|
From: <iro...@us...> - 2004-02-25 03:39:41
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv8408 Modified Files: bignum.t Log Message: use a bigger key, to minimize chances of random openssl blinding errors Index: bignum.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/bignum.t,v retrieving revision 1.8 retrieving revision 1.9 diff -C2 -d -r1.8 -r1.9 *** bignum.t 19 Feb 2004 16:09:46 -0000 1.8 --- bignum.t 25 Feb 2004 03:32:49 -0000 1.9 *************** *** 8,11 **** --- 8,12 ---- BEGIN { + # FIXME - add version requirement eval { require Crypt::OpenSSL::Bignum; }; $bignum_missing = $@; *************** *** 41,48 **** my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); my $one = Crypt::OpenSSL::Bignum->one(); ! my $p = Crypt::OpenSSL::Bignum->new_from_word(11); ! my $q = Crypt::OpenSSL::Bignum->new_from_word(17); ! my $e = Crypt::OpenSSL::Bignum->new_from_word(3); ! my $d = Crypt::OpenSSL::Bignum->new_from_word(107); my $n = $p->mul($q, $ctx); my $dmp1 = $d->mod($p->sub($one), $ctx); --- 42,49 ---- my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); my $one = Crypt::OpenSSL::Bignum->one(); ! my $p = Crypt::OpenSSL::Bignum->new_from_word(65521); ! my $q = Crypt::OpenSSL::Bignum->new_from_word(65537); ! my $e = Crypt::OpenSSL::Bignum->new_from_word(11); ! my $d = $e->mod_inverse($p->sub($one)->mul($q->sub($one), $ctx), $ctx); my $n = $p->mul($q, $ctx); my $dmp1 = $d->mod($p->sub($one), $ctx); *************** *** 55,60 **** $rsa->use_no_padding(); ! my $plaintext = pack('C*', 10); ! my $ciphertext = pack('C*', 65); check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); --- 56,62 ---- $rsa->use_no_padding(); ! my $plaintext = pack('C*', 100, 100, 100, 12); ! my $ciphertext = Crypt::OpenSSL::Bignum->new_from_bin($plaintext)-> ! mod_exp($e, $n, $ctx)->to_bin(); check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); |