@@ -497,20 +497,22 @@ mod tests {
497
497
}
498
498
499
499
fn test_key_basics ( private_key : RSAPrivateKey ) {
500
- private_key. validate ( ) . expect ( "failed to validate " ) ;
500
+ private_key. validate ( ) . expect ( "invalid private key " ) ;
501
501
502
502
assert ! (
503
503
private_key. d( ) < private_key. n( ) ,
504
504
"private exponent too large"
505
505
) ;
506
506
507
507
let pub_key: RSAPublicKey = private_key. clone ( ) . into ( ) ;
508
- let m = BigUint :: from_u64 ( 42 ) . unwrap ( ) ;
508
+ let m = BigUint :: from_u64 ( 42 ) . expect ( "invalid 42" ) ;
509
509
let c = encrypt ( & pub_key, & m) ;
510
- let m2 = decrypt :: < ThreadRng > ( None , & private_key, & c) . unwrap ( ) ;
510
+ let m2 = decrypt :: < ThreadRng > ( None , & private_key, & c)
511
+ . expect ( "unable to decrypt without blinding" ) ;
511
512
assert_eq ! ( m, m2) ;
512
513
let mut rng = thread_rng ( ) ;
513
- let m3 = decrypt ( Some ( & mut rng) , & private_key, & c) . unwrap ( ) ;
514
+ let m3 =
515
+ decrypt ( Some ( & mut rng) , & private_key, & c) . expect ( "unable to decrypt with blinding" ) ;
514
516
assert_eq ! ( m, m3) ;
515
517
}
516
518
@@ -519,14 +521,17 @@ mod tests {
519
521
#[ test]
520
522
fn $name( ) {
521
523
let mut rng = thread_rng( ) ;
522
- let private_key = if $multi == 2 {
523
- RSAPrivateKey :: new( & mut rng, $size) . unwrap( )
524
- } else {
525
- generate_multi_prime_key( & mut rng, $multi, $size) . unwrap( )
526
- } ;
527
- assert_eq!( private_key. n( ) . bits( ) , $size) ;
528
524
529
- test_key_basics( private_key) ;
525
+ for _ in 0 ..10 {
526
+ let private_key = if $multi == 2 {
527
+ RSAPrivateKey :: new( & mut rng, $size) . expect( "failed to generate key" )
528
+ } else {
529
+ generate_multi_prime_key( & mut rng, $multi, $size) . unwrap( )
530
+ } ;
531
+ assert_eq!( private_key. n( ) . bits( ) , $size) ;
532
+
533
+ test_key_basics( private_key) ;
534
+ }
530
535
}
531
536
} ;
532
537
}
0 commit comments