aboutsummaryrefslogtreecommitdiffstats
path: root/lib/crypto/test/crypto_SUITE.erl
diff options
context:
space:
mode:
authorSverker Eriksson <[email protected]>2011-09-20 20:40:00 +0200
committerSverker Eriksson <[email protected]>2011-09-21 16:08:04 +0200
commit8d44ffaa66bf096a6679a7720f1f85af33f82668 (patch)
treefacadcdbcec4d9dd5be66508a3bff9901934d240 /lib/crypto/test/crypto_SUITE.erl
parent06b914798569d70e1ecd4769e95d9969fbce97da (diff)
downloadotp-8d44ffaa66bf096a6679a7720f1f85af33f82668.tar.gz
otp-8d44ffaa66bf096a6679a7720f1f85af33f82668.tar.bz2
otp-8d44ffaa66bf096a6679a7720f1f85af33f82668.zip
Revert "Support 'md2' hash in crypto:rsa_sign/3 and crypto:rsa_verify/4"
This reverts commit 82897cc8f399fab832148711b586215c9a3f7af1.
Diffstat (limited to 'lib/crypto/test/crypto_SUITE.erl')
-rw-r--r--lib/crypto/test/crypto_SUITE.erl30
1 files changed, 8 insertions, 22 deletions
diff --git a/lib/crypto/test/crypto_SUITE.erl b/lib/crypto/test/crypto_SUITE.erl
index 2fa058c852..8d2f42469b 100644
--- a/lib/crypto/test/crypto_SUITE.erl
+++ b/lib/crypto/test/crypto_SUITE.erl
@@ -1082,30 +1082,16 @@ rsa_sign_test(Config) when is_list(Config) ->
PrivKey = [crypto:mpint(PubEx), crypto:mpint(Mod), crypto:mpint(PrivEx)],
PubKey = [crypto:mpint(PubEx), crypto:mpint(Mod)],
- ?line Sig = crypto:rsa_sign(sized_binary(Msg), PrivKey),
- ?line m(crypto:rsa_verify(sized_binary(Msg), sized_binary(Sig),PubKey), true),
+ ?line Sig1 = crypto:rsa_sign(sized_binary(Msg), PrivKey),
+ ?line m(crypto:rsa_verify(sized_binary(Msg), sized_binary(Sig1),PubKey), true),
- ?line Sig_md2 = crypto:rsa_sign(md2, sized_binary(Msg), PrivKey),
- ?line Sig_md5 = crypto:rsa_sign(md5, sized_binary(Msg), PrivKey),
- ?line Sig_sha = crypto:rsa_sign(sha, sized_binary(Msg), PrivKey),
-
- ?line m(Sig =:= Sig_sha, true),
- ?line m(Sig_md2 =:= Sig_md5, false),
- ?line m(Sig_md2 =:= Sig_sha, false),
- ?line m(Sig_md5 =:= Sig_sha, false),
+ ?line Sig2 = crypto:rsa_sign(md5, sized_binary(Msg), PrivKey),
+ ?line m(crypto:rsa_verify(md5, sized_binary(Msg), sized_binary(Sig2),PubKey), true),
+
+ ?line m(Sig1 =:= Sig2, false),
+ ?line m(crypto:rsa_verify(md5, sized_binary(Msg), sized_binary(Sig1),PubKey), false),
+ ?line m(crypto:rsa_verify(sha, sized_binary(Msg), sized_binary(Sig1),PubKey), true),
- ?line m(crypto:rsa_verify(md2, sized_binary(Msg), sized_binary(Sig_md2),PubKey), true),
- ?line m(crypto:rsa_verify(md2, sized_binary(Msg), sized_binary(Sig_md5),PubKey), false),
- ?line m(crypto:rsa_verify(md2, sized_binary(Msg), sized_binary(Sig_sha),PubKey), false),
-
- ?line m(crypto:rsa_verify(md5, sized_binary(Msg), sized_binary(Sig_md2),PubKey), false),
- ?line m(crypto:rsa_verify(md5, sized_binary(Msg), sized_binary(Sig_md5),PubKey), true),
- ?line m(crypto:rsa_verify(md5, sized_binary(Msg), sized_binary(Sig_sha),PubKey), false),
-
- ?line m(crypto:rsa_verify(sha, sized_binary(Msg), sized_binary(Sig_md2),PubKey), false),
- ?line m(crypto:rsa_verify(sha, sized_binary(Msg), sized_binary(Sig_md5),PubKey), false),
- ?line m(crypto:rsa_verify(sha, sized_binary(Msg), sized_binary(Sig_sha),PubKey), true),
-
ok.
dsa_sign_test(doc) ->