From: <iro...@us...> - 2004-02-18 20:23:56
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv25214 Modified Files: bignum.t Log Message: whitespace Index: bignum.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/bignum.t,v retrieving revision 1.3 retrieving revision 1.4 diff -C2 -d -r1.3 -r1.4 *** bignum.t 24 Feb 2003 01:57:49 -0000 1.3 --- bignum.t 18 Feb 2004 20:14:04 -0000 1.4 *************** *** 8,31 **** sub check_datum { ! my( $p_expected, $p_actual ) = @_; ! ok( defined( $p_expected ) ! ? $p_actual && $p_expected->equals( $p_actual ) ! : ! defined( $p_actual ) ); } sub check_key_parameters # runs 8 tests { ! my( $p_rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp ) = @_; ! my( $rn, $re, $rd, $rp, $rq, $rdmp1, $rdmq1, $riqmp ) = $p_rsa->get_key_parameters(); ! check_datum( $n, $rn ); ! check_datum( $e, $re ); ! check_datum( $d, $rd ); ! check_datum( $p, $rp ); ! check_datum( $q, $rq ); ! check_datum( $dmp1, $rdmp1 ); ! check_datum( $dmq1, $rdmq1 ); ! check_datum( $iqmp, $riqmp ); } --- 8,31 ---- sub check_datum { ! my($p_expected, $p_actual) = @_; ! ok(defined($p_expected) ! ? $p_actual && $p_expected->equals($p_actual) ! : ! defined($p_actual)); } sub check_key_parameters # runs 8 tests { ! my($p_rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp) = @_; ! my($rn, $re, $rd, $rp, $rq, $rdmp1, $rdmq1, $riqmp) = $p_rsa->get_key_parameters(); ! check_datum($n, $rn); ! check_datum($e, $re); ! check_datum($d, $rd); ! check_datum($p, $rp); ! check_datum($q, $rq); ! check_datum($dmp1, $rdmp1); ! check_datum($dmq1, $rdmq1); ! check_datum($iqmp, $riqmp); } *************** *** 34,38 **** eval { require Crypt::OpenSSL::Bignum; }; $bignum_missing = $@; ! if( $bignum_missing ) { plan tests => 0; --- 34,38 ---- eval { require Crypt::OpenSSL::Bignum; }; $bignum_missing = $@; ! if($bignum_missing) { plan tests => 0; *************** *** 44,48 **** } ! unless( $bignum_missing ) { my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); --- 44,48 ---- } ! unless ($bignum_missing) { my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); *************** *** 53,63 **** my $d = Crypt::OpenSSL::Bignum->new_from_word(107); my $n = $p->mul($q, $ctx); ! my $dmp1 = $d->mod( $p->sub( $one ), $ctx ); ! my $dmq1 = $d->mod( $q->sub( $one ), $ctx ); ! my $iqmp = $q->mod_inverse( $p, $ctx ); my $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters ! ($n, $e, $d, $p, $q ); ! ok( $rsa ); $rsa->use_no_padding(); --- 53,63 ---- my $d = Crypt::OpenSSL::Bignum->new_from_word(107); my $n = $p->mul($q, $ctx); ! my $dmp1 = $d->mod($p->sub($one), $ctx); ! my $dmq1 = $d->mod($q->sub($one), $ctx); ! my $iqmp = $q->mod_inverse($p, $ctx); my $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters ! ($n, $e, $d, $p, $q); ! ok($rsa); $rsa->use_no_padding(); *************** *** 65,95 **** my $plaintext = pack('C*', 10); my $ciphertext = pack('C*', 65); ! check_key_parameters( $rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp ); ! ok( $rsa->encrypt($plaintext) eq $ciphertext ); ! ok( $rsa->decrypt($ciphertext) eq $plaintext ); my $rsa_pub = Crypt::OpenSSL::RSA-> ! new_public_key( $rsa->get_public_key_string() ); my @pub_parameters = $rsa_pub->get_key_parameters(); ! ok( scalar( @pub_parameters ) == 8 ); ! check_key_parameters( $rsa_pub, $n, $e ); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, $d, $p ); ! check_key_parameters( $rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp ); $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters ! ($n, $e, $d, undef, $q ); ! check_key_parameters( $rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp ); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e ); ! check_key_parameters( $rsa, $n, $e ); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, $d ); ! check_key_parameters( $rsa, $n, $e, $d ); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, undef, $p ); ! check_key_parameters( $rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp ); } --- 65,95 ---- my $plaintext = pack('C*', 10); my $ciphertext = pack('C*', 65); ! check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); ! ok($rsa->encrypt($plaintext) eq $ciphertext); ! ok($rsa->decrypt($ciphertext) eq $plaintext); my $rsa_pub = Crypt::OpenSSL::RSA-> ! new_public_key($rsa->get_public_key_string()); my @pub_parameters = $rsa_pub->get_key_parameters(); ! ok(scalar(@pub_parameters) == 8); ! check_key_parameters($rsa_pub, $n, $e); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, $d, $p); ! check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters ! ($n, $e, $d, undef, $q); ! check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e); ! check_key_parameters($rsa, $n, $e); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, $d); ! check_key_parameters($rsa, $n, $e, $d); ! $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, undef, $p); ! check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); } |