notes about solaris crash
Karel Miko
10 years ago
6 | 6 |
- croak with the "real caller" (Crypt::Mac::*, Crypt::Mode::*, ...)
|
7 | 7 |
- croak when mode does not call start_(en|de)crypt
|
8 | 8 |
- "libtom-src/bn_mp_invmod.c", line 37: warning: statement not reached
|
|
9 |
- solaris crash:
|
|
10 |
- http://ppm4.activestate.com/sun4-solaris/5.14/1400/M/MI/MIK/CryptX-0.017.d/log-20130924T103600.txt
|
|
11 |
- t/pk_rsa.t crashes after: ok 32 - verify_hash
|
|
12 |
- t/pk_dsa.t crashes after: ok 28 - decrypt
|
9 | 13 |
- better primality testing: http://questhub.io/realm/perl/quest/519032ee1088c76505000035
|
10 | 14 |
- libtomcrypt patch: https://secure.ucc.asn.au/hg/dropbear/rev/9a789fc03f40?revcount=240 (free rsa key)
|
11 | 15 |
|
67 | 67 |
my $pt = $pr1->decrypt($ct);
|
68 | 68 |
ok(length $ct > 200, 'encrypt ' . length($ct));
|
69 | 69 |
is($pt, "secret message", 'decrypt');
|
70 | |
|
|
70 |
#XXX-FIXME somwhere here a crash happens on solaris - http://ppm4.activestate.com/sun4-solaris/5.14/1400/M/MI/MIK/CryptX-0.017.d/log-20130924T103600.txt
|
71 | 71 |
my $sig = $pr1->sign_message("message");
|
72 | 72 |
ok(length $sig > 60, 'sign_message ' . length($sig));
|
73 | 73 |
ok($pu1->verify_message($sig, "message"), 'verify_message');
|
77 | 77 |
ok(length $sig > 60, 'sign_hash ' . length($sig));
|
78 | 78 |
ok($pu1->verify_hash($sig, $hash, 'SHA1'), 'verify_hash');
|
79 | 79 |
}
|
80 | |
|
|
80 |
#XXX-FIXME somwhere here a crash happens on solaris - http://ppm4.activestate.com/sun4-solaris/5.14/1400/M/MI/MIK/CryptX-0.017.d/log-20130924T103600.txt
|
81 | 81 |
{
|
82 | 82 |
my $k = Crypt::PK::RSA->new;
|
83 | 83 |
$k->generate_key(256, 65537);
|