Add a test when hashes are too large for RSASSA-PKCS1-v1_5.
We didn't cover this case. Change-Id: Iafa6529290298326fd17e5c130b4816098213ebb Reviewed-on: https://boringssl-review.googlesource.com/14945 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
d0b988219f
commit
f004aa556d
@ -144,6 +144,12 @@ Digest = SHA1
|
|||||||
Input = "0123456789ABCDEF12345"
|
Input = "0123456789ABCDEF12345"
|
||||||
Error = INVALID_DIGEST_LENGTH
|
Error = INVALID_DIGEST_LENGTH
|
||||||
|
|
||||||
|
# Digest too large for key.
|
||||||
|
Sign = RSA-512
|
||||||
|
Digest = SHA512
|
||||||
|
Input = "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF"
|
||||||
|
Error = DIGEST_TOO_BIG_FOR_RSA_KEY
|
||||||
|
|
||||||
# Mismatched digest
|
# Mismatched digest
|
||||||
Verify = RSA-2048
|
Verify = RSA-2048
|
||||||
Digest = SHA1
|
Digest = SHA1
|
||||||
|
Loading…
Reference in New Issue
Block a user