summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-05-25 14:30:17 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-05-29 08:41:21 +0200
commit8cd428cfc03807802998c605da505cc1d6200d98 (patch)
tree685ab5e898382cd6eb3bc89dd160ec50c40dfbf1
parent3c5408dd05ac12300359dfb88cd7369e76b727a9 (diff)
downloadgnutls-8cd428cfc03807802998c605da505cc1d6200d98.tar.gz
x509sign-verify: corrected test to perform RSA tests on RSA keys
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--tests/x509sign-verify.c38
1 files changed, 21 insertions, 17 deletions
diff --git a/tests/x509sign-verify.c b/tests/x509sign-verify.c
index 5379f36841..c1da00ca08 100644
--- a/tests/x509sign-verify.c
+++ b/tests/x509sign-verify.c
@@ -219,25 +219,28 @@ void doit(void)
if (ret != GNUTLS_SIGN_RSA_SHA1)
fail("gnutls_crt_get_signature_algorithm\n");
- ret =
- gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data,
- &signature);
- if (ret < 0)
- fail("gnutls_x509_pubkey_verify_hash2\n");
+ if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) ==
+ GNUTLS_PK_RSA) {
+ ret =
+ gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data,
+ &signature);
+ if (ret < 0)
+ fail("gnutls_x509_pubkey_verify_hash2\n");
- ret =
- gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data,
- &signature2);
- if (ret < 0)
- fail("gnutls_x509_pubkey_verify_hash-1 (hashed data)\n");
+ ret =
+ gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data,
+ &signature2);
+ if (ret < 0)
+ fail("gnutls_x509_pubkey_verify_hash-1 (hashed data)\n");
- /* should fail */
- ret =
- gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0,
- &invalid_hash_data,
- &signature2);
- if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED)
- fail("gnutls_x509_pubkey_verify_hash-2 (hashed data)\n");
+ /* should fail */
+ ret =
+ gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0,
+ &invalid_hash_data,
+ &signature2);
+ if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED)
+ fail("gnutls_x509_pubkey_verify_hash-2 (hashed data)\n");
+ }
sign_algo =
gnutls_pk_to_sign(gnutls_pubkey_get_pk_algorithm
@@ -263,6 +266,7 @@ void doit(void)
if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) ==
GNUTLS_PK_RSA) {
+
ret =
gnutls_privkey_sign_hash(privkey,
GNUTLS_DIG_SHA1,