Don't try 1**0 test with FIPS.
The 1**0 test will fail for FIPS capable builds because it uses the old BIGNUM code in the 1.2 FIPS module which can't be fixed. Reviewed-by: Emilia Käsper <emilia@openssl.org>
This commit is contained in:
parent
94f735cade
commit
f33636faf7
@ -71,6 +71,11 @@
|
||||
|
||||
static const char rnd_seed[] = "string to make the random number generator think it has entropy";
|
||||
|
||||
/*
|
||||
* Disabled for FIPS capable builds because they use the FIPS BIGNUM library
|
||||
* which will fail this test.
|
||||
*/
|
||||
#ifndef OPENSSL_FIPS
|
||||
/* test_exp_mod_zero tests that x**0 mod 1 == 0. It returns zero on success. */
|
||||
static int test_exp_mod_zero() {
|
||||
BIGNUM a, p, m;
|
||||
@ -107,7 +112,7 @@ static int test_exp_mod_zero() {
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
#endif
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
BN_CTX *ctx;
|
||||
@ -228,10 +233,10 @@ int main(int argc, char *argv[])
|
||||
CRYPTO_mem_leaks(out);
|
||||
BIO_free(out);
|
||||
printf("\n");
|
||||
|
||||
#ifndef OPENSSL_FIPS
|
||||
if (test_exp_mod_zero() != 0)
|
||||
goto err;
|
||||
|
||||
#endif
|
||||
printf("done\n");
|
||||
|
||||
EXIT(0);
|
||||
|
Loading…
x
Reference in New Issue
Block a user