@@ -191,13 +191,13 @@ static int rsa_compat_test(void)
191191
192192 /* sign-verify a message with PKCS #1 v1.5 no ASN.1 */
193193 len = sizeof (buf );
194- DO (rsa_sign_hash_ex ((unsigned char * )"test" , 4 , buf , & len , LTC_PKCS_1_V1_5_NA1 , NULL , 0 , 0 , 0 , & key ));
194+ DO (rsa_sign_hash_ex ((unsigned char * )"test" , 4 , buf , & len , LTC_PKCS_1_V1_5_NA1 , NULL , 0 , 0 , 0 , 0 , & key ));
195195 if (len != sizeof (openssl_rsautl_pkcs ) || memcmp (buf , openssl_rsautl_pkcs , len )) {
196196 fprintf (stderr , "RSA rsa_sign_hash_ex + LTC_PKCS_1_V1_5_NA1 failed\n" );
197197 return 1 ;
198198 }
199199 stat = 0 ;
200- DO (rsa_verify_hash_ex (openssl_rsautl_pkcs , sizeof (openssl_rsautl_pkcs ), (unsigned char * )"test" , 4 , LTC_PKCS_1_V1_5_NA1 , 0 , 0 , & stat , & pubkey ));
200+ DO (rsa_verify_hash_ex (openssl_rsautl_pkcs , sizeof (openssl_rsautl_pkcs ), (unsigned char * )"test" , 4 , LTC_PKCS_1_V1_5_NA1 , 0 , 0 , 0 , & stat , & pubkey ));
201201 if (stat != 1 ) {
202202 fprintf (stderr , "RSA rsa_verify_hash_ex + LTC_PKCS_1_V1_5_NA1 failed\n" );
203203 return 1 ;
@@ -331,9 +331,9 @@ static int s_rsa_cryptx_issue_69(void)
331331 l1 = sizeof (buf1 );
332332 DO (radix_to_bin (sig1 , 16 , buf0 , & l0 ));
333333 DO (radix_to_bin (hash , 16 , buf1 , & l1 ));
334- SHOULD_FAIL (rsa_verify_hash_ex (buf0 , l0 , buf1 , l1 , LTC_PKCS_1_V1_5 , 0 , 0 , & stat , & key ));
334+ SHOULD_FAIL (rsa_verify_hash_ex (buf0 , l0 , buf1 , l1 , LTC_PKCS_1_V1_5 , 0 , 0 , 0 , & stat , & key ));
335335 DO (radix_to_bin (sig2 , 16 , buf0 , & l0 ));
336- SHOULD_FAIL (rsa_verify_hash_ex (buf0 , l0 , buf1 , l1 , LTC_PKCS_1_V1_5 , 0 , 0 , & stat , & key ));
336+ SHOULD_FAIL (rsa_verify_hash_ex (buf0 , l0 , buf1 , l1 , LTC_PKCS_1_V1_5 , 0 , 0 , 0 , & stat , & key ));
337337 rsa_free (& key );
338338 return CRYPT_OK ;
339339}
@@ -683,11 +683,11 @@ print_hex("q", tmp, len);
683683
684684 /* sign a message with PKCS #1 v1.5 */
685685 len = sizeof (out );
686- DO (rsa_sign_hash_ex (in , 20 , out , & len , LTC_PKCS_1_V1_5 , & yarrow_prng , prng_idx , hash_idx , 8 , & privKey ));
687- DO (rsa_verify_hash_ex (out , len , in , 20 , LTC_PKCS_1_V1_5 , hash_idx , 8 , & stat , & pubKey ));
686+ DO (rsa_sign_hash_ex (in , 20 , out , & len , LTC_PKCS_1_V1_5 , & yarrow_prng , prng_idx , hash_idx , 0 , 8 , & privKey ));
687+ DO (rsa_verify_hash_ex (out , len , in , 20 , LTC_PKCS_1_V1_5 , hash_idx , 0 , 8 , & stat , & pubKey ));
688688 /* change a byte */
689689 in [0 ] ^= 1 ;
690- DO (rsa_verify_hash_ex (out , len , in , 20 , LTC_PKCS_1_V1_5 , hash_idx , 8 , & stat2 , & pubKey ));
690+ DO (rsa_verify_hash_ex (out , len , in , 20 , LTC_PKCS_1_V1_5 , hash_idx , 0 , 8 , & stat2 , & pubKey ));
691691
692692 if (!(stat == 1 && stat2 == 0 )) {
693693 fprintf (stderr , "rsa_verify_hash_ex failed, %d, %d" , stat , stat2 );
@@ -720,9 +720,9 @@ print_hex("q", tmp, len);
720720 len = sizeof (in );
721721 len2 = sizeof (out );
722722 /* (1) */
723- DO (rsa_sign_hash_ex (p , 20 , p2 , & len2 , LTC_PKCS_1_V1_5 , & yarrow_prng , prng_idx , hash_idx , 8 , & privKey ));
723+ DO (rsa_sign_hash_ex (p , 20 , p2 , & len2 , LTC_PKCS_1_V1_5 , & yarrow_prng , prng_idx , hash_idx , 0 , 8 , & privKey ));
724724 /* (2) */
725- DOX (rsa_verify_hash_ex (p2 , len2 , p , 20 , LTC_PKCS_1_V1_5 , hash_idx , -1 , & stat , & pubKey ), "should succeed" );
725+ DOX (rsa_verify_hash_ex (p2 , len2 , p , 20 , LTC_PKCS_1_V1_5 , hash_idx , 0 , -1 , & stat , & pubKey ), "should succeed" );
726726 DOX (stat == 1 ?CRYPT_OK :CRYPT_FAIL_TESTVECTOR , "should succeed" );
727727 len3 = sizeof (tmp );
728728 /* (3) */
@@ -756,7 +756,7 @@ print_hex("q", tmp, len);
756756
757757 len3 = sizeof (tmp );
758758 /* (6) */
759- SHOULD_FAIL (rsa_verify_hash_ex (p2 , len2 , p , 20 , LTC_PKCS_1_V1_5 , hash_idx , -1 , & stat , & pubKey ));
759+ SHOULD_FAIL (rsa_verify_hash_ex (p2 , len2 , p , 20 , LTC_PKCS_1_V1_5 , hash_idx , -1 , -1 , & stat , & pubKey ));
760760 DOX (stat == 0 ?CRYPT_OK :CRYPT_FAIL_TESTVECTOR , "should fail" );
761761 }
762762 rsa_free (& key );
0 commit comments