Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv8408
Modified Files:
bignum.t
Log Message:
use a bigger key, to minimize chances of random openssl blinding errors
Index: bignum.t
===================================================================
RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/bignum.t,v
retrieving revision 1.8
retrieving revision 1.9
diff -C2 -d -r1.8 -r1.9
*** bignum.t 19 Feb 2004 16:09:46 -0000 1.8
--- bignum.t 25 Feb 2004 03:32:49 -0000 1.9
***************
*** 8,11 ****
--- 8,12 ----
BEGIN
{
+ # FIXME - add version requirement
eval { require Crypt::OpenSSL::Bignum; };
$bignum_missing = $@;
***************
*** 41,48 ****
my $ctx = Crypt::OpenSSL::Bignum::CTX->new();
my $one = Crypt::OpenSSL::Bignum->one();
! my $p = Crypt::OpenSSL::Bignum->new_from_word(11);
! my $q = Crypt::OpenSSL::Bignum->new_from_word(17);
! my $e = Crypt::OpenSSL::Bignum->new_from_word(3);
! my $d = Crypt::OpenSSL::Bignum->new_from_word(107);
my $n = $p->mul($q, $ctx);
my $dmp1 = $d->mod($p->sub($one), $ctx);
--- 42,49 ----
my $ctx = Crypt::OpenSSL::Bignum::CTX->new();
my $one = Crypt::OpenSSL::Bignum->one();
! my $p = Crypt::OpenSSL::Bignum->new_from_word(65521);
! my $q = Crypt::OpenSSL::Bignum->new_from_word(65537);
! my $e = Crypt::OpenSSL::Bignum->new_from_word(11);
! my $d = $e->mod_inverse($p->sub($one)->mul($q->sub($one), $ctx), $ctx);
my $n = $p->mul($q, $ctx);
my $dmp1 = $d->mod($p->sub($one), $ctx);
***************
*** 55,60 ****
$rsa->use_no_padding();
! my $plaintext = pack('C*', 10);
! my $ciphertext = pack('C*', 65);
check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp);
--- 56,62 ----
$rsa->use_no_padding();
! my $plaintext = pack('C*', 100, 100, 100, 12);
! my $ciphertext = Crypt::OpenSSL::Bignum->new_from_bin($plaintext)->
! mod_exp($e, $n, $ctx)->to_bin();
check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp);
|