From 14816b695d6614a08a7a9803ddc611a540ecb38f Mon Sep 17 00:00:00 2001
From: Martin Nilsson <nilsson@opera.com>
Date: Tue, 21 Oct 2014 02:38:55 +0200
Subject: [PATCH] Different Nettle libs have very different limits on the
 different DSA parameters. Attempt harder to provoke illegal parameters.

---
 src/post_modules/Nettle/testsuite.in | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/src/post_modules/Nettle/testsuite.in b/src/post_modules/Nettle/testsuite.in
index 8ee3625d28..a23abaa5b7 100644
--- a/src/post_modules/Nettle/testsuite.in
+++ b/src/post_modules/Nettle/testsuite.in
@@ -1815,7 +1815,8 @@ dnl From Python passlib.hash.md5_crypt
 test_eq(Nettle.crypt_md5("password","3azHgidD"), "SrJPt7B.9rekpmwJwtON31")
 
 // hogweed
-test_eval_error(Nettle.dsa_generate_keypair(1024,1,random_string))
+test_eval_error(Nettle.dsa_generate_keypair(256,160,random_string)
+&&Nettle.dsa_generate_keypair(1024,1,random_string))
 test_eval_error(Nettle.rsa_generate_keypair(512,4,random_string))
 test_eval_error(Nettle.rsa_generate_keypair(512,1,random_string))
 test_eval_error(Nettle.rsa_generate_keypair(88,0x10001,random_string))
-- 
GitLab