forked from wolfSSL/wolfssl
Merge pull request #5944 from JacobBarthelmeh/Testing
fix for older selftest that returns bad padding instead of salt len e…
This commit is contained in:
@@ -14833,15 +14833,19 @@ static int rsa_pss_test(WC_RNG* rng, RsaKey* key)
|
|||||||
(!defined(HAVE_SELFTEST_VERSION) || (HAVE_SELFTEST_VERSION < 2))
|
(!defined(HAVE_SELFTEST_VERSION) || (HAVE_SELFTEST_VERSION < 2))
|
||||||
ret = wc_RsaPSS_CheckPadding_ex(digest, digestSz, plain, plainSz,
|
ret = wc_RsaPSS_CheckPadding_ex(digest, digestSz, plain, plainSz,
|
||||||
hash[0], len);
|
hash[0], len);
|
||||||
|
if (ret != PSS_SALTLEN_E)
|
||||||
|
ERROR_OUT(-7745, exit_rsa_pss);
|
||||||
#elif defined(HAVE_SELFTEST) && (HAVE_SELFTEST_VERSION == 2)
|
#elif defined(HAVE_SELFTEST) && (HAVE_SELFTEST_VERSION == 2)
|
||||||
ret = wc_RsaPSS_CheckPadding_ex(digest, digestSz, plain, plainSz,
|
ret = wc_RsaPSS_CheckPadding_ex(digest, digestSz, plain, plainSz,
|
||||||
hash[0], len, 0);
|
hash[0], len, 0);
|
||||||
|
if (ret != BAD_PADDING_E)
|
||||||
|
ERROR_OUT(-7745, exit_rsa_pss);
|
||||||
#else
|
#else
|
||||||
ret = wc_RsaPSS_CheckPadding_ex2(digest, digestSz, plain, plainSz, hash[0],
|
ret = wc_RsaPSS_CheckPadding_ex2(digest, digestSz, plain, plainSz, hash[0],
|
||||||
len, 0, HEAP_HINT);
|
len, 0, HEAP_HINT);
|
||||||
#endif
|
|
||||||
if (ret != PSS_SALTLEN_E)
|
if (ret != PSS_SALTLEN_E)
|
||||||
ERROR_OUT(-7745, exit_rsa_pss);
|
ERROR_OUT(-7745, exit_rsa_pss);
|
||||||
|
#endif
|
||||||
|
|
||||||
ret = 0;
|
ret = 0;
|
||||||
#endif /* WOLFSSL_SE050 */
|
#endif /* WOLFSSL_SE050 */
|
||||||
|
Reference in New Issue
Block a user