Mercurial > trustbridge
view ui/tests/commontest.cpp @ 359:f6ce186cebc2
If DO_RELEASE_BUILD is set use pubkey-release and test with it
This currently fails because polarssl rejects keys with
a public exponent larger then 64 bit.
With the following patch all tests pass. But this
currently awaits upstream comment.
https://polarssl.org/discussions/bug-report-issues/rsa-keys-with-large-public-exponents-are-rejected
--- rsa.c.orig 2014-04-10 17:22:32.727290031 +0200
+++ rsa.c 2014-04-10 17:22:38.847410225 +0200
@@ -154,7 +154,7 @@
return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED );
if( mpi_msb( &ctx->E ) < 2 ||
- mpi_msb( &ctx->E ) > 64 )
+ mpi_msb( &ctx->E ) > POLARSSL_MPI_MAX_BITS )
return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED );
return( 0 );
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Thu, 10 Apr 2014 17:50:44 +0200 |
parents | 6b4ad6ccc48e |
children | 17e1c8f37d72 |
line wrap: on
line source
#include <QString> #include <QByteArray> #include <QTest> #include "commontest.h" #include "strhelp.h" void CommonTest::testInvalidInput() { const char * foo = "Zm9vA"; /* Invalid input with a bit valid input */ char *data = NULL; size_t data_size = 0; int ret = -1; ret = str_base64_decode(&data, &data_size, (char *)foo, 5); QVERIFY(ret == 0); QVERIFY(data == QString::fromLatin1("foo")); free(data); } void CommonTest::testStrBase64Decode() { char garbage[1000]; char *data = NULL; size_t data_size = 0; int ret; for (int i = 0; i < 1000; i++) { garbage[i] = (char) qrand() % 255; } QByteArray ba(garbage, 1000); QByteArray baB64 = ba.toBase64(); ret = str_base64_decode(&data, &data_size, (char *)baB64.constData(), baB64.size()); QVERIFY(ret == 0); QVERIFY(data_size == 1000); QVERIFY(data); for (size_t i = 0; i < data_size; i++) { QVERIFY(garbage[i] == data[i]); } free (data); } QTEST_GUILESS_MAIN (CommonTest);