diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-25 14:30:17 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-29 08:41:21 +0200 |
commit | 8cd428cfc03807802998c605da505cc1d6200d98 (patch) | |
tree | 685ab5e898382cd6eb3bc89dd160ec50c40dfbf1 | |
parent | 3c5408dd05ac12300359dfb88cd7369e76b727a9 (diff) | |
download | gnutls-8cd428cfc03807802998c605da505cc1d6200d98.tar.gz |
x509sign-verify: corrected test to perform RSA tests on RSA keys
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r-- | tests/x509sign-verify.c | 38 |
1 files changed, 21 insertions, 17 deletions
diff --git a/tests/x509sign-verify.c b/tests/x509sign-verify.c index 5379f36841..c1da00ca08 100644 --- a/tests/x509sign-verify.c +++ b/tests/x509sign-verify.c @@ -219,25 +219,28 @@ void doit(void) if (ret != GNUTLS_SIGN_RSA_SHA1) fail("gnutls_crt_get_signature_algorithm\n"); - ret = - gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data, - &signature); - if (ret < 0) - fail("gnutls_x509_pubkey_verify_hash2\n"); + if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) == + GNUTLS_PK_RSA) { + ret = + gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data, + &signature); + if (ret < 0) + fail("gnutls_x509_pubkey_verify_hash2\n"); - ret = - gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data, - &signature2); - if (ret < 0) - fail("gnutls_x509_pubkey_verify_hash-1 (hashed data)\n"); + ret = + gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, &hash_data, + &signature2); + if (ret < 0) + fail("gnutls_x509_pubkey_verify_hash-1 (hashed data)\n"); - /* should fail */ - ret = - gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, - &invalid_hash_data, - &signature2); - if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) - fail("gnutls_x509_pubkey_verify_hash-2 (hashed data)\n"); + /* should fail */ + ret = + gnutls_pubkey_verify_hash2(pubkey, GNUTLS_SIGN_RSA_SHA1, 0, + &invalid_hash_data, + &signature2); + if (ret != GNUTLS_E_PK_SIG_VERIFY_FAILED) + fail("gnutls_x509_pubkey_verify_hash-2 (hashed data)\n"); + } sign_algo = gnutls_pk_to_sign(gnutls_pubkey_get_pk_algorithm @@ -263,6 +266,7 @@ void doit(void) if (gnutls_pubkey_get_pk_algorithm(pubkey, NULL) == GNUTLS_PK_RSA) { + ret = gnutls_privkey_sign_hash(privkey, GNUTLS_DIG_SHA1, |