aboutsummaryrefslogtreecommitdiffstats
path: root/lib/crypto/test
diff options
context:
space:
mode:
authorSverker Eriksson <[email protected]>2012-06-27 15:35:26 +0200
committerIngela Anderton Andin <[email protected]>2012-08-22 14:00:41 +0200
commit90167202a4ce3dc6d4822fad04c51cc35913d796 (patch)
tree3974d8c7346b1d23b2be7b71bc3521b1811c591c /lib/crypto/test
parent2702f65e834a65d05d82cebf77bc7385becbf3a7 (diff)
downloadotp-90167202a4ce3dc6d4822fad04c51cc35913d796.tar.gz
otp-90167202a4ce3dc6d4822fad04c51cc35913d796.tar.bz2
otp-90167202a4ce3dc6d4822fad04c51cc35913d796.zip
crypto: Redo interface for rsa and dss hash signing
Replace _hash functions with {digest,_} argument to existing sign/verify functions.
Diffstat (limited to 'lib/crypto/test')
-rw-r--r--lib/crypto/test/crypto_SUITE.erl14
1 files changed, 7 insertions, 7 deletions
diff --git a/lib/crypto/test/crypto_SUITE.erl b/lib/crypto/test/crypto_SUITE.erl
index a399511de0..6cc00d85ad 100644
--- a/lib/crypto/test/crypto_SUITE.erl
+++ b/lib/crypto/test/crypto_SUITE.erl
@@ -1225,15 +1225,15 @@ rsa_sign_hash_test(Config) when is_list(Config) ->
PubKey = [crypto:mpint(PubEx), crypto:mpint(Mod)],
MD5 = crypto:md5(sized_binary(Msg)),
SHA = crypto:sha(sized_binary(Msg)),
- ?line Sig1 = crypto:rsa_sign_hash(sha, SHA, PrivKey),
- ?line m(crypto:rsa_verify_hash(sha, SHA, sized_binary(Sig1),PubKey), true),
+ ?line Sig1 = crypto:rsa_sign(sha, {digest,SHA}, PrivKey),
+ ?line m(crypto:rsa_verify(sha, {digest,SHA}, sized_binary(Sig1),PubKey), true),
- ?line Sig2 = crypto:rsa_sign_hash(md5, MD5, PrivKey),
- ?line m(crypto:rsa_verify_hash(md5, MD5, sized_binary(Sig2),PubKey), true),
+ ?line Sig2 = crypto:rsa_sign(md5, {digest,MD5}, PrivKey),
+ ?line m(crypto:rsa_verify(md5, {digest,MD5}, sized_binary(Sig2),PubKey), true),
?line m(Sig1 =:= Sig2, false),
- ?line m(crypto:rsa_verify_hash(md5, MD5, sized_binary(Sig1),PubKey), false),
- ?line m(crypto:rsa_verify_hash(sha, SHA, sized_binary(Sig2),PubKey), false),
+ ?line m(crypto:rsa_verify(md5, {digest,MD5}, sized_binary(Sig1),PubKey), false),
+ ?line m(crypto:rsa_verify(sha, {digest,SHA}, sized_binary(Sig2),PubKey), false),
ok.
@@ -1283,7 +1283,7 @@ dsa_sign_hash_test(Config) when is_list(Config) ->
ParamG = 18320614775012672475365915366944922415598782131828709277168615511695849821411624805195787607930033958243224786899641459701930253094446221381818858674389863050420226114787005820357372837321561754462061849169568607689530279303056075793886577588606958623645901271866346406773590024901668622321064384483571751669,
Params = [crypto:mpint(ParamP), crypto:mpint(ParamQ), crypto:mpint(ParamG)],
- ?line Sig1 = crypto:dss_sign_hash(sha, SHA, Params ++ [crypto:mpint(PrivKey)]),
+ ?line Sig1 = crypto:dss_sign(sha, {digest,SHA}, Params ++ [crypto:mpint(PrivKey)]),
?line m(crypto:dss_verify(none, SHA, sized_binary(Sig1),
Params ++ [crypto:mpint(PubKey)]), true),