From 14816b695d6614a08a7a9803ddc611a540ecb38f Mon Sep 17 00:00:00 2001 From: Martin Nilsson <nilsson@opera.com> Date: Tue, 21 Oct 2014 02:38:55 +0200 Subject: [PATCH] Different Nettle libs have very different limits on the different DSA parameters. Attempt harder to provoke illegal parameters. --- src/post_modules/Nettle/testsuite.in | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/post_modules/Nettle/testsuite.in b/src/post_modules/Nettle/testsuite.in index 8ee3625d28..a23abaa5b7 100644 --- a/src/post_modules/Nettle/testsuite.in +++ b/src/post_modules/Nettle/testsuite.in @@ -1815,7 +1815,8 @@ dnl From Python passlib.hash.md5_crypt test_eq(Nettle.crypt_md5("password","3azHgidD"), "SrJPt7B.9rekpmwJwtON31") // hogweed -test_eval_error(Nettle.dsa_generate_keypair(1024,1,random_string)) +test_eval_error(Nettle.dsa_generate_keypair(256,160,random_string) +&&Nettle.dsa_generate_keypair(1024,1,random_string)) test_eval_error(Nettle.rsa_generate_keypair(512,4,random_string)) test_eval_error(Nettle.rsa_generate_keypair(512,1,random_string)) test_eval_error(Nettle.rsa_generate_keypair(88,0x10001,random_string)) -- GitLab