X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fyaca%2Fyaca-test-rsa.cpp;h=93c41c919c9eab7f2d5f3c715ecc71eba31f2e66;hb=8ce9f4e4f728eb601e4e1435956ebaa987029b95;hp=4bc7b21e0e5a9225da99bbcd1e6d06fe1a1d14fe;hpb=f1f73355a7953f744ac78cb3af68363d5e1e48c3;p=platform%2Fcore%2Ftest%2Fsecurity-tests.git diff --git a/src/yaca/yaca-test-rsa.cpp b/src/yaca/yaca-test-rsa.cpp index 4bc7b21..93c41c9 100644 --- a/src/yaca/yaca-test-rsa.cpp +++ b/src/yaca/yaca-test-rsa.cpp @@ -187,14 +187,13 @@ void test_rsa_padding(const KeyPair& kp, const PaddingInfo& pi, EncryptionType e continue; /* - * - YACA_PADDING_PKCS1 & YACA_PADDING_PKCS1_SSLV23 are compatible in case of - * public_encrypt/private_decrypt + * - YACA_PADDING_PKCS1 & YACA_PADDING_PKCS1_SSLV23 are compatible * - YACA_PADDING_NONE checks only the input length */ expected = YACA_ERROR_INVALID_PARAMETER; if (p.padding == YACA_PADDING_NONE || - (et == ET_PUB && ((p.padding == YACA_PADDING_PKCS1 && padding == YACA_PADDING_PKCS1_SSLV23) || - (p.padding == padding)))) + (p.padding == YACA_PADDING_PKCS1 && padding == YACA_PADDING_PKCS1_SSLV23) || + (p.padding == YACA_PADDING_PKCS1_SSLV23 && padding == YACA_PADDING_PKCS1)) expected = YACA_ERROR_NONE; int ret = decrypt(p.padding, dec_key.get(),