Clear signed vs. unsigned conflicts.

Change the fingerprint accordingly.
This commit is contained in:
Richard Levitte 2005-01-11 16:54:35 +00:00
parent 97c2c819b3
commit c4929fb841
2 changed files with 3 additions and 3 deletions

View File

@ -1,3 +1,3 @@
HMAC-SHA1(fips_rsa_eay.c)= eabab59a2f11f3da4c21e1144efe1684f5e8f1ec
HMAC-SHA1(fips_rsa_gen.c)= 4bbc0afcade1ac53f469aaa89f84c413678254bf
HMAC-SHA1(fips_rsa_selftest.c)= c31301785f748b091a1a0bb20641116a448ff02d
HMAC-SHA1(fips_rsa_selftest.c)= 70553a5212e86f65b068564946d39b738a201e22

View File

@ -211,7 +211,7 @@ int FIPS_selftest_rsa()
/* ...1) using the same RSA key to encrypt the SHA-1 hash of a
* plaintext value larger than the RSA key size
*/
if (RSA_size(key) >= strlen(original_ptext))
if (RSA_size(key) >= sizeof(original_ptext) - 1)
{
FIPSerr(FIPS_F_FIPS_SELFTEST_RSA,FIPS_R_SELFTEST_FAILED);
return 0;
@ -219,7 +219,7 @@ int FIPS_selftest_rsa()
/* ...2) then generate the SHA-1 digest of plaintext, and compare the
* digest to the Known Answer (note here we duplicate the SHA-1 KAT)
*/
SHA1((unsigned char*)original_ptext,strlen(original_ptext),md);
SHA1(original_ptext,sizeof(original_ptext) - 1,md);
if(memcmp(md,mdkat,SHA_DIGEST_LENGTH))
{
FIPSerr(FIPS_F_FIPS_SELFTEST_SHA1,FIPS_R_SELFTEST_FAILED);