Index: CryptTest/RSA_TEST/prj/MDK/Objects/YC3121_Keil.axf
===================================================================
Cannot display: file marked as a binary type.
svn:mime-type = application/octet-stream

Property changes on: CryptTest/RSA_TEST/prj/MDK/Objects/YC3121_Keil.axf
___________________________________________________________________
Deleted: svn:mime-type
## -1 +0,0 ##
-application/octet-stream
\ No newline at end of property
Index: CryptTest/RSA_TEST/prj/MDK/YC3121_Keil.uvoptx
===================================================================
--- /YC3121_demo/ModuleDemo/CryptTest/RSA_TEST/prj/MDK/YC3121_Keil.uvoptx	(revision 590)
+++ /YC3121_demo/ModuleDemo/CryptTest/RSA_TEST/prj/MDK/YC3121_Keil.uvoptx	(working copy)
@@ -236,7 +236,7 @@
       <GroupNumber>2</GroupNumber>
       <FileNumber>3</FileNumber>
       <FileType>1</FileType>
-      <tvExp>1</tvExp>
+      <tvExp>0</tvExp>
       <tvExpOptDlg>0</tvExpOptDlg>
       <bDave2>0</bDave2>
       <PathWithFileName>..\..\user\main.c</PathWithFileName>
Index: CryptTest/RSA_TEST/user/main.c
===================================================================
--- /YC3121_demo/ModuleDemo/CryptTest/RSA_TEST/user/main.c	(revision 590)
+++ /YC3121_demo/ModuleDemo/CryptTest/RSA_TEST/user/main.c	(working copy)
@@ -3,7 +3,7 @@
   * @file    3121Demo_1.0V\ModuleDemo\CryptTest\RSA_TEST\user\main.c
   * @author  Yichip Application Team
   * @version V1.0.0
-  * @date    11-Dec-2019
+  * @date    20-Feb-2019
   * @brief   RSA TEST program.
   ******************************************************************************
   * @attention
@@ -132,7 +132,6 @@
 void test_rsa_self(void)
 {
 	RSA_PrivateKeyTypeDef pri_key;
-	RSA_PrivateKeyTypeDef temp;
 	RSA_PublicKeyTypeDef pub_key;
 	
 	uint32_t ret;
@@ -142,12 +141,12 @@
 	
 	MyPrintf("\n*************RSA 1024 Test In*************\n");
 	pri_key.bytes = 1024/8;//密钥bit长度
-	bn_read_string_to_bytes(temp.e, 4, RSA_E_1024);
-	bn_read_string_to_bytes(temp.p, pri_key.bytes/2, RSA_P_1024);
-	bn_read_string_to_bytes(temp.q, pri_key.bytes/2, RSA_Q_1024);
-	memcpy_r(pri_key.e, temp.e, 4);
-	memcpy_r(pri_key.p, temp.p, pri_key.bytes/2);
-	memcpy_r(pri_key.q, temp.q,pri_key.bytes/2);
+	bn_read_string_to_bytes(pri_key.e, 4, RSA_E_1024);
+	bn_read_string_to_bytes(pri_key.p, pri_key.bytes / 2, RSA_P_1024);
+	bn_read_string_to_bytes(pri_key.q, pri_key.bytes / 2, RSA_Q_1024);
+	memcpy_r(pri_key.e, pri_key.e, 4);
+	memcpy_r(pri_key.p, pri_key.p, pri_key.bytes/2);
+	memcpy_r(pri_key.q, pri_key.q,pri_key.bytes/2);
 	ret = RSA_CompleteKey_e(&pri_key, &RAND_RandP, NULL);
 	
 	MyPrintf("ret: %x", ret);
@@ -173,12 +172,12 @@
 	
 	MyPrintf("\n*************RSA 2048 Test In*************\n");
 	pri_key.bytes = 2048/8;//密钥bit长度
-	bn_read_string_to_bytes(temp.e, 4, RSA_E_2048);
-	bn_read_string_to_bytes(temp.p, pri_key.bytes/2, RSA_P_2048);
-	bn_read_string_to_bytes(temp.q, pri_key.bytes/2, RSA_Q_2048);
-	memcpy_r(pri_key.e, temp.e, 4);
-	memcpy_r(pri_key.p, temp.p, pri_key.bytes/2);
-	memcpy_r(pri_key.q, temp.q,pri_key.bytes/2);
+	bn_read_string_to_bytes(pri_key.e, 4, RSA_E_2048);
+	bn_read_string_to_bytes(pri_key.p, pri_key.bytes / 2, RSA_P_2048);
+	bn_read_string_to_bytes(pri_key.q, pri_key.bytes / 2, RSA_Q_2048);
+	memcpy_r(pri_key.e, pri_key.e, 4);
+	memcpy_r(pri_key.p, pri_key.p, pri_key.bytes / 2);
+	memcpy_r(pri_key.q, pri_key.q,pri_key.bytes / 2);
 	ret = RSA_CompleteKey_e(&pri_key, &RAND_RandP, NULL);
 	
 	MyPrintf("ret: %x", ret);
