|
@@ -143,14 +143,14 @@ static int _dsa_compat_test(void)
|
|
|
x = sizeof(tmp);
|
|
|
DO(dsa_export(tmp, &x, PK_PRIVATE | PK_STD, &key));
|
|
|
if (compare_testvector(tmp, x, openssl_priv_dsa, sizeof(openssl_priv_dsa),
|
|
|
- "DSA private export failed from dsa_import(priv_key)\n", 0)) {
|
|
|
+ "DSA private export failed from dsa_import(priv_key)\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
|
|
|
x = sizeof(tmp);
|
|
|
DO(dsa_export(tmp, &x, PK_PUBLIC | PK_STD, &key));
|
|
|
if (compare_testvector(tmp, x, openssl_pub_dsa, sizeof(openssl_pub_dsa),
|
|
|
- "DSA public export failed from dsa_import(priv_key)\n", 0)) {
|
|
|
+ "DSA public export failed from dsa_import(priv_key)\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|
|
@@ -160,7 +160,7 @@ static int _dsa_compat_test(void)
|
|
|
x = sizeof(tmp);
|
|
|
DO(dsa_export(tmp, &x, PK_PUBLIC | PK_STD, &key));
|
|
|
if (compare_testvector(tmp, x, openssl_pub_dsa, sizeof(openssl_pub_dsa),
|
|
|
- "DSA public export failed from dsa_import(pub_key)\n", 0)) {
|
|
|
+ "DSA public export failed from dsa_import(pub_key)\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|
|
@@ -185,7 +185,7 @@ static int _dsa_compat_test(void)
|
|
|
len = sizeof(buf);
|
|
|
DO(dsa_export(buf, &len, PK_PRIVATE | PK_STD, &key));
|
|
|
if (compare_testvector(buf, len, openssl_priv_dsa, sizeof(openssl_priv_dsa),
|
|
|
- "DSA private export failed from dsa_set_pqg() & dsa_set_key()\n", 0)) {
|
|
|
+ "DSA private export failed from dsa_set_pqg() & dsa_set_key()\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|
|
@@ -201,7 +201,7 @@ static int _dsa_compat_test(void)
|
|
|
len = sizeof(buf);
|
|
|
DO(dsa_export(buf, &len, PK_PUBLIC | PK_STD, &key));
|
|
|
if (compare_testvector(buf, len, openssl_pub_dsa, sizeof(openssl_pub_dsa),
|
|
|
- "DSA public export failed from dsa_set_pqg() & dsa_set_key()\n", 0)) {
|
|
|
+ "DSA public export failed from dsa_set_pqg() & dsa_set_key()\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|
|
@@ -225,7 +225,7 @@ static int _dsa_compat_test(void)
|
|
|
len = sizeof(buf);
|
|
|
DO(dsa_export(buf, &len, PK_PUBLIC | PK_STD, &key));
|
|
|
if (compare_testvector(buf, len, openssl_pub_dsa, sizeof(openssl_pub_dsa),
|
|
|
- "DSA public export failed from dsa_set_pqg_dsaparam()\n", 0)) {
|
|
|
+ "DSA public export failed from dsa_set_pqg_dsaparam()\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|
|
@@ -238,7 +238,7 @@ static int _dsa_compat_test(void)
|
|
|
len = sizeof(buf);
|
|
|
DO(dsa_export(buf, &len, PK_PRIVATE | PK_STD, &key));
|
|
|
if (compare_testvector(buf, len, openssl_priv_dsa, sizeof(openssl_priv_dsa),
|
|
|
- "DSA private export failed from dsa_set_pqg_dsaparam()\n", 0)) {
|
|
|
+ "DSA private export failed from dsa_set_pqg_dsaparam()\n", __LINE__)) {
|
|
|
return CRYPT_FAIL_TESTVECTOR;
|
|
|
}
|
|
|
dsa_free(&key);
|