change a byte back */
|
||||||
out[8] ^= 1;
|
out[8] ^= 1;
|
||||||
if (len2 != rsa_msgsize) {
|
if (len2 != rsa_msgsize) {
|
||||||
fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
|
fprintf(stderr, "\n%i:rsa_decrypt_key mismatch len %lu (first decrypt)", __LINE__, len2);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -235,9 +236,10 @@ for (cnt = 0; cnt < len; ) {
|
|||||||
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
|
DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
|
||||||
/* change a byte */
|
/* change a byte */
|
||||||
out[8] ^= 1;
|
out[8] ^= 1;
|
||||||
DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
|
DOX((err = rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key))
|
||||||
|
== CRYPT_INVALID_PACKET ? CRYPT_OK:err, "should fail");
|
||||||
if (len2 != rsa_msgsize) {
|
if (len2 != rsa_msgsize) {
|
||||||
fprintf(stderr, "\nrsa_decrypt_key mismatch len %lu (first decrypt)", len2);
|
fprintf(stderr, "\n%i:rsa_decrypt_key mismatch len %lu (first decrypt)", __LINE__, len2);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
/* change a byte back */
|
/* change a byte back */
|
||||||
|
Loading…
x
Reference in New Issue
Block a user