aboutsummaryrefslogtreecommitdiff
path: root/openssl/crypto/bn/exptest.c
diff options
context:
space:
mode:
authorMike DePaulo <mikedep333@gmail.com>2014-10-18 19:59:47 -0400
committerMike DePaulo <mikedep333@gmail.com>2015-02-28 07:16:10 -0500
commita1babdda61e8cb3f8d0608d87120ba46ca91a21d (patch)
tree633a4386cd59bc6ef0b809b67ca1cc0bb494218f /openssl/crypto/bn/exptest.c
parent8fafe3481b134a4d368ba57e3698754a6a45c4c1 (diff)
downloadvcxsrv-a1babdda61e8cb3f8d0608d87120ba46ca91a21d.tar.gz
vcxsrv-a1babdda61e8cb3f8d0608d87120ba46ca91a21d.tar.bz2
vcxsrv-a1babdda61e8cb3f8d0608d87120ba46ca91a21d.zip
Update openssl to version openssl-1.0.1j
Diffstat (limited to 'openssl/crypto/bn/exptest.c')
-rw-r--r--openssl/crypto/bn/exptest.c45
1 files changed, 44 insertions, 1 deletions
diff --git a/openssl/crypto/bn/exptest.c b/openssl/crypto/bn/exptest.c
index 074a8e882..5fa02a122 100644
--- a/openssl/crypto/bn/exptest.c
+++ b/openssl/crypto/bn/exptest.c
@@ -71,6 +71,43 @@
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
+/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */
+static int test_exp_mod_zero() {
+ BIGNUM a, p, m;
+ BIGNUM r;
+ BN_CTX *ctx = BN_CTX_new();
+ int ret = 1;
+
+ BN_init(&m);
+ BN_one(&m);
+
+ BN_init(&a);
+ BN_one(&a);
+
+ BN_init(&p);
+ BN_zero(&p);
+
+ BN_init(&r);
+ BN_mod_exp(&r, &a, &p, &m, ctx);
+ BN_CTX_free(ctx);
+
+ if (BN_is_zero(&r))
+ ret = 0;
+ else
+ {
+ printf("1**0 mod 1 = ");
+ BN_print_fp(stdout, &r);
+ printf(", should be 0\n");
+ }
+
+ BN_free(&r);
+ BN_free(&a);
+ BN_free(&p);
+ BN_free(&m);
+
+ return ret;
+}
+
int main(int argc, char *argv[])
{
BN_CTX *ctx;
@@ -190,7 +227,13 @@ int main(int argc, char *argv[])
ERR_remove_thread_state(NULL);
CRYPTO_mem_leaks(out);
BIO_free(out);
- printf(" done\n");
+ printf("\n");
+
+ if (test_exp_mod_zero() != 0)
+ goto err;
+
+ printf("done\n");
+
EXIT(0);
err:
ERR_load_crypto_strings();