diff options
author | Adam Langley <agl@chromium.org> | 2013-04-23 12:13:51 -0400 |
---|---|---|
committer | Janusz Kozerski <j.kozerski@samsung.com> | 2014-10-20 15:26:04 +0200 |
commit | 30be92a2e64d3abd103088af3d8314c4eb58f6b3 (patch) | |
tree | 492dc4707cf208b295b82c10cdeed3ec5c74100a /crypto/bn/exptest.c | |
parent | 2a7b9aad0b24eb04d183364c7be228ddc6cf918a (diff) | |
download | openssl-30be92a2e64d3abd103088af3d8314c4eb58f6b3.tar.gz openssl-30be92a2e64d3abd103088af3d8314c4eb58f6b3.tar.bz2 openssl-30be92a2e64d3abd103088af3d8314c4eb58f6b3.zip |
Ensure that x**0 mod 1 = 0.
(cherry picked from commit 2b0180c37fa6ffc48ee40caa831ca398b828e680)
Reviewed-by: Ben Laurie <ben@openssl.org>
Diffstat (limited to 'crypto/bn/exptest.c')
-rw-r--r-- | crypto/bn/exptest.c | 45 |
1 files changed, 44 insertions, 1 deletions
diff --git a/crypto/bn/exptest.c b/crypto/bn/exptest.c index 074a8e8..5fa02a1 100644 --- a/crypto/bn/exptest.c +++ b/crypto/bn/exptest.c @@ -71,6 +71,43 @@ static const char rnd_seed[] = "string to make the random number generator think it has entropy"; +/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */ +static int test_exp_mod_zero() { + BIGNUM a, p, m; + BIGNUM r; + BN_CTX *ctx = BN_CTX_new(); + int ret = 1; + + BN_init(&m); + BN_one(&m); + + BN_init(&a); + BN_one(&a); + + BN_init(&p); + BN_zero(&p); + + BN_init(&r); + BN_mod_exp(&r, &a, &p, &m, ctx); + BN_CTX_free(ctx); + + if (BN_is_zero(&r)) + ret = 0; + else + { + printf("1**0 mod 1 = "); + BN_print_fp(stdout, &r); + printf(", should be 0\n"); + } + + BN_free(&r); + BN_free(&a); + BN_free(&p); + BN_free(&m); + + return ret; +} + int main(int argc, char *argv[]) { BN_CTX *ctx; @@ -190,7 +227,13 @@ int main(int argc, char *argv[]) ERR_remove_thread_state(NULL); CRYPTO_mem_leaks(out); BIO_free(out); - printf(" done\n"); + printf("\n"); + + if (test_exp_mod_zero() != 0) + goto err; + + printf("done\n"); + EXIT(0); err: ERR_load_crypto_strings(); |