From 10dfb62866134658e1ad97914b3d1c3a7b0d7f50 Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Wed, 24 Jun 2015 16:53:01 -0400 Subject: Rework API for loading keys from components. Relax key size constraints to allow any key size within our supported range, since hsmbully seems to want to twist this knob to every possible setting. --- tests/test-rsa.c | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) (limited to 'tests') diff --git a/tests/test-rsa.c b/tests/test-rsa.c index fb53f69..594687c 100644 --- a/tests/test-rsa.c +++ b/tests/test-rsa.c @@ -91,16 +91,16 @@ static int test_decrypt(const char * const kind, const rsa_tc_t * const tc) hal_rsa_key_t key = { NULL }; hal_error_t err = HAL_OK; - if ((err = hal_rsa_key_load(HAL_RSA_PRIVATE, &key, - keybuf, sizeof(keybuf), - tc->n.val, tc->n.len, - tc->e.val, tc->e.len, - tc->d.val, tc->d.len, - tc->p.val, tc->p.len, - tc->q.val, tc->q.len, - tc->u.val, tc->u.len, - tc->dP.val, tc->dP.len, - tc->dQ.val, tc->dQ.len)) != HAL_OK) { + if ((err = hal_rsa_key_load_private(&key, + keybuf, sizeof(keybuf), + tc->n.val, tc->n.len, + tc->e.val, tc->e.len, + tc->d.val, tc->d.len, + tc->p.val, tc->p.len, + tc->q.val, tc->q.len, + tc->u.val, tc->u.len, + tc->dP.val, tc->dP.len, + tc->dQ.val, tc->dQ.len)) != HAL_OK) { printf("RSA CRT key load failed: %s\n", hal_error_string(err)); return 0; } -- cgit v1.2.3