diff options
author | Sree Harsha Totakura <totakura@in.tum.de> | 2015-01-22 17:01:11 +0000 |
---|---|---|
committer | Sree Harsha Totakura <totakura@in.tum.de> | 2015-01-22 17:01:11 +0000 |
commit | 94d1277e5e5cac0a9f66e4b5b058b4c37e718f13 (patch) | |
tree | 76c46c628de498aafc1094f755f83c71da410e60 /src/util/test_crypto_rsa.c | |
parent | fe99589f9fa55307b56552795874b95c2d0a17c0 (diff) | |
download | gnunet-94d1277e5e5cac0a9f66e4b5b058b4c37e718f13.tar.gz gnunet-94d1277e5e5cac0a9f66e4b5b058b4c37e718f13.zip |
-add a check to bail out on false signatures
Diffstat (limited to 'src/util/test_crypto_rsa.c')
-rw-r--r-- | src/util/test_crypto_rsa.c | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/src/util/test_crypto_rsa.c b/src/util/test_crypto_rsa.c index 9ecf407b0..e58a0960a 100644 --- a/src/util/test_crypto_rsa.c +++ b/src/util/test_crypto_rsa.c | |||
@@ -56,6 +56,14 @@ main (int argc, | |||
56 | GNUNET_assert (GNUNET_OK == | 56 | GNUNET_assert (GNUNET_OK == |
57 | GNUNET_CRYPTO_rsa_verify (&hash, sig, pub)); | 57 | GNUNET_CRYPTO_rsa_verify (&hash, sig, pub)); |
58 | GNUNET_CRYPTO_rsa_signature_free (sig); | 58 | GNUNET_CRYPTO_rsa_signature_free (sig); |
59 | /* corrupt our hash and see if the signature is still valid */ | ||
60 | GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, &hash, | ||
61 | sizeof (struct GNUNET_HashCode)); | ||
62 | GNUNET_assert (GNUNET_OK != GNUNET_CRYPTO_rsa_verify (&hash, | ||
63 | sig, | ||
64 | pub)); | ||
65 | (void) fprintf (stderr, "The above warning is expected.\n"); | ||
66 | |||
59 | 67 | ||
60 | /* test blind signing */ | 68 | /* test blind signing */ |
61 | bkey = GNUNET_CRYPTO_rsa_blinding_key_create (KEY_SIZE); | 69 | bkey = GNUNET_CRYPTO_rsa_blinding_key_create (KEY_SIZE); |