@@ -500,7 +500,7 @@ print_hex("q", tmp, len);
500500
501501 /* encrypt the key (without lparam) */
502502 for (cnt = 0 ; cnt < 4 ; cnt ++ ) {
503- for (rsa_msgsize = 1 ; rsa_msgsize <= 86 ; rsa_msgsize ++ ) {
503+ for (rsa_msgsize = 0 ; rsa_msgsize <= 86 ; rsa_msgsize ++ ) {
504504 /* make a random key/msg */
505505 ENSURE (yarrow_read (in , rsa_msgsize , & yarrow_prng ) == rsa_msgsize );
506506
@@ -523,10 +523,10 @@ print_hex("q", tmp, len);
523523 }
524524
525525 /* encrypt the key (with lparam) */
526- for (rsa_msgsize = 1 ; rsa_msgsize <= 86 ; rsa_msgsize ++ ) {
526+ for (rsa_msgsize = 0 ; rsa_msgsize <= 86 ; rsa_msgsize ++ ) {
527527 len = sizeof (out );
528528 len2 = rsa_msgsize ;
529- DO (rsa_encrypt_key (in , rsa_msgsize , out , & len , lparam , sizeof (lparam ), & yarrow_prng , prng_idx , hash_idx , & key ));
529+ DO (rsa_encrypt_key (rsa_msgsize ? in : NULL , rsa_msgsize , out , & len , lparam , sizeof (lparam ), & yarrow_prng , prng_idx , hash_idx , & key ));
530530 /* change a byte */
531531 out [8 ] ^= 1 ;
532532 SHOULD_FAIL (rsa_decrypt_key (out , len , tmp , & len2 , lparam , sizeof (lparam ), hash_idx , & stat2 , & key ));
@@ -542,7 +542,7 @@ print_hex("q", tmp, len);
542542 }
543543
544544 /* encrypt the key PKCS #1 v1.5 (payload from 1 to 117 bytes) */
545- for (rsa_msgsize = 1 ; rsa_msgsize <= 117 ; rsa_msgsize ++ ) {
545+ for (rsa_msgsize = 0 ; rsa_msgsize <= 117 ; rsa_msgsize ++ ) {
546546 len = sizeof (out );
547547 len2 = rsa_msgsize ;
548548 /* make a random key/msg */
0 commit comments