aboutsummaryrefslogtreecommitdiff
path: root/src/test/test_crypto.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2012-03-08 14:51:57 -0500
committerNick Mathewson <nickm@torproject.org>2012-03-27 22:37:55 -0400
commit00b4784575c88d5de15886b440096c1e2b9fb080 (patch)
tree3eabb1c323705719ad469767d79dd064d3fb4ddc /src/test/test_crypto.c
parentfc35674567b005f1d096488fc92d81f662aaebe5 (diff)
downloadtor-00b4784575c88d5de15886b440096c1e2b9fb080.tar
tor-00b4784575c88d5de15886b440096c1e2b9fb080.tar.gz
Remove support for PK_NO_PADDING in crypto_pk_public_hybrid_encrypt
We never use it, and it would be a stupid thing if we started using it.
Diffstat (limited to 'src/test/test_crypto.c')
-rw-r--r--src/test/test_crypto.c7
1 files changed, 2 insertions, 5 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c
index bf0962e98..3f9029a8f 100644
--- a/src/test/test_crypto.c
+++ b/src/test/test_crypto.c
@@ -485,14 +485,11 @@ test_crypto_pk(void)
/* Try with hybrid encryption wrappers. */
crypto_rand(data1, 1024);
- for (i = 0; i < 3; ++i) {
+ for (i = 0; i < 2; ++i) {
for (j = 85; j < 140; ++j) {
memset(data2,0,1024);
memset(data3,0,1024);
- if (i == 0 && j < 129)
- continue;
- p = (i==0)?PK_NO_PADDING:
- (i==1)?PK_PKCS1_PADDING:PK_PKCS1_OAEP_PADDING;
+ p = (i==0)?PK_PKCS1_PADDING:PK_PKCS1_OAEP_PADDING;
len = crypto_pk_public_hybrid_encrypt(pk1,data2,sizeof(data2),
data1,j,p,0);
test_assert(len>=0);