Use 0 for tbslen to perform strlen.
authorDr. Stephen Henson <steve@openssl.org>
Tue, 19 Apr 2011 11:10:54 +0000 (11:10 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Tue, 19 Apr 2011 11:10:54 +0000 (11:10 +0000)
crypto/dsa/dsa_key.c
crypto/ec/ec_key.c
crypto/rsa/rsa_gen.c

index c7589873a48628f04ee8ea56d975269e0f883075..942000e3a52e2cf88d21e2edd1becd564887db87 100644 (file)
@@ -79,7 +79,7 @@ static int fips_check_dsa(DSA *dsa)
        pk.pkey.dsa = dsa;
 
        if (!fips_pkey_signature_test(FIPS_TEST_PAIRWISE,
-                                       &pk, tbs, -1, NULL, 0, NULL, 0, NULL))
+                                       &pk, tbs, 0, NULL, 0, NULL, 0, NULL))
                {
                FIPSerr(FIPS_F_FIPS_CHECK_DSA,FIPS_R_PAIRWISE_TEST_FAILED);
                fips_set_selftest_fail();
index 59bc08494eb78cfa9a465197ad69a86d42726250..ad3022f868d9404af3347fd1a02b180d99e82d52 100644 (file)
@@ -244,7 +244,7 @@ static int fips_check_ec(EC_KEY *key)
        pk.pkey.ec = key;
 
        if (!fips_pkey_signature_test(FIPS_TEST_PAIRWISE,
-                                       &pk, tbs, -1, NULL, 0, NULL, 0, NULL))
+                                       &pk, tbs, 0, NULL, 0, NULL, 0, NULL))
                {
                FIPSerr(FIPS_F_FIPS_CHECK_EC,FIPS_R_PAIRWISE_TEST_FAILED);
                fips_set_selftest_fail();
index 8f798c0dec122b1a6e7897bbe3ed024187344d5c..484468da05e333d5f0403a3aa42a5d70ac5d9214 100644 (file)
@@ -86,11 +86,11 @@ int fips_check_rsa(RSA *rsa)
        pk.pkey.rsa = rsa;
 
        /* Perform pairwise consistency signature test */
-       if (!fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, -1,
+       if (!fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, 0,
                        NULL, 0, NULL, RSA_PKCS1_PADDING, NULL)
-               || !fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, -1,
+               || !fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, 0,
                        NULL, 0, NULL, RSA_X931_PADDING, NULL)
-               || !fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, -1,
+               || !fips_pkey_signature_test(FIPS_TEST_PAIRWISE, &pk, tbs, 0,
                        NULL, 0, NULL, RSA_PKCS1_PSS_PADDING, NULL))
                goto err;
        /* Now perform pairwise consistency encrypt/decrypt test */