From 7dce2e7f2c127029306d3ec9e0868173a1d60f14 Mon Sep 17 00:00:00 2001 From: Ethan Looney Date: Thu, 10 Sep 2020 14:47:51 -0600 Subject: [PATCH 1/5] Added unit tests for RSA.c --- tests/api.c | 392 ++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 392 insertions(+) diff --git a/tests/api.c b/tests/api.c index f9f9adc6f..c4e7cc66d 100644 --- a/tests/api.c +++ b/tests/api.c @@ -13662,6 +13662,392 @@ static int test_wc_SetKeyUsage (void) return ret; } /* END test_wc_SetKeyUsage */ +/* + * Testing wc_CheckProbablePrime() + */ +static int test_wc_CheckProbablePrime (void) +{ + int ret = 0; +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) + RsaKey key; + WC_RNG rng; + byte e[3]; + word32 eSz = (word32)sizeof(e); + byte n[512]; /* size of RSA_TEST_BYTES */ + word32 nSz = (word32)sizeof(n); + byte d[512]; + word32 dSz = (word32)sizeof(d); + byte p[512/2]; + word32 pSz = (word32)sizeof(p); + byte q[512/2]; + word32 qSz = (word32)sizeof(q); + int nlen = 1024; + int* isPrime; + int test[5]; + isPrime = test; + + + printf(testingFmt, "wc_CheckProbablePrime()"); + + + ret = wc_InitRsaKey(&key, NULL); + if (ret == 0) { + ret = wc_InitRng(&rng); + } + if (ret == 0) { + ret = wc_RsaSetRNG(&key, &rng); + } + if (ret == 0) { + ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); + } + if (ret == 0) { + ret = wc_RsaExportKey(&key, e, &eSz, n, &nSz, d, &dSz, + p, &pSz, q, &qSz); + } + /* Bad cases */ + if (ret == 0) { + ret = wc_CheckProbablePrime(NULL, pSz, q, qSz, e, eSz, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(p, 0, q, qSz, e, eSz, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(p, pSz, NULL, qSz, e, eSz, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(p, pSz, q, 0, e, eSz, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(p, pSz, q, qSz, NULL, eSz, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(p, pSz, q, qSz, e, 0, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_CheckProbablePrime(NULL, 0, NULL, 0, NULL, 0, + nlen, isPrime); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + + /* Good case */ + if (ret == 0) { + ret = wc_CheckProbablePrime(p, pSz, q, qSz, e, eSz, + nlen, isPrime); + } + + if (wc_FreeRsaKey(&key) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + if (wc_FreeRng(&rng) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + printf(resultFmt, ret == 0 ? passed : failed); +#endif + + return ret; +} /* END test_wc_CheckProbablePrime */ +/* + * Testing wc_RsaPSS_Verify() + */ +static int test_wc_RsaPSS_Verify (void) +{ + int ret = 0; +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) + RsaKey key; + WC_RNG rng; + int sz = 256; + byte* pt; + const char* szMessage = "This is the string to be signed"; + unsigned char pSignature[2048/8]; /* 2048 is RSA_KEY_SIZE */ + unsigned char pDecrypted[2048/8]; + word32 outLen = sizeof(pDecrypted); + pt = pDecrypted; + + printf(testingFmt, "wc_RsaPSS_Verify()"); + + ret = wc_InitRsaKey(&key, NULL); + + if (ret == 0) { + ret = wc_InitRng(&rng); + } + if (ret == 0) { + ret = wc_RsaSetRNG(&key, &rng); + } + if (ret == 0) { + ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); + } + + if (ret == 0) { + ret = wc_RsaPSS_Sign((byte*)szMessage, XSTRLEN(szMessage)+1, + pSignature, sizeof(pSignature), + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); + if (ret > 0 ){ + sz = ret; + ret = 0; + } + } + /* Bad cases */ + if (ret == 0) { + ret = wc_RsaPSS_Verify(NULL, sz, pt, outLen, + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_Verify(pSignature, 0, pt, outLen, + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_Verify(pSignature, sz, NULL, outLen, + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_Verify(NULL, 0, NULL, outLen, + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + /* Good case */ + if (ret == 0) { + ret = wc_RsaPSS_Verify(pSignature, sz, pt, outLen, + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret > 0) { + ret = 0; + } + } + if (wc_FreeRsaKey(&key) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + if (wc_FreeRng(&rng) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + printf(resultFmt, ret == 0 ? passed : failed); +#endif + + return ret; +} /* END test_wc_RsaPSS_Verify */ +/* + * Testing wc_RsaPSS_VerifyCheck() + */ +static int test_wc_RsaPSS_VerifyCheck (void) +{ + int ret = 0; +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) + RsaKey key; + WC_RNG rng; + int sz = 256; + byte* pt; + byte digest[2048]; /* WC_MAX_DIGEST_SIZE */ + word32 digestSz; + unsigned char pSignature[2048/8]; /* 2048 is RSA_KEY_SIZE */ + unsigned char pDecrypted[2048/8]; + word32 outLen = sizeof(pDecrypted); + pt = pDecrypted; + + printf(testingFmt, "wc_RsaPSS_VerifyCheck()"); + + ret = wc_InitRsaKey(&key, NULL); + + if (ret == 0) { + ret = wc_InitRng(&rng); + } + if (ret == 0) { + ret = wc_RsaSetRNG(&key, &rng); + } + if (ret == 0) { + ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); + } + if (ret == 0) { + ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, sizeof(digest)); + digestSz = wc_HashGetDigestSize(WC_HASH_TYPE_SHA256); + } + + if (ret == 0) { + ret = wc_RsaPSS_Sign(digest, digestSz, + pSignature, sizeof(pSignature), + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); + if (ret > 0 ){ + sz = ret; + ret = 0; + } + } + /* Bad cases */ + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheck(NULL, sz, pt, outLen, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheck(pSignature, 0, pt, outLen, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheck(pSignature, sz, NULL, outLen, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheck(NULL, 0, NULL, outLen, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + + /* Good case */ + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheck(pSignature, sz, pt, outLen, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret > 0) { + ret = 0; + } + } + if (wc_FreeRsaKey(&key) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + if (wc_FreeRng(&rng) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + printf(resultFmt, ret == 0 ? passed : failed); +#endif + + return ret; +} /* END test_wc_RsaPSS_VerifyCheck */ +/* + * Testing wc_RsaPSS_VerifyCheckInline() + */ +static int test_wc_RsaPSS_VerifyCheckInline (void) +{ + int ret = 0; +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) + RsaKey key; + WC_RNG rng; + int sz = 256; + byte* pt; + byte digest[2048]; /* WC_MAX_DIGEST_SIZE */ + word32 digestSz; + unsigned char pSignature[2048/8]; /* 2048 is RSA_KEY_SIZE */ + unsigned char pDecrypted[2048/8]; + pt = pDecrypted; + + + printf(testingFmt, "wc_RsaPSS_VerifyCheckInline()"); + + ret = wc_InitRsaKey(&key, NULL); + + if (ret == 0) { + ret = wc_InitRng(&rng); + } + if (ret == 0) { + ret = wc_RsaSetRNG(&key, &rng); + } + if (ret == 0) { + ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); + } + if (ret == 0) { + ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, sizeof(digest)); + digestSz = wc_HashGetDigestSize(WC_HASH_TYPE_SHA256); + } + + if (ret == 0) { + ret = wc_RsaPSS_Sign(digest, digestSz, + pSignature, sizeof(pSignature), + WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); + if (ret > 0 ){ + sz = ret; + ret = 0; + } + } + /* Bad Cases */ + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheckInline(NULL, sz, &pt, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheckInline(pSignature, 0, NULL, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheckInline(NULL, 0, &pt, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheckInline(pSignature, sz, &pt, + digest, digestSz, WC_HASH_TYPE_SHA, WC_MGF1SHA256, &key); + if (ret == BAD_FUNC_ARG) { + ret = 0; + } + } + /* Good case */ + if (ret == 0) { + ret = wc_RsaPSS_VerifyCheckInline(pSignature, sz, &pt, + digest, digestSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key); + if (ret > 0) { + ret = 0; + } + } + if (wc_FreeRsaKey(&key) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + if (wc_FreeRng(&rng) || ret != 0) { + ret = WOLFSSL_FATAL_ERROR; + } + printf(resultFmt, ret == 0 ? passed : failed); +#endif + + return ret; +} /* END test_wc_RsaPSS_VerifyCheckInline */ + #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) static void sample_mutex_cb (int flag, int type, const char* file, int line) { @@ -35896,6 +36282,12 @@ void ApiTest(void) AssertIntEQ(test_wc_MakeRsaKey(), 0); AssertIntEQ(test_wc_SetKeyUsage (), 0); + AssertIntEQ(test_wc_CheckProbablePrime (), 0); + //AssertIntEQ(test_wc_CheckProbablePrime_ex (), 0); + AssertIntEQ(test_wc_RsaPSS_Verify (), 0); + AssertIntEQ(test_wc_RsaPSS_VerifyCheck (), 0); + AssertIntEQ(test_wc_RsaPSS_VerifyCheckInline (), 0); + AssertIntEQ(test_wc_SetMutexCb(), 0); AssertIntEQ(test_wc_LockMutex_ex(), 0); From a466a57f1db2c153f2327d775ec49af1468735b6 Mon Sep 17 00:00:00 2001 From: Ethan Looney Date: Fri, 11 Sep 2020 14:28:10 -0600 Subject: [PATCH 2/5] Added fips check and cast variable to word32 --- tests/api.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/tests/api.c b/tests/api.c index c4e7cc66d..f0a179d17 100644 --- a/tests/api.c +++ b/tests/api.c @@ -13668,7 +13668,8 @@ static int test_wc_SetKeyUsage (void) static int test_wc_CheckProbablePrime (void) { int ret = 0; -#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST) && \ + !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING) RsaKey key; WC_RNG rng; byte e[3]; @@ -13778,7 +13779,8 @@ static int test_wc_CheckProbablePrime (void) static int test_wc_RsaPSS_Verify (void) { int ret = 0; -#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST) && \ + !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING) RsaKey key; WC_RNG rng; int sz = 256; @@ -13804,7 +13806,7 @@ static int test_wc_RsaPSS_Verify (void) } if (ret == 0) { - ret = wc_RsaPSS_Sign((byte*)szMessage, XSTRLEN(szMessage)+1, + ret = wc_RsaPSS_Sign((byte*)szMessage, (word32)XSTRLEN(szMessage)+1, pSignature, sizeof(pSignature), WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); if (ret > 0 ){ @@ -13866,7 +13868,8 @@ static int test_wc_RsaPSS_Verify (void) static int test_wc_RsaPSS_VerifyCheck (void) { int ret = 0; -#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST) && \ + !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING) RsaKey key; WC_RNG rng; int sz = 256; @@ -13960,7 +13963,8 @@ static int test_wc_RsaPSS_VerifyCheck (void) static int test_wc_RsaPSS_VerifyCheckInline (void) { int ret = 0; -#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) +#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST) && \ + !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING) RsaKey key; WC_RNG rng; int sz = 256; From da4478bdf1a281ce26c0c063665fb93d1e686fbc Mon Sep 17 00:00:00 2001 From: Ethan Looney Date: Tue, 15 Sep 2020 12:58:52 -0600 Subject: [PATCH 3/5] Fixed valgrind issues --- tests/api.c | 34 +++++++++------------------------- 1 file changed, 9 insertions(+), 25 deletions(-) diff --git a/tests/api.c b/tests/api.c index f0a179d17..ad17e08b0 100644 --- a/tests/api.c +++ b/tests/api.c @@ -13760,14 +13760,10 @@ static int test_wc_CheckProbablePrime (void) if (ret == 0) { ret = wc_CheckProbablePrime(p, pSz, q, qSz, e, eSz, nlen, isPrime); - } - - if (wc_FreeRsaKey(&key) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } - if (wc_FreeRng(&rng) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; } + wc_FreeRsaKey(&key); + wc_FreeRng(&rng); + printf(resultFmt, ret == 0 ? passed : failed); #endif @@ -13851,12 +13847,8 @@ static int test_wc_RsaPSS_Verify (void) ret = 0; } } - if (wc_FreeRsaKey(&key) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } - if (wc_FreeRng(&rng) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } + wc_FreeRsaKey(&key); + wc_FreeRng(&rng); printf(resultFmt, ret == 0 ? passed : failed); #endif @@ -13946,12 +13938,8 @@ static int test_wc_RsaPSS_VerifyCheck (void) ret = 0; } } - if (wc_FreeRsaKey(&key) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } - if (wc_FreeRng(&rng) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } + wc_FreeRsaKey(&key); + wc_FreeRng(&rng); printf(resultFmt, ret == 0 ? passed : failed); #endif @@ -14040,12 +14028,8 @@ static int test_wc_RsaPSS_VerifyCheckInline (void) ret = 0; } } - if (wc_FreeRsaKey(&key) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } - if (wc_FreeRng(&rng) || ret != 0) { - ret = WOLFSSL_FATAL_ERROR; - } + wc_FreeRsaKey(&key); + wc_FreeRng(&rng); printf(resultFmt, ret == 0 ? passed : failed); #endif From 53b82fccdbe56abaa4938a4b386af6a88cc9a0d3 Mon Sep 17 00:00:00 2001 From: Ethan Looney Date: Tue, 22 Sep 2020 13:26:52 -0600 Subject: [PATCH 4/5] Fixed valgrind issues -2 --- tests/api.c | 31 +++++++++++++++++++------------ 1 file changed, 19 insertions(+), 12 deletions(-) diff --git a/tests/api.c b/tests/api.c index ad17e08b0..5673e6385 100644 --- a/tests/api.c +++ b/tests/api.c @@ -13864,17 +13864,21 @@ static int test_wc_RsaPSS_VerifyCheck (void) !defined(HAVE_FIPS) && defined(WC_RSA_BLINDING) RsaKey key; WC_RNG rng; - int sz = 256; + int sz = 128; /* 1024/8 */ byte* pt; - byte digest[2048]; /* WC_MAX_DIGEST_SIZE */ + byte digest[32]; word32 digestSz; - unsigned char pSignature[2048/8]; /* 2048 is RSA_KEY_SIZE */ - unsigned char pDecrypted[2048/8]; + unsigned char pSignature[1024/8]; /* 2048 is RSA_KEY_SIZE */ + word32 pSignatureSz = sizeof(pSignature); + unsigned char pDecrypted[1024/8]; word32 outLen = sizeof(pDecrypted); - pt = pDecrypted; + pt = pDecrypted; printf(testingFmt, "wc_RsaPSS_VerifyCheck()"); + XMEMSET(digest, 0, sizeof(digest)); + XMEMSET(pSignature, 0, sizeof(pSignature)); + ret = wc_InitRsaKey(&key, NULL); if (ret == 0) { @@ -13887,13 +13891,13 @@ static int test_wc_RsaPSS_VerifyCheck (void) ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); } if (ret == 0) { - ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, sizeof(digest)); digestSz = wc_HashGetDigestSize(WC_HASH_TYPE_SHA256); + ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, digestSz); + } if (ret == 0) { - ret = wc_RsaPSS_Sign(digest, digestSz, - pSignature, sizeof(pSignature), + ret = wc_RsaPSS_Sign(digest, digestSz, pSignature, pSignatureSz, WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); if (ret > 0 ){ sz = ret; @@ -13957,7 +13961,7 @@ static int test_wc_RsaPSS_VerifyCheckInline (void) WC_RNG rng; int sz = 256; byte* pt; - byte digest[2048]; /* WC_MAX_DIGEST_SIZE */ + byte digest[32]; word32 digestSz; unsigned char pSignature[2048/8]; /* 2048 is RSA_KEY_SIZE */ unsigned char pDecrypted[2048/8]; @@ -13968,6 +13972,9 @@ static int test_wc_RsaPSS_VerifyCheckInline (void) ret = wc_InitRsaKey(&key, NULL); + XMEMSET(digest, 0, sizeof(digest)); + XMEMSET(pSignature, 0, sizeof(pSignature)); + if (ret == 0) { ret = wc_InitRng(&rng); } @@ -13978,13 +13985,13 @@ static int test_wc_RsaPSS_VerifyCheckInline (void) ret = wc_MakeRsaKey(&key, 1024, WC_RSA_EXPONENT, &rng); } if (ret == 0) { - ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, sizeof(digest)); digestSz = wc_HashGetDigestSize(WC_HASH_TYPE_SHA256); + ret = wc_Hash(WC_HASH_TYPE_SHA256, pSignature, sz, digest, digestSz); + } if (ret == 0) { - ret = wc_RsaPSS_Sign(digest, digestSz, - pSignature, sizeof(pSignature), + ret = wc_RsaPSS_Sign(digest, digestSz, pSignature, sizeof(pSignature), WC_HASH_TYPE_SHA256, WC_MGF1SHA256, &key, &rng); if (ret > 0 ){ sz = ret; From 95995d22723f6066452a8bc2767d98126b09247f Mon Sep 17 00:00:00 2001 From: Ethan Looney Date: Wed, 23 Sep 2020 13:42:33 -0600 Subject: [PATCH 5/5] Removed forgotten comment --- tests/api.c | 1 - 1 file changed, 1 deletion(-) diff --git a/tests/api.c b/tests/api.c index 5673e6385..1c0b1d4de 100644 --- a/tests/api.c +++ b/tests/api.c @@ -36278,7 +36278,6 @@ void ApiTest(void) AssertIntEQ(test_wc_SetKeyUsage (), 0); AssertIntEQ(test_wc_CheckProbablePrime (), 0); - //AssertIntEQ(test_wc_CheckProbablePrime_ex (), 0); AssertIntEQ(test_wc_RsaPSS_Verify (), 0); AssertIntEQ(test_wc_RsaPSS_VerifyCheck (), 0); AssertIntEQ(test_wc_RsaPSS_VerifyCheckInline (), 0);