aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSree Harsha Totakura <totakura@in.tum.de>2015-01-22 17:01:11 +0000
committerSree Harsha Totakura <totakura@in.tum.de>2015-01-22 17:01:11 +0000
commit94d1277e5e5cac0a9f66e4b5b058b4c37e718f13 (patch)
tree76c46c628de498aafc1094f755f83c71da410e60
parentfe99589f9fa55307b56552795874b95c2d0a17c0 (diff)
downloadgnunet-94d1277e5e5cac0a9f66e4b5b058b4c37e718f13.tar.gz
gnunet-94d1277e5e5cac0a9f66e4b5b058b4c37e718f13.zip
-add a check to bail out on false signatures
-rw-r--r--src/util/test_crypto_rsa.c8
1 files changed, 8 insertions, 0 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c
index 9ecf407b0..e58a0960a 100644
--- a/src/util/test_crypto_rsa.c
+++ b/src/util/test_crypto_rsa.c
@@ -56,6 +56,14 @@ main (int argc,
56 GNUNET_assert (GNUNET_OK == 56 GNUNET_assert (GNUNET_OK ==
57 GNUNET_CRYPTO_rsa_verify (&hash, sig, pub)); 57 GNUNET_CRYPTO_rsa_verify (&hash, sig, pub));
58 GNUNET_CRYPTO_rsa_signature_free (sig); 58 GNUNET_CRYPTO_rsa_signature_free (sig);
59 /* corrupt our hash and see if the signature is still valid */
60 GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash,
61 sizeof (struct GNUNET_HashCode));
62 GNUNET_assert (GNUNET_OK != GNUNET_CRYPTO_rsa_verify (&hash,
63 sig,
64 pub));
65 (void) fprintf (stderr, "The above warning is expected.\n");
66
59 67
60 /* test blind signing */ 68 /* test blind signing */
61 bkey = GNUNET_CRYPTO_rsa_blinding_key_create (KEY_SIZE); 69 bkey = GNUNET_CRYPTO_rsa_blinding_key_create (KEY_SIZE);