1. Added the pair-wise consistency test to the RSA Key Gen.

2. Modified an RSA key size test case so it didn't try to make a key that was too big.
This commit is contained in:
John Safranek
2018-05-17 16:43:27 -07:00
parent 4dacd31ea4
commit dd0489db8c
2 changed files with 9 additions and 6 deletions

View File

@@ -10298,8 +10298,6 @@ static int test_wc_RsaEncryptSize (void)
#if !defined(NO_RSA) && defined(WOLFSSL_KEY_GEN)
RsaKey key;
WC_RNG rng;
int enc128 = 128;
int enc512 = 512;
ret = wc_InitRsaKey(&key, NULL);
@@ -10313,7 +10311,7 @@ static int test_wc_RsaEncryptSize (void)
if (ret == 0) {
ret = wc_RsaEncryptSize(&key);
}
if (ret == enc128) {
if (ret == 128) {
ret = 0;
} else {
ret = WOLFSSL_FATAL_ERROR;
@@ -10326,11 +10324,11 @@ static int test_wc_RsaEncryptSize (void)
}
if (ret == 0) {
ret = MAKE_RSA_KEY(&key, FOURK_BUF, WC_RSA_EXPONENT, &rng);
ret = MAKE_RSA_KEY(&key, 2048, WC_RSA_EXPONENT, &rng);
if (ret == 0) {
ret = wc_RsaEncryptSize(&key);
}
if (ret == enc512) {
if (ret == 256) {
ret = 0;
} else {
ret = WOLFSSL_FATAL_ERROR;